user manual

7
Chapter 3. OPERATION
Overview.........................................7
Administration and Security............7
HTTP Interface ............................ 10
SNMP Interface ........................... 25
Telnet Interface............................ 27
Maintenance Interface ................. 35
3.1 OVERVIEW
Each CiM-25 unit is programmed in the factory to provide a custom proxy interface to
one of Comtech EF Data’s previously defined equipments. This means that a CiM-
25/600L that is loaded to interface a CDM-600L Modem to the IP world will not operate
with any other piece of Comtech EF Data equipment, unless the personality is changed
via a flash upload.
However every CiM-25, independent of personality, shares a large number of common
features. For instance, all CiM-25 units provide the same degree of security features,
network protocols, and administration features. The following sections will provide a
detailed description of all the features available for a specific CiM-25 (i.e. CiM-25/600L
with CDM-600L Modem). Those areas that are common to all CiM-25 units will be
expounded upon and delineated. The areas that are specific to the individual personality
(i.e. equipment parameter control) will only be briefly covered since these are already
covered in detail in the individual equipment operator manuals.
3.2 ADMINISTRATION AND SECURITY
The CiM-25 has been designed to provide a high degree of administrative flexibility to
insure that each customer can configure the device (or network of devices) in a manner
that meets his/her security needs. The primary tools provided are the Host Allow List,
PING enable/disable, and three (3) level user login. Used as a group, these three tools
provide the CiM-25 with a very high degree of security. Each of these tools is described
in more detail below: