User's Guide
Table Of Contents
- Disclaimers
- Table of Contents
- CHAPTER 1 Introduction
- CHAPTER 2 Basic Mode Setup
- CHAPTER 3 Expert Mode
- Overview of Major Capabilities
- Wide Area Network Termination
- PPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM)
- Instant-On PPP
- Simplified Local Area Network Setup
- DHCP (Dynamic Host Configuration Protocol) Server
- DNS Proxy
- Management
- Embedded Web Server
- Diagnostics
- Security
- Remote Access Control
- Password Protection
- Network Address Translation (NAT)
- Cayman Advanced Features for NAT
- Internal Servers
- Pinholes
- Default Server
- Combination NAT Bypass Configuration
- VPN IPSec Pass Through
- Access the Web Interface
- Toolbar
- Navigating the Web Interface
- Restart
- Help
- Configure
- Button: Configure
- Quickstart
- How to Use the Quickstart Page
- Link: Configure -> Quickstart
- Setup Your Gateway using a PPP Connection
- LAN
- Link: Configure -> LAN
- WAN
- Link: Configure -> WAN
- Advanced
- Link: Advanced
- Link: IP Static Routes
- Link: IP Static ARP
- Link: Pinholes
- Configure Specific Pinholes
- Planning for Your Pinholes
- Example: A LAN Requiring Three Pinholes
- Pinhole Configuration Procedure
- Link: IPMaps
- Configure the IPMaps Feature
- What are IPMaps and how are they used?
- What types of servers are supported by IPMaps?
- Can I use IPMaps with my PPPoE or PPPoA connection?
- Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway?
- Link: Default Server
- Configure a Default Server
- Typical Network Diagram
- NAT Combination Application
- IP-Passthrough
- A restriction
- Link: DNS
- Link: DHCP Server
- Link: SNMP
- Link: Advanced -> Ethernet Bridge
- Configuring for Bridge Mode
- Link: Stateful Inspection
- Exposed Addresses
- Stateful Inspection Options
- Link: System
- Link: Syslog Parameters
- Link: Internal Servers
- Link: Software Hosting
- Rename a User(PC)
- Link: Clear Options
- Security
- Button: Security
- Link: Passwords
- Create and Change Passwords
- Link: Firewall
- BreakWater Basic Firewall
- Link: IPSec
- Link: Security Log
- Install
- Button: Install
- Link: Install Software
- Updating Your Gateway’s CaymanOS Version
- Task 1: Required Files
- Task 2: CaymanOS Image File
- Link: Install Keys
- Use Cayman Software Feature Keys
- Overview of Major Capabilities
- CHAPTER 4 Basic Troubleshooting
- CHAPTER 5 Advanced Troubleshooting
- CHAPTER 6 Command Line Interface
- Overview
- Starting and Ending a CLI Session
- Using the CLI Help Facility
- About SHELL Commands
- SHELL Commands
- About CONFIG Commands
- CONFIG Commands
- DSL Commands
- ATM Settings
- Bridging Settings
- DHCP Settings
- DMT Settings
- Domain Name System Settings
- IP Settings
- IP-over-PPP Settings
- Static ARP Settings
- IPMaps Settings
- Network Address Translation (NAT) Default Settings
- Network Address Translation (NAT) Pinhole Settings
- PPPoE Settings
- Configuring Basic PPP Settings
- Configuring Port Authentication
- Command Line Interface Preference Settings
- Port Renumbering Settings
- Security Settings
- SNMP Settings
- System Settings
- Syslog
- Wireless Settings (supported models)
- CHAPTER 7 Glossary
- CHAPTER 8 Technical Specifications and Safety Information
- Index
220
hop count. Distance, measured in the number of routers to be
traversed, from a local router to a remote network. See metric.
hub. Another name for a repeater. The hub is a critical network
element that connects everything to one centralized point. A
hub is simply a box with multiple ports for network connections.
Each device on the network is attached to the hub via an Ether-
net cable.
-----I-----
IKE. Internet Key Exchange protocol provides automated key
management and is a preferred alternative to manual key man-
agement as it provides better security. Manual key manage-
ment is practical in a small, static environment of two or three
sites. Exchanging the key is done through manual means.
Because IKE provides automated key exchange, it is good for
larger, more dynamic environments.
INSPECTION. The best option for Internet communications
security is to have an SMLI firewall constantly inspecting the
flow of traffic: determining direction, limiting or eliminating
inbound access, and verifying down to the packet level that the
network traffic is only what the customer chooses. The Cayman
Gateway works like a network super traffic cop, inspecting and
filtering out undesired traffic based on your security policy and
resulting configuration.
interface. A connection between two devices or networks.
internet address. IP address. A 32-bit address used to route
packets on a TCP/IP network. In dotted decimal notation, each
eight bits of the 32-bit number are presented as a decimal num-
ber, with the four octets separated by periods.