EasyManua.ls Logo

Hirschmann BAT54-Rail User Manual

Hirschmann BAT54-Rail
548 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
BAT54-Rail/F..
Release
7.54
06/08
Technical Support
HAC-Support@hirschmann.de
User Manual
Configuration
Dualband Industrial Wireless LAN Access Point/Client
BAT54-Rail, BAT54-Rail FCC,
BAT54-F, BAT54-F FCC, BAT54-F X2
BAT54-F X2 FCC

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Hirschmann BAT54-Rail and is the answer not in the manual?

Hirschmann BAT54-Rail Specifications

General IconGeneral
BrandHirschmann
ModelBAT54-Rail
CategoryWireless Access Point
LanguageEnglish

Summary

1 Preface

2 System design

2.1 Introduction

Provides an abstract overview of BAT interfaces and LCOS modules, explaining data flow and consequences.

3 Wireless LAN – WLAN

3.1 What is a Wireless LAN?

Explains the technology of wireless networks, applications, and capabilities of BAT Access Points and WLAN Routers.

3.2 Development of WLAN security

Discusses the evolution of WLAN security standards like WPA and 802.11i, and basic security concepts.

3.3 Protecting the wireless network

Details steps to secure a wireless network, including closed network functions, SSID, MAC addresses, and encryption.

3.4 Configuration of WLAN parameters

Covers settings for physical WLAN interface, logical wireless networks, and general network operation parameters.

3.5 Extended WLAN protocol filters

Explains how to influence protocol handling during WLAN to LAN transfer using rules and actions.

4 Configuration and management

4.1 Configuration tools and approaches

Describes the methods and access methods (LAN, WAN, serial, ISDN) for configuring BAT devices.

4.2 Configuration software

Details available configuration software like LANconfig, WEBconfig, SNMP, Telnet, and TFTP.

4.3 Searching and configuring devices

Explains how to find and configure devices, including hints for serial interface usage and hardware handshake.

4.4 Configuration using different tools

Covers configuration via serial interface, ISDN, and specific tools like LANconfig, WEBconfig, Telnet, TFTP, and SNMP.

4.5 Working with configuration files

Explains saving, reloading, generating, and editing configuration files for device setup and management.

5 LANtools network management

5.1 Switch UI language

Describes how to set the graphical user interface language for LANconfig, LANmonitor, or WLANmonitor.

5.2 Project management with LANconfig

Explains managing multiple devices, configurations, firmware updates, and scripts within LANconfig.

5.3 Scripting

Details the scripting function for automatic execution of configuration tasks, including reading, editing, and uploading scripts.

5.4 Group configuration with LANconfig

Covers creating and managing group configurations using partial configuration files and device grouping in LANconfig.

5.5 Rollout Wizard

Explains the Rollout Wizard for on-site adjustment of device configurations by non-experts, using a web browser.

5.6 Display functions in LANmonitor

Describes how LANmonitor provides an overview of monitored devices, including WAN connections, firewall messages, and VPN connections.

5.7 LANmonitor—know what's going on

Details using LANmonitor to view device status, monitor traffic on various interfaces, and access device statistics.

6 Diagnosis

6.1 Trace information—for advanced users

Explains how to use trace outputs to monitor internal processes, negotiate PPP, and trace errors.

6.2 SYSLOG storage in the device

Describes how the SYSLOG module records accesses and stores messages in RAM for diagnosis.

6.3 The ping command

Explains the usage of the ping command in Telnet or terminal connections for network diagnostics.

6.4 Monitoring the switch

Details how to monitor data traffic between ports by setting ports to monitor mode.

6.5 Cable testing

Explains how to test cabling using the built-in cable tester and interpret the results.

7 Security

7.1 Protection for the configuration

Covers protecting the device configuration through password protection, login barring, access verification, and securing ISDN access.

7.2 The security checklist

Provides an overview of important security functions as a checklist to ensure BAT is excellently protected.

8 Firewall

8.1 Threat analysis

Identifies potential sources of danger, intruders' methods, and common aims when accessing a network.

8.2 What is a Firewall?

Defines Firewall components, software, and its role in protecting LANs from Internet threats.

8.3 The BAT Firewall

Details special functions of the BAT Firewall, including data packet inspection, VoIP ports, and rule configurations.

8.4 Intrusion Detection

Explains how the Intrusion Detection System (IDS) recognizes, repels, and logs break-in attempts using various methods.

8.5 Denial of Service

Describes common Denial of Service (DoS) attacks like SYN Flooding, Smurf, LAND, and Ping of Death, along with countermeasures.

9 Quality of Service

9.1 Why QoS?

Explains the objective of Quality of Service (QoS) in transferring data packets safely and with minimal delay, especially for VoIP.

9.2 Which data packets to prefer?

Discusses how to signal the need for preferential data packet treatment using ToS and DiffServ fields.

9.3 The queue concept

Details the use of different queues (Urgent, Secured, Standard) for data packet transmission and reception in LCOS.

9.4 Reducing the packet length

Explains how to manage packet lengths, especially for VoIP, to compensate for long data packets and reduce delays.

9.5 QoS parameters for Voice over IP applications

Covers factors influencing VoIP quality like delay, packet loss, jitter, and how to configure parameters for good speech quality.

9.6 QoS in sending or receiving direction

Explains how to select whether a QoS rule applies to the sending or receiving direction, based on logical or physical connection setup.

9.7 QoS configuration

Details how to evaluate ToS/DiffServ fields and configure minimum/maximum bandwidths using Firewall rules.

9.8 QoS for WLANs (IEEE 802.11e)

Discusses providing Quality of Service for WLAN transfers using 802.11e, including WMM categories and EDCF.

10 Virtual LANs (VLANs)

10.1 What is a Virtual LAN?

Explains Virtual LANs (VLANs) as a solution to manage large LANs, improve bandwidth utilization, and segment traffic.

10.2 This is how a VLAN works

Details how VLANs achieve goals like shielding data traffic and reducing broadcast traffic using frame tagging.

10.3 Configuration of VLANs

Covers defining virtual LANs, assigning names, VLAN IDs, and configuring interfaces for data packet handling.

10.4 Configurable VLAN Protocol ID

Explains setting the Ethernet2 type of VLAN tag as a 16-bit hexadecimal value ('tag value') for provider networks.

10.5 Configurable VLAN IDs

Discusses assigning different VLAN IDs to WLAN users and special VLAN IDs for DSLoL interfaces.

10.6 VLAN tags on layer 2/3 in the Ethernet

Explains how VLAN tags enable QoS control and priority tagging using DSCP fields or TOS precedence.

10.7 VLAN tags for DSL interfaces

Details setting VLAN IDs for DSL remote sites to differentiate logical networks on shared transmission media.

10.8 VLAN Q-in-Q tagging

Describes VLANs compliant with IEEE302.1q for connecting multiple networks and the use of VLAN tags for WAN transmission.

11 Routing and WAN connections

11.1 General information

Overview of WAN connection applications, protocols used, and cooperation with router modules.

11.2 IP routing

Explains IP router functionality, the IP routing table structure, static vs. dynamic routing, and policy-based routing.

11.3 Configuration of remote stations

Details configuring remote stations via peer lists and communication layer settings for DSL, Dial-up, and other interfaces.

11.4 IP masquerading

Explains IP masquerading (NAT/PAT) for hiding internal IP addresses, inverse masquerading, and port translation.

11.5 Demilitarized Zone (DMZ)

Covers setting up a DMZ for offering Internet services securely, including interface assignment and address checks.

11.6 Advanced Routing and Forwarding

Discusses flexible IP network definition and assignment using VLANs, bridge groups, and interface tags.

11.7 Changes in other services

Details configuration of DHCP server, NetBIOS proxy, RIP, and firewall rules for specific local networks.

11.8 Load balancing

Explains combining multiple DSL connections, dynamic load balancing, and static load balancing for improved bandwidth.

11.9 N:N mapping

Covers Network Address Translation (NAT) for coupling networks with identical address ranges and resolving address conflicts.

11.10 Establishing connection with PPP

Explains the Point-to-Point Protocol (PPP), its functions, negotiation phases, and IP address assignment.

11.11 DSL Connection with PPTP

Details configuring PPTP connections, including IP address, port, and remote site parameters.

11.12 Extended connection for flat rates—Keep-alive

Explains the Keep-alive function to ensure continuous connections for flat-rate plans.

11.13 Callback functions

Describes automatic callback via ISDN port, including CBCP and PPP LCP extensions for security and cost savings.

11.14 serial interface

Covers setup for modem operation, system requirements, installation, AT commands, and statistics for serial interfaces.

11.15 Manual definition of the MTU

Explains manually defining the Maximum Transmission Unit (MTU) to optimize data packet size and prevent speed losses.

11.16 WAN RIP

Details configuring WAN RIP table entries for broadcasting routes across the WAN, including RIP types and routing tags.

11.17 The rapid spanning tree protocol

Explains the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) for intelligent path selection and loop prevention.

12 More services

12.1 Automatic IP address administration with DHCP

Covers DHCP server operation, modes, IP address assignment, netmask, broadcast, gateway, and DNS/NBNS settings.

12.2 Vendor Class and User Class Identifier on the DHCP Client

Explains inserting vendor and user class identifiers into DHCP requests for simplified recognition.

12.3 DNS

Details DNS server function, reaction to requests, and DNS forwarding mechanisms for name resolution.

12.4 Accounting

Covers saving connection information, data volume, accounting snapshots, and configuring accounting data collection.

12.5 The SYSLOG module

Explains recording accesses, configuring SYSLOG clients, and aligning internal sources with SYSLOG facilities.

12.6 Time server for the local net

Details configuring time servers (NTP) for synchronizing local network devices and managing daylight-saving time changes.

12.7 Scheduled Events

Covers executing predefined commands at scheduled times using CRON jobs, including email notifications and time-dependent interface settings.

12.8 PPPoE Servers

Explains PPPoE client integration, authentication, firewall rules, and configuring PPPoE server settings.

12.9 RADIUS

Covers RADIUS protocol for authentication, authorization, and accounting, including client, authenticator, and server configurations.

12.10 Extensions to the RADIUS server

Details new authentication methods (PAP, CHAP, MSCHAP, EAP) and RADIUS forwarding configurations.

12.11 RADSEC

Explains RADSEC as an alternative to RADIUS for secure authentication using TLS-encrypted tunnels and X.509 certificates.

13 Appendix

13.1 Error messages in LANmonitor

Lists VPN error messages and general error messages encountered in LANmonitor for troubleshooting.

13.2 SNMP Traps

Provides an overview of MIB2 and Enterprise specific traps, including WLAN traps, for network monitoring.

13.3 Radio channels

Details radio channels and frequency ranges for 2.4 GHz and 5 GHz bands, including regional regulations.

13.4 RFCs supported

Lists supported Internet Engineering Task Force (IETF) Request for Comments (RFC) standards relevant to the device.

13.5 Glossary

Provides definitions for technical terms and acronyms used throughout the manual.

14 Index

Related product manuals