Do you have a question about the Hirschmann BAT54-Rail and is the answer not in the manual?
Brand | Hirschmann |
---|---|
Model | BAT54-Rail |
Category | Wireless Access Point |
Language | English |
Provides an abstract overview of BAT interfaces and LCOS modules, explaining data flow and consequences.
Explains the technology of wireless networks, applications, and capabilities of BAT Access Points and WLAN Routers.
Discusses the evolution of WLAN security standards like WPA and 802.11i, and basic security concepts.
Details steps to secure a wireless network, including closed network functions, SSID, MAC addresses, and encryption.
Covers settings for physical WLAN interface, logical wireless networks, and general network operation parameters.
Explains how to influence protocol handling during WLAN to LAN transfer using rules and actions.
Describes the methods and access methods (LAN, WAN, serial, ISDN) for configuring BAT devices.
Details available configuration software like LANconfig, WEBconfig, SNMP, Telnet, and TFTP.
Explains how to find and configure devices, including hints for serial interface usage and hardware handshake.
Covers configuration via serial interface, ISDN, and specific tools like LANconfig, WEBconfig, Telnet, TFTP, and SNMP.
Explains saving, reloading, generating, and editing configuration files for device setup and management.
Describes how to set the graphical user interface language for LANconfig, LANmonitor, or WLANmonitor.
Explains managing multiple devices, configurations, firmware updates, and scripts within LANconfig.
Details the scripting function for automatic execution of configuration tasks, including reading, editing, and uploading scripts.
Covers creating and managing group configurations using partial configuration files and device grouping in LANconfig.
Explains the Rollout Wizard for on-site adjustment of device configurations by non-experts, using a web browser.
Describes how LANmonitor provides an overview of monitored devices, including WAN connections, firewall messages, and VPN connections.
Details using LANmonitor to view device status, monitor traffic on various interfaces, and access device statistics.
Explains how to use trace outputs to monitor internal processes, negotiate PPP, and trace errors.
Describes how the SYSLOG module records accesses and stores messages in RAM for diagnosis.
Explains the usage of the ping command in Telnet or terminal connections for network diagnostics.
Details how to monitor data traffic between ports by setting ports to monitor mode.
Explains how to test cabling using the built-in cable tester and interpret the results.
Covers protecting the device configuration through password protection, login barring, access verification, and securing ISDN access.
Provides an overview of important security functions as a checklist to ensure BAT is excellently protected.
Identifies potential sources of danger, intruders' methods, and common aims when accessing a network.
Defines Firewall components, software, and its role in protecting LANs from Internet threats.
Details special functions of the BAT Firewall, including data packet inspection, VoIP ports, and rule configurations.
Explains how the Intrusion Detection System (IDS) recognizes, repels, and logs break-in attempts using various methods.
Describes common Denial of Service (DoS) attacks like SYN Flooding, Smurf, LAND, and Ping of Death, along with countermeasures.
Explains the objective of Quality of Service (QoS) in transferring data packets safely and with minimal delay, especially for VoIP.
Discusses how to signal the need for preferential data packet treatment using ToS and DiffServ fields.
Details the use of different queues (Urgent, Secured, Standard) for data packet transmission and reception in LCOS.
Explains how to manage packet lengths, especially for VoIP, to compensate for long data packets and reduce delays.
Covers factors influencing VoIP quality like delay, packet loss, jitter, and how to configure parameters for good speech quality.
Explains how to select whether a QoS rule applies to the sending or receiving direction, based on logical or physical connection setup.
Details how to evaluate ToS/DiffServ fields and configure minimum/maximum bandwidths using Firewall rules.
Discusses providing Quality of Service for WLAN transfers using 802.11e, including WMM categories and EDCF.
Explains Virtual LANs (VLANs) as a solution to manage large LANs, improve bandwidth utilization, and segment traffic.
Details how VLANs achieve goals like shielding data traffic and reducing broadcast traffic using frame tagging.
Covers defining virtual LANs, assigning names, VLAN IDs, and configuring interfaces for data packet handling.
Explains setting the Ethernet2 type of VLAN tag as a 16-bit hexadecimal value ('tag value') for provider networks.
Discusses assigning different VLAN IDs to WLAN users and special VLAN IDs for DSLoL interfaces.
Explains how VLAN tags enable QoS control and priority tagging using DSCP fields or TOS precedence.
Details setting VLAN IDs for DSL remote sites to differentiate logical networks on shared transmission media.
Describes VLANs compliant with IEEE302.1q for connecting multiple networks and the use of VLAN tags for WAN transmission.
Overview of WAN connection applications, protocols used, and cooperation with router modules.
Explains IP router functionality, the IP routing table structure, static vs. dynamic routing, and policy-based routing.
Details configuring remote stations via peer lists and communication layer settings for DSL, Dial-up, and other interfaces.
Explains IP masquerading (NAT/PAT) for hiding internal IP addresses, inverse masquerading, and port translation.
Covers setting up a DMZ for offering Internet services securely, including interface assignment and address checks.
Discusses flexible IP network definition and assignment using VLANs, bridge groups, and interface tags.
Details configuration of DHCP server, NetBIOS proxy, RIP, and firewall rules for specific local networks.
Explains combining multiple DSL connections, dynamic load balancing, and static load balancing for improved bandwidth.
Covers Network Address Translation (NAT) for coupling networks with identical address ranges and resolving address conflicts.
Explains the Point-to-Point Protocol (PPP), its functions, negotiation phases, and IP address assignment.
Details configuring PPTP connections, including IP address, port, and remote site parameters.
Explains the Keep-alive function to ensure continuous connections for flat-rate plans.
Describes automatic callback via ISDN port, including CBCP and PPP LCP extensions for security and cost savings.
Covers setup for modem operation, system requirements, installation, AT commands, and statistics for serial interfaces.
Explains manually defining the Maximum Transmission Unit (MTU) to optimize data packet size and prevent speed losses.
Details configuring WAN RIP table entries for broadcasting routes across the WAN, including RIP types and routing tags.
Explains the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) for intelligent path selection and loop prevention.
Covers DHCP server operation, modes, IP address assignment, netmask, broadcast, gateway, and DNS/NBNS settings.
Explains inserting vendor and user class identifiers into DHCP requests for simplified recognition.
Details DNS server function, reaction to requests, and DNS forwarding mechanisms for name resolution.
Covers saving connection information, data volume, accounting snapshots, and configuring accounting data collection.
Explains recording accesses, configuring SYSLOG clients, and aligning internal sources with SYSLOG facilities.
Details configuring time servers (NTP) for synchronizing local network devices and managing daylight-saving time changes.
Covers executing predefined commands at scheduled times using CRON jobs, including email notifications and time-dependent interface settings.
Explains PPPoE client integration, authentication, firewall rules, and configuring PPPoE server settings.
Covers RADIUS protocol for authentication, authorization, and accounting, including client, authenticator, and server configurations.
Details new authentication methods (PAP, CHAP, MSCHAP, EAP) and RADIUS forwarding configurations.
Explains RADSEC as an alternative to RADIUS for secure authentication using TLS-encrypted tunnels and X.509 certificates.
Lists VPN error messages and general error messages encountered in LANmonitor for troubleshooting.
Provides an overview of MIB2 and Enterprise specific traps, including WLAN traps, for network monitoring.
Details radio channels and frequency ranges for 2.4 GHz and 5 GHz bands, including regional regulations.
Lists supported Internet Engineering Task Force (IETF) Request for Comments (RFC) standards relevant to the device.
Provides definitions for technical terms and acronyms used throughout the manual.