Compatible Systems 2 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Compatible Systems 2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Compatible Systems 2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Compatible Systems 2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Compatible Systems 2 should contain:
- informations concerning technical data of Compatible Systems 2
- name of the manufacturer and a year of construction of the Compatible Systems 2 item
- rules of operation, control and maintenance of the Compatible Systems 2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Compatible Systems 2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Compatible Systems 2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Compatible Systems service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Compatible Systems 2.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Compatible Systems 2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    IntraPort 2 and Intr aPort 2+ VPN Access Server Administrator ’ s Guide Compatib le Syst ems Corpor ation 4730 W al n ut S treet Suite 1 02 Boulde r , Colorado 803 01 303- 444- 9532 800- 356- 0283 http://www .comp atible.com[...]

  • Page 2

    IntraPort 2 and In traPort 2+ VPN Access Server Administrator’ s Guid e, Ve r s i o n 1 . 5 Copyri ght © 1999, C ompatible Systems C orporation All rights reserved. IntraPort, RISC Rou ter, Micro Router and Comp ati- V iew are trademarks of Compatible System s Corporation. Other trade- marks are the pro perty of their respective holders. Copyri [...]

  • Page 3

    i Chapter 1 - Introduction 1 A BOU T THE I NTRA P ORT 2/2+ VPN A CCESS S ERV ER 1 A N OTE A BOUT R EMOTE C LIENT C ONNEC TIONS 1 I NTRA P ORT 2/2+ VPN A CC ESS S ERVER I NSTA LLATI ON O VERVI EW 1 Chapter 2 - Getting Started 5 A F EW N OTES 5 Please Read t he Manuals 5 Warranty and Service 5 Getting Help with the IntraPort 2/2+ VPN Ac cess Server 5[...]

  • Page 4

    ii Chapter 6 - Basic Configuration Gu id e 19 S ETUP O PTIONS 19 Diagra m of Dual- Ether net Setup 20 Diagra m of Sing le-Eth erne t Set up 21 C ONFIGURATION U SING C OMPATI V IEW 22 VPN Client Tunnel S ettings 22 C ONFIGURING THE S ERVER FOR LAN- TO -LAN T UNN ELS 37 B ASIC C ONFIGURATION U SING C OM MAND L INE 41 VPN Client Tunnel S ettings 41 C [...]

  • Page 5

    iii Appendix B - Connector and Cable Pin Outs 58 Pin Outs fo r DB-25 Ma le to DB-25 Female RS-23 2 Data & Consol e Cable 58 Appendix C - Securi ty Dynamics ACE/Server Information 59 Appendix D - LE D P a tte rns and Test Swi tc h Se tting s 61 IntraPort 2 /2+ VPN Access Servers LED Pattern s 61 Ethernet Back Panel Indica tors LEDs 61 Front Pane[...]

  • Page 6

    iv[...]

  • Page 7

    Cha pter 1 - I n tr odu ctio n 1 Chapter 1 - Introduction About the IntraPort 2/2+ VPN Access Server Congratul ations on y our purchas e of the Intr aPort 2 or I ntraPort 2+ VPN Access Server. These VPN Access Servers pro vide secure Internet-based remo te access and site-to-site connections . The IntraPort 2 will support up to 16 simultaneous LAN-[...]

  • Page 8

    2 Cha pter 1 - In tr odu ctio n In shor t, the installation steps are: 1. Install the IntraPo rt 2 or I ntraPort 2+ har dware on your Ethernet LAN and connect one or both of the 10/100 twisted-pair Ethernet interfaces to a Fast Ethernet or Ethernet h ub. 2. Select the management tool you wish to use with the server . If you want to use the CompatiV[...]

  • Page 9

    Cha pter 1 - I n tr odu ctio n 3 Alternate Protocols an d Security Parameters This part of the manual lists configuratio n parameters that must be set in order to use the In traP ort 2/2+ VP N Access Serv er with pro tocol s other than TCP/IP , and when u sing additional security p arameters such as SecurID and RADIUS. Appendices Additional informa[...]

  • Page 10

    .[...]

  • Page 11

    Chapter 2 - Getting St arted 5 Chapter 2 - Getting Started A Few Notes Please Read the Manuals The manuals included with your IntraPort 2/2+ VPN Access Server contain v ery importan t information about the pr oduct and V irtual Private Netwo rking in gener al. Please read this manual thor oug hly , and refer to the management refer ence guides as r[...]

  • Page 12

    6 Chapter 2 - Getting St arted questions via e-mail to s upport@compa tible.com. Compatible Systems ’ phone number is listed on the front of this g uide. W e will be happy to help yo u. What You Will Ne ed To Ge t Started Before installing the IntraPort 2/2+ VPN Acces s Server , please check the list below to make sure that you have received all [...]

  • Page 13

    Chapter 2 - Getting St arted 7 Ethernet Conne ction Requirements The server ’ s Ethernet interfaces di rectly support full or half duplex 100BaseTx or 10BaseT twisted-p air Ethernet. T o conn ect the server ’ s Ethernet interfaces to twisted-pair Eth ernet cabling, you will need an unshielded twisted-p air station cable that is connected to a 1[...]

  • Page 14

    .[...]

  • Page 15

    Chapter 3 - Network Installatio n 9 Chapter 3 - Network Installation Figure 1. IntraPor t 2/2+ VP N Acces s Server Back Pa nel This secti on of the manu al describes ho w to connect the IntraPort 2/2+ VPN Access Server to your Ethernet network. In summary , the steps for installation are: 1. Make sure the server is powered down an d not connected t[...]

  • Page 16

    10 Chapter 3 - Network Installation The other op tion is to set up the server behind your Internet access router/firewall using Ethernet 0 only . In this scenario, Ethernet 1 is not used and shou ld not be plugged in to anyth ing. Y ou w ill also have to set up your firewall to allow IPSec traffic through (see the section on setting u p an IP Gatew[...]

  • Page 17

    Chapter 4 - CompatiVie w Software Installation 11 Chapter 4 - CompatiView Software Installation All of the products in the Com pat ible S ystems networking fam ily , including all IntraPor t servers, RISC Router and MicroRouter models, can be managed from a single m anagement plat form called CompatiV iew . CompatiV iew is included on the CD-ROM wh[...]

  • Page 18

    v Note: T o choo se t h e acti ve t rans po rt pr ot ocol o n a W indows mach ine which has both IPX and IP insta lled, s elect “Options” from the Databas e menu and cli ck the Genera l tab. Th en select the ap pr o- priate r adio bu tton under “T r ansport.” Installati on and Operation The W indo ws versio n of the Compat iV iew program ca[...]

  • Page 19

    Chapter 4 - CompatiVie w Software Installation 13 two mos t common IPX f rame types upon start up (802.2 and 802.3 (raw)). If C ompatiV iew has the IPX/SPX protocol selected as its trans- port, it will be necessary to either powerup the server before powering up the workstation, or rebo ot the wo rkstation after the server has completed its boot se[...]

  • Page 20

    .[...]

  • Page 21

    Chapter 5 - Comm and Line Management 15 Chapter 5 - Command Line Management The command line interface allows you to configure and mon itor the server in-b and via T elnet or out-of-band with a term inal connected to the server ’ s Console interface. v Note: Pr oper syntax is vita l to effective operation of command line mana gem e nt. Ca se is n[...]

  • Page 22

    Temporaril y Reconfig uring a Host for Co mmand Lin e Manage ment Y o u can temporarily reconf igure an IP host in order to s et the server ’ s IP parameters to allow in-band T elnet access. If you wish to set the server ’ s basic IP parameters in this fashion, the host must be o n the same Ethernet segment as the IntraPort ’ s s erve r ’ s[...]

  • Page 23

    Chapter 5 - Comm and Line Management 17 command line interf ace, do the following: A. Use th e config ur e command and set the IP Addr es s , Sub- netMask , and IPBroa dcast keyw ords in the IP Ethernet 0 s ection. B. Use the save co mmand to save the changes to the dev ice ’ s Flash ROM. • Y o u may also us e CompatiV iew from a reconf igured [...]

  • Page 24

    .[...]

  • Page 25

    Chapter 6 - Basic Configurat ion Guide 19 Chapter 6 - Basic Configuration Guide This chapter prov ides a step-by-step ou tline of the minimum required parameters which must be co nfigured int o the device for proper opera- tion. Detailed information on the meaning of the server ’ s param e ter s is pro v ide d i n the CompatiV iew Management Soft[...]

  • Page 26

    20 Chapter 6 - Basic Configuration Guid e Diagram of Dua l-Ethernet Setup Figure 2. Diagram of Dual-Eth er net Set up[...]

  • Page 27

    Chapter 6 - Basic Configurat ion Guide 21 Diagram of Sing le -Et hernet Setu p Figure 3. D iagram o f Single E thernet S etup[...]

  • Page 28

    22 Chapter 6 - Basic Configuration Guid e Configuration Using CompatiView This section provides a list of parameter s th at m us t be entere d into a server for proper operati on using CompatiV iew , Co mpatible Systems ’ management software. If you wish to use the command line interface to configure the server , see the next section in th is cha[...]

  • Page 29

    Chapter 6 - Basic Configurat ion Guide 23 2. Set basic IP parameter s for Ethernet 0. Du al Eth ernet Singl e Ethernet TCP/IP Rou ting: Ether net 0 To access this dialog box, select TCP/IP Routing under Ethernet 0 in the Device View. A. Click the IP Routing radio butt on. B. Enter the internal TCP/IP address you have assi gned the IntraPort 2 /2+. [...]

  • Page 30

    24 Chapter 6 - Basic Configuration Guid e 3. (Dual Ethernet ) Set basic IP paramet ers for Ethernet 1. TCP/IP Rou ting: Ether net 1 T o access this dialog box, s elect TCP/IP Routing under Ether net 1 in the Device V iew . A. Click the IP On radio but ton. B. Enter the external TCP/IP add ress you have assigned the IntraPort 2/2+. This address must[...]

  • Page 31

    Chapter 6 - Basic Configurat ion Guide 25 4. Set an IP Gateway for Et hernet 0. IP Stati c Routes T o access the IP St atic Routes dialog box, select IP S tatic Routes under Global in the Device V iew . A. Click the Add... butt on. The S tatic Route dialog box w ill appear: Dual Et hernet St atic R oute S ingle E thernet St atic Route B. Clic k the[...]

  • Page 32

    26 Chapter 6 - Basic Configuration Guid e Leave all other parameters at their defaul t settings for basic configurat ion, or refer to the CompatiV iew Management Soft- w a re Re f e re n c e G u i d e for more advanced configuration s et- tings. v Note: For si ngle Ethernet setups, you mus t config ur e the fir ewall to allow : • UDP port 500 (IS[...]

  • Page 33

    Chapter 6 - Basic Configurat ion Guide 27 5. Set an IPSec Gateway. IPSec Gate way T o access this dialog box, s elect IPSec Gateway under Global in the Device V iew . A. For dual Ethernet setups, the IPSec Gateway is the equ ivalent of a default gateway for the IPSec interface (Ethernet 1). Enter the TCP/IP address of the u pstream or Internet ro u[...]

  • Page 34

    28 Chapter 6 - Basic Configuration Guid e 6. Set an IKE Policy. There are two ph ases to the IKE negotiation. During Phase 1 negotia- tion, the IntraPort and C lient must authenticate each o ther . Th e IKE Policy di alog box cont rols t his P hase 1 n e go tiati on . P hase 2 negotiatio n involves t he setup of an individu al tunnel conn ection an[...]

  • Page 35

    Chapter 6 - Basic Configurat ion Guide 29 7. Set up VPN Group Configur ations. VPN Group Configu ration: G eneral T ab T o access this dialog box, s elect VPN Group Configuration in the Device V iew . A. Cli ck on the New ... butt on. B. Enter a New VPN Group Config Name (e.g. Sales, Account- ing, etc.) in the pop-up box. C. Cli ck OK . Y ou are no[...]

  • Page 36

    30 Chapter 6 - Basic Configuration Guid e without receiving any traf fic from a client belonging to this VP N Group Confi guration w ithout ending the tunnel sessio n. • Set the Minimu m Clien t V ersion or keep the de fault value. This places a limit on the VPN Client Software ver- sion numb er which wi ll be allowed to connect. Leave all other [...]

  • Page 37

    Chapter 6 - Basic Configurat ion Guide 31 IKE Conf igurat ion Transform List The default settings of MD5 for Authentication and DES for Encryption are adequate for mos t setups. Click OK . • In the IKE Key Manag ement d ialo g bo x, yo u may click on the PFS checkbox to add additional security param e ter s durin g tunnel sessions. (This is optio[...]

  • Page 38

    32 Chapter 6 - Basic Configuration Guid e Dual Ethe rnet VPN Group C onfiguration : IP Con nection T ab Single Ethernet VPN Gro up Configu ration: IP Connecti on T ab F . On the IP Conn ection T ab: • Enter the St a r t I P A d d r e s s . This specifies the first IP address to be assigned to clien t sessions under this co nfig- uration. This add[...]

  • Page 39

    Chapter 6 - Basic Configurat ion Guide 33 same network as Eth ernet 0 or a subinterf ace thereof). Also, they cannot conflict with thos e used for any other VPN Groups. v Note: For lar ge numbers of user s (i.e., over 50), it ’ s r ecommended that the block of addr esses be specified as a Loca l IP Net becaus e addr ess a dministr ation is ea sie[...]

  • Page 40

    34 Chapter 6 - Basic Configuration Guid e VPN G roup Confi guration : IPX Connection T ab H. If you will be tunneling IPX traffic, click the IPX Connection Ta b . • Enter an IPX network number in t he S tart IPX Network edit box. This IPX network number is the first IPX address assi gned to an incoming Cl ient tunnel session. The S ta rt IPX Netw[...]

  • Page 41

    Chapter 6 - Basic Configurat ion Guide 35 8. Set up VPN Users. If you are using a RADIUS server for user authen tication, you will need to set up VPN users on that se rver . If not, then yo u mu st enter each user into the VPN User database. B ear in mind that the values for each user must be identical in the VPN Client con figuration on the remote[...]

  • Page 42

    36 Chapter 6 - Basic Configuration Guid e sent. This secret is used for VPN us ing IKE Key Manag ement. The same secret mus t also be entered into the VPN Client for the tunnel sessio n to be successful. v Note: STEP/ST AMP is Compatible System ’ s pr oprietary tunn el nego- tiation pr otocol . It can be us ed to allow connections f r om users ru[...]

  • Page 43

    Chapter 6 - Basic Configurat ion Guide 37 Configu ring the S erve r for LAN-to -LAN Tunne ls This section configures VPN tu nnel parameters and defi nes a virtual por t for LAN-to-LAN tunn el traffic. It assumes that you have already assigned IP addr esses to the Ethernet in terface(s), and set up static routes, as shown in VPN Client Tunnel Settin[...]

  • Page 44

    38 Chapter 6 - Basic Configuration Guid e C. I f you a re us ing both E thern et po rts, t hen the Bin d T o interface should be set to Ethernet 1. For si ngle Ethernet setups, it should be Ethern et 0. This specifies which interf ace on this device will act as the end point for the tunnels defin ed by this configuration. Packets sent fr om th is d[...]

  • Page 45

    Chapter 6 - Basic Configurat ion Guide 39 will only initiate tu nnel establish ment atte mpts and w ill not resp on d to t h em. If Respond is selected, this T unnel Partner will use IKE, but will only re spond to tun nel establishmen t attempts and wi ll not initiate them. B. Enter the Shared K ey . This is a shared alphanumeric secret that is us [...]

  • Page 46

    40 Chapter 6 - Basic Configuration Guid e 4. Save the configu ration to a file and download to th e device. A. From the File menu choose Save T o > File. This will bring up a file sav e dialog box . Name the device configuration fi le, making su re that yo u asso ciate the file nam e with the Intr aPort 2/2+ and can find the file later . B. From[...]

  • Page 47

    Chapter 6 - Basic Configurat ion Guide 41 Basic Configuration Using Co mmand Line This section briefly discus ses th e major parameters that must be s e t in order to use the IntraPort 2/2+ VPN Access Server u sing co mmand line management or text-based co nfiguration , either out-o f-band (t hrough the server ’ s Consol e interface) or in-band t[...]

  • Page 48

    42 Chapter 6 - Basic Configuration Guid e 2. Set basic IP parameter s for Ethernet 0. This will be the internal TCP/IP address ing inform ation you have assigned to the I ntraPort 2/2+ Use configure and set the IP A ddress , SubnetMas k , and IPBroadc ast keyword s in the IP Ethernet 0 section. Dual Ethernet Setup Example config IP Ethernet 0 [ IP [...]

  • Page 49

    Chapter 6 - Basic Configurat ion Guide 43 4. Set an IP Gateway for Et hernet 0. For dual Ethernet setu ps, this is th e internal T CP/I P addr ess of your firewa ll or proxy , whichever is applicable . For single Eth ernet setups , this is the interna l TCP/IP address of your upstream In ternet access/firewalling router . In either case, this addre[...]

  • Page 50

    44 Chapter 6 - Basic Configuration Guid e 5. Set an IPSec Gateway. For dual Ethernet setup s, the IPSec Gateway is the equivalent of a default gateway for the IPSec interface (Ethernet 1). Enter the TCP/IP address of the upst ream or Intern et router for your netw ork. This must be an addres s on the same TC P/IP network as the Ethern et 1 address [...]

  • Page 51

    Chapter 6 - Basic Configurat ion Guide 45 7. Set up VPN Group Configur ations. This is w here tunnelin g profiles for a group of one or more I ntraPort 2/2+ u ser s a re de f ine d. Use configure VPN Group Name to create a VPN Group section and set the following keywo rds in the section you just created: BindT o -Specifies which interface on the de[...]

  • Page 52

    46 Chapter 6 - Basic Configuration Guid e Ethernet example, 1 92.168.233.0/2 4), all traff ic from a client going to the internal network will b e tunneled through the IntraPort 2/2+. This is the most common configuration . There can be multiple entries, inclu ding individual addresses (i.e. host s). As a special case, the entry 0 .0.0.0/0 will sen[...]

  • Page 53

    Chapter 6 - Basic Configurat ion Guide 47 8. Set up VPN Users. Users are added to the configuration by entering a few unique parame- ters, and each is assigned to a VPN Group Configu ration, co nfigu red in the previous step. Use edit config to s et th e pa ram eter s in the VP N Use r s section. All values are case sensitive. Examp le Edit [ VPN U[...]

  • Page 54

    48 Chapter 6 - Basic Configuration Guid e Configu ring the S erve r for LAN-to -LAN Tunne ls This section configures VPN tu nnel parameters and defi nes a virtual por t for LAN-to-LAN tunn el traffic. It assumes that you have already assigned IP addr esses to the Ethernet in terface(s), and set up static routes, as shown in VPN Client Tunnel Settin[...]

  • Page 55

    Chapter 6 - Basic Configurat ion Guide 49 If Ma nual is specified, this T unnel Partner will not use IKE, and the tu nnel ’ s encr yption and authentication par ameters must be manually set i n the Manual Key Management dialog box, which is not desc ribed here. v Note: For mor e informat ion r egar ding non-IKE encryp tion and authentication, ref[...]

  • Page 56

    50 Chapter 7 - Alternate Protocols an d Security Parameters Chapter 7 - Alternate Protocols and Security Parameters This chapter briefly discusses the configuratio n of th e Intr aPo rt 2/2+ VPN Access Server for App leT alk and IPX, and with RADIUS and SecurID authentication server s. Detailed information on configurin g the server to work with th[...]

  • Page 57

    Chapter 7 - Alternate P rotocols and Security Pa rameters 51 AppleTalk Protoco l Required for AppleTalk Generally , there ar e no required ch anges from th e shipping Et hernet configuration for AppleT alk. The Ethernet interface will autoconfig ure to use AppleT alk Phase 2, and will adapt to conditions on the Ethernet. Suggested for AppleTalk Y o[...]

  • Page 58

    52 Chapter 7 - Alternate Protocols an d Security Parameters RADIUS Server User Authe ntication Settings In order f or client authentication and accounting to be done on a RADIUS server , the RADIUS server must be configured with fo ur pieces of data for each user . • User name • Login p assword • Group conf igurat i on • T unnel secret The [...]

  • Page 59

    Chapter 7 - Alternate P rotocols and Security Pa rameters 53 attribute setting s will r equire that you enter users in the Users text file. See the user manual for your server for mor e information on exporting, editing and importin g the Users text file. In addition to the RADIUS server settings, the user name, login pass- word and tunnel secret m[...]

  • Page 60

    54 Chapter 7 - Alternate Protocols an d Security Parameters Setti ng the Int raP o r t for an ACE/S erver Just a few basic s ettings are required fo r the IntraPort to com municate with an ACE/Server . • SecurID on • Encryption method • ACE/Server IP address • Enable SecurI D for a gr oup of IntraP ort users CV : Use the SecurID Configurati[...]

  • Page 61

    Chapter 7 - Alternate P rotocols and Security Pa rameters 55 Saving a Configuration File to Flash ROM Once a configur ation is complete, you can save it to the router ’ s Fl a s h ROM. Until saved, all change s are made in a separa te buf fer and the serve r ’ s interfaces co ntinue to run as befo re the changes were mad e. CV : Use the Save to[...]

  • Page 62

    .[...]

  • Page 63

    Appendix A - Shipp ing Defaults 57 Appendix A - Shipping Defaults Ethernet Interfaces Default Pass word • letmein IP Defaults • Ether net 0 is on • Addr ess : 19 8.4 1.12 .1 • Subnet mas k: 255.255 .255.0 • Broadcast ad dress: 198 .41.12.255 • Mode: Ro uted • Ether ne t 1 i s off IPX Defa ults • Ether net 0 is on • Mode: Rout ed ?[...]

  • Page 64

    58 Appendix B - Connector and Cable Pin Outs Appendix B - Connector and Cable Pin Outs Pin Outs for DB-25 Male to DB-25 Female RS-232 Data & Console Cable The cable supplied with the IntraPor t 2/2+ VPN Access Server is 25 conduct ors connected st raight through . Connectio ns on the Co nsole interface follow the s tandard RS-232 pin outs.[...]

  • Page 65

    Appendix C - Security Dynamics ACE/Server Infor mation 59 Appendix C - Security Dynamics ACE/Server Information ACE/Server s oftware and SecurID tokens can be purchas ed directly from Security Dyn amics T echnologies, Inc. Use the fo llowing informa- tion to contact Security Dynamics fo r more information: Security Dynamics T echnologies, Inc. 20 C[...]

  • Page 66

    .[...]

  • Page 67

    Appendix D - LED Patterns an d Test Switch Settings 61 Appendix D - LED Patterns and Test Switch Settings IntraPort 2/2+ VPN Ac cess Server s LED Patterns Ethernet Back Panel Indicators LEDs The IntraPort 2 a nd IntraPort 2+ VPN Access Servers f eature two pairs of lights on the b ack panel to indicate the hardware status of the two Ether net po rt[...]

  • Page 68

    62 Appendix D - LED Patterns and Test Switch Settings IntraPort 2 Connections/Users LEDs IntraPort 2+ Connections/Users LEDs Connections/Users LED User Range 11 - 5 66 - 1 1 12 12 - 17 18 18 - 23 24 24 - 29 30 30 - 35 36 36 - 41 42 42 - 47 48 48 - 53 54 54 - 64 Connections/Users LED User Range 11 - 1 9 20 20 - 39 40 40 - 59 60 60 - 79 80 80 - 99 10[...]

  • Page 69

    Appendix D - LED Patterns an d Test Switch Settings 63 IntraPort 2 Special Indicators IntraPort 2+ Special Indica tors IntraPort 2/2+ VPN Ac cess Server Switch Settings v Note: Settings marked with an a sterisk may era se your Flash R OM. Please do not u se these settings wi thout first cont acting Com patible Systems T echnical Support. Ethernet L[...]

  • Page 70

    .[...]

  • Page 71

    Appendix E - Downloading Software From Compatible Systems 65 Appendix E - Downloading Software From Compatible Systems The latest versions of operating sof twar e for all Compatib le Systems products are available at our W eb site. The latest ver sion of CompatiV iew management s oftware is als o available. T o downl oad so ftware, follow the instr[...]

  • Page 72

    .[...]

  • Page 73

    Appendix F - T erms and Conditions 67 Appendix F - Terms and Condition s Compatible S ys tem s Corporation (Com patible Systems) offers to sell only on the condition that Cu sto mer ’ s acceptance is expres sly limited to Compat- ible Systems ’ terms and condit ions of sale. Com patible Systems ’ acceptance of any or der from Customer is expr[...]

  • Page 74

    THE W ARRANTIES SET FOR TH IN THESE TERMS AND CONDI- TIONS ARE IN LIE U OF ALL OTHER W ARRANTIES, EXPRESSED OR IMPLIED. WITHOUT LIMIT A TION ON THE GENERALITY OF THE FOREGOING SENTENCE, COMP A TIBLE SYSTEMS EXPRESSL Y DISCLAIMS AND EXCLUDES ALL IMPLIED W ARRANTIES OF MERCHANTIBILITY AND OF FITNESS (GENERALL Y OR FOR A P AR TICULAR PURPOSE). 2. Ship[...]

  • Page 75

    Appendix F - T erms and Conditions 69 appropriate, of the s ubsequent purchaser). I N NO EVENT SHALL COM- P A TIBLE SYSTEMS BE LIABLE FOR ANY SPECIAL, CONSEQUEN- TIAL, OR INCIDENT AL DAMAGES ARISING OUT OF THE SALE, USE, INST ALLA TION OR OPERA TION OF THE PRODUCTS, WHETHER A CLAIM IS BASED ON STRICT LIABILITY , BREACH OF W ARRANTY , NEGLIGENCE, OR[...]