IBM WRT-410 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of IBM WRT-410, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of IBM WRT-410 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of IBM WRT-410. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of IBM WRT-410 should contain:
- informations concerning technical data of IBM WRT-410
- name of the manufacturer and a year of construction of the IBM WRT-410 item
- rules of operation, control and maintenance of the IBM WRT-410 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of IBM WRT-410 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of IBM WRT-410, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the IBM service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of IBM WRT-410.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the IBM WRT-410 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    80 2 .11g W ir e les s Broadband Router WRT-410 User ’ s Manual[...]

  • Page 2

    Co p y right Copyright  2003 by PLANE T T echnology Corp . A ll righ t s r eserved . No par t of t his publication ma y be reproduced, t r ansmit t ed, t r anscribed, s t ored in a ret r ieval system, or translated into any language or compu t er language , in any form or by any means , electronic, mechanical , magne t ic, optical , chemical, ma[...]

  • Page 3

    Federal Communication Commissio n (FCC) Radiation Exposure Statement This equipment complies w ith FCC radia t ion e x posure set f orth for an uncontrolled envi r onment. In orde r to avoid the possibility of e x ceeding the FCC r adio f r equency e x posure limi t s , human p r o x imity to the an t enna shall not be less than 20 cm(8 inches) dur[...]

  • Page 4

    T A BLE OF CONTENTS C H A P T ER 1 IN T RODUC T I O N ................................................................................................. .1 1.1 P ACKAGE C ON T ENTS ........................................................................................................ .1 1.2 S YSTEM R EQUIREME N TS ..................................[...]

  • Page 5

    3.5. 5 Fire w all R u l e .......................................................................................................... . 25 3.6 M ANAGEMENT ................................................................................................................ . 26 3.6. 1 S N M P ...............................................................[...]

  • Page 6

    - 1 - Chapter 1 I ntroduction Thank you f or purchasing W R T -410. This device features the latest innovation w ireless technology making the w ireless net w orking w orld happened . This manual guides you on ho w to ins t all and properl y use t he W R T -410 in order to t ake full advan t age of i t s features. 1.1 Package Con t ents M ake sure [...]

  • Page 7

    - 2 - 1.4 Speci f ica t ion S t a n dards IEEE 8 02 . 11b , IEEE 8 0 2. 1 1g Si g n a l T y pe DSSS ( D irect Seq u ence S p read Spectru m ) Mod u la t i o n BPSK / QPSK / C C K / OF D M Port W A N: 10/1 0 0Base- T X (RJ-45) * 1 LAN: 10 / 10 0 Base- T X (RJ- 4 5) * 4 Ant e nna One Detacha b le D i p ole An t enna Ant e nn a Gain 2dBi Output P o we[...]

  • Page 8

    - 3 - 1.5 W ireles s P e rf o rmance The follo w ing info r ma t ion w ill help you utilizing t he w ireless performance, and opera t ing co v erage of W R T -410. 1. Site se l ection T o avoid interfe r ences , please locate W R T -410 and w ireless clien t s a w ay from trans f orme r s, mic r o w ave ovens, heavy-duty moto r s, refrigerato r s, [...]

  • Page 9

    - 4 - Chapter 2 H ard w a re Installation Before you p r oceed w ith the ins t allation, it is necessary that you have enough info r ma t ion about the W R T -410. 2.1 H a r d w a re Connection 1. Locate an opt i mum loca t ion for the WR T - 410. T h e be s t place fo r your W R T -410 is usually a t the cente r of your w ireless ne tw ork, w ith [...]

  • Page 10

    - 5 - Chapter 3 C onf i gure through Web Br o w ser W eb configura t ion provides a user-f r iendly graphical user in t erface ( w eb pages ) to manage you r W R T -410. A W R T -410 w ith an assigned I P add r ess w ill allo w s you to monitor and configure via w eb bro w ser (e.g. , M S Internet E x plorer o r Ne t scape). 1. Open your w eb bro w[...]

  • Page 11

    - 6 - This page enables you to se t LAN and DHCP properties, such as the host name , IP address, subne t mask, and domain name. L A N and DHCP profiles are lis t ed in the DHCP table a t the bottom o f the screen. Host Name: Type the host name in the te x t bo x . The host name is r equired by some ISP s. The defaul t host name is "AP-Router .[...]

  • Page 12

    - 7 - M A C A ddress: If required b y your ISP , type the M AC address fo r the W RT-410 W A N in t erface in this field. Y ou can also copy the MAC address of your PC ’ s ne tw ork card to t he W RT - 410 W A N inter f ace b y clicking “ Clone M AC address ” . W hen using PPPoE, en t er the follo w ing info r mation in t he fields ( some in [...]

  • Page 13

    - 8 - W hen using PPT P , enter the f ollo w ing info r ma t ion in t he f ields (some information are pro v ided by your ISP): IP A ddress: Type the IP add r ess w hich your ISP provides . Subnet Mask: Type the Subnet M ask w hich your ISP provides. Gate wa y: Type the IP address of Ga t e w ay w hich your ISP provides. Server IP: Type the IP addr[...]

  • Page 14

    - 9 - A dministrator: Type the pass w ord the Administrato r w ill use to login to the sys t em . The pass w ord mus t be typed again for confi r ma t ion. User: Users can type a pass w ord t o be used fo r logging in t o the system. The pass w ord mus t be typed again for con f irmation. 3.1.4 T ime This screen enables you to set the time and date[...]

  • Page 15

    - 10 - 3.1.5 D y namic DNS Y ou can configure W R T -410 t o use DDNS service if you already have a regis t ered DDNS account. DDN S : Y ou can enable or disable DDNS func t ion here. Server A ddress : Please type in t he url of you r DDNS ser v ice provide r . Currently, W RT - 410 suppor t s DynDNS only, thus you have t o key in “ ww w .dyndns.[...]

  • Page 16

    - 11 - Enable/D i sable: Enable or disable w ireless LAN via t he W R T-410. SSID: Type an SSID in the field . The SSI D o f any w ireless device mus t ma t ch the SSI D typed here in order f or the w ireless device t o access the LAN and W A N via the W RT - 410. Channel: Select a w ork channel for w ireless communications. The channel of any w ir[...]

  • Page 17

    - 12 - Lifetime : Select prope r time interval from t he d r op-do w n list. Once t he life t ime e x pires, t he Encryption key w ill be rene w ed by RADIUS server automatically. Encr y ption K e y : Select the E ncryption key length t o be 64 - bits or 128-bits. RADIUS Server 1 : Enter the IP address, communicate port number, and shared sec r e t[...]

  • Page 18

    - 13 - Beacon Interval: Type the beacon interval in the field . Y ou can specify a value from 20 to 1000. The default beacon interval is 100 . RTS Threshold: Type the RTS (Request-To-Send ) th r eshold in the f ield. This value stabilizes da t a f lo w. If data flo w is irregular , choose values bet w een 1 and 2346 until data flo w is normalized. [...]

  • Page 19

    - 14 - Firm w a r e Version : Displays the lates t build o f the W RT-410 f irm w are inter f ace. Af t er upgrading the firm w are in Tools -> Fi r m w are, check this to ensure t hat you r firm w are w as successfully upgraded. L A N : This field displays the W RT-410 LAN inte r face M AC address, IP address, subnet mask, and DHC P server sta [...]

  • Page 20

    - 15 - First Page : Vie w the f irst page of the log message list. Last Page : Vie w the last page of the log message list. Previous Page: Vie w the page just before the current page . Next Page : Vie w the page jus t after t he current page. Clear Log : Delete the conten t s of t he log and begin a ne w log. Refresh: Rene w log s t atistics . Time[...]

  • Page 21

    - 16 - SMTP Server : Type the SMTP server address f or the email that the log w ill be sent t o in the ne x t field. Send to : Type an email address for t he log to be sent to. C lick “ Email Log Now ” to send the current log immediately. S y slog Server : Type the I P address of t he Syslog Server if you w ant the W RT-410 t o lis t en and rec[...]

  • Page 22

    - 17 - Click “ Reset ” to erase all s t a t istics and begin logging s t atistics again. Utilization: Separates packe t transmission statistics in t o send and receive categories. Peak indicates the ma x imum packet transmission reco r ded since logging began, w hile Average indicates t he average o f the to t al packet transmission since recor[...]

  • Page 23

    - 18 - Ne t w ork A ddress : Type the static IP add r ess your net w ork uses to access t he In t ernet . Y our ISP or net w ork administ r ator p r ovides you w ith this in f ormation. Ne t w ork Mask : Type the ne tw ork (subnet) mask fo r your net w ork. I f you do not type a value he r e, t he net w ork mask de f aul t s t o 255.255.255.255. Y [...]

  • Page 24

    - 19 - N A T : Select the op t ion to enable o r disable NAT. Transmit : Select t he option to set t he desired t r ansmit pa r amete r s. Disabled , RIP 1 o r R I P 2. Receive : Select t he option to set t he desi r ed t r ansmi t parameters . Disabled, RIP 1 or RIP 2. 3.4.3 Routing T able This screen w ill sho w you t he routing t able o f W R T [...]

  • Page 25

    - 20 - 3.5 A ccess 3.5.1 Filte r s This screen enables you to allo w and deny user access based upon the filte r s you set. I f MAC Filte r s i s selected, the screen appea r s as belo w . M A C Filter: Enables you to allo w or deny In t erne t access f o r users w ithin the LA N based upon the M AC address of their net w ork in t er f ace. C lick [...]

  • Page 26

    - 21 - The follo w ing screen appea r s once you select I P Filte r s . It enables you to de f ine a minimum and ma x imum IP address r ange filter; all IP addresses falling in the range are not allo w ed Internet access . The I P filter p r ofiles are lis t ed in the t able a t the bot t om of the page. Note: W hen selecting i t ems in the t able [...]

  • Page 27

    - 22 - Select Domain B locking, and t he follo w ing screen appea r . Domain Blocking : There are three options in this f ield. S elect the proper setting acco r ding t o you r demand. Permitted Domains : Ente r the domain name in the te x t field, and click “ Add ” but t on to add it to t he lis t . Blocked Domains : Enter the domain name in t[...]

  • Page 28

    - 23 - Note: W hen selecting i t ems in the t able at t he bottom, click any w here in the item. The line is selected, and the fields automatically load t he item ' s pa r ameters, w hich you can edit. Protocol Fil t er : Enables you t o allo w or deny In t erne t access to use r s based upon t he communications protocol of the origin. Click t[...]

  • Page 29

    - 24 - Public Port: Type the port number on the W A N t hat w ill be used to p r ovide access to the virtual server. L A N Server: Type the LAN I P address tha t w ill be assigned to the vi r tual server. A d d: Click to add the virtual server to the table at the bottom of the screen. Update : Click t o update info r mation for t he virtual server [...]

  • Page 30

    - 25 - 3.5.4 DMZ This screen enables you to c r eate a D M Z for those compu t ers that cannot access In t ernet applica t ions prope r ly through the W R T -410 and associated secu r ity se t tings. Enable : Click to enable or disable the D M Z. DMZ Host IP: Type a host I P address for t he D M Z. The compu t er w ith this IP address acts as a D M[...]

  • Page 31

    - 26 - Enable : Click to enable or disable the f ire w all rule p r ofile. Name : Type a desc r iptive name fo r the fire w all r ule profile . A ction : Select w hether to allo w or deny packets that confo r m to t he rule. Source : Defines the source o f the incoming packet t hat t he r ule is applied t o. Interface : Select w hich in t erface ( [...]

  • Page 32

    - 27 - Enabled/D i sab l ed : Click to enable or disable SN M P. By default is disabled. S y stem Name: Displays the name given t o the W RT-410. S y stem Location : Displays the location of the W RT-410 (normally, t he DNS name ) . S y stem Contact: Displays the con t act in f ormation for t he pe r son r esponsible for the W RT-410. Communi t y :[...]

  • Page 33

    - 28 - Enable : Click to enable or disable HTTP access for remo t e management. Remote IP Range: Type the r ange of IP addresses t hat can be used f or remote access. A llo w s t o Ping W A N Port : T h is func t ion allo w s remo t e use r s to ping W RT-410 W A N port I P address. Enable : Click to enable or disable W A N port pinged function. Re[...]

  • Page 34

    - 29 - Save Settings : Click to save t he current configuration as a profile tha t you can load w hen necessary. Load Settings: Click “ B r o w se ” and go to the location of a s t ored profile. Click Load t o load the p r ofile's settings. Restore Fac t or y Default Settings : Click t o restore t he de f ault set t ings. All configuration[...]

  • Page 35

    - 30 - 3.8 W izard The setup w izard enables you to configure the W RT-410 quickly and conveniently. Click “ W izard ” button, the w indo w belo w w ill appea r . Please click “ Ne x t> ” and follo w the steps to configu r e W RT-410. Y ou are promp t ed to select a pass w ord. Type a pass w ord in t he t e x t bo x , and then type it ag[...]

  • Page 36

    - 31 - Chapter 4 802 . 1X A uthenticat i on Setup 4.1 8 02. 1 X Infra s tructure An 802.1 X Infrastructu r e is composed o f three majo r componen t s: Authenticato r , Au t hen t ication serve r , and Supplicant. A uthentication server: An entity t hat provides an authentication service to an authenticator . This service de t ermines, from the cre[...]

  • Page 37

    - 32 - 6. The client validates the digi t al cer t ificate, and replies i t s o w n digi t al cer t ifica t e to t he R A DIUS serve r . 7. The RADIUS server valida t es client ’ s digi t al cer t ificate. 8. The client and RADIUS se r ver derive encryption keys. 9. The RADIUS server sends W R T -410 a RADIUS ACCEP T message, including t he clien[...]

  • Page 38

    - 33 - 6. Enter the info r ma t ion tha t you w ant for your Ce r tifica t e Service, and click “ Next ” to continue . 7. Go to S t art > Program > A dministra t ive Tools > Certif i cate A uthori t y . 8. Right-click on the “ Poli c y S etting ” , select “ new ” . 9. Select “ Certi f ica t e to Issue ” . 10. Selec t “ A [...]

  • Page 39

    - 34 - 11. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 12. Right-click on domain, and select ” Properties ” to con t inue. 13. Selec t “ Group Pol i cy ” tab and click “ Properties ” to con t inue .[...]

  • Page 40

    - 35 - 14. Go to “ Compu t er Configuration ” > “ Securi t y Settings ” > “ Public K e y Policies ” 15. Right-click “ A utomatic Certificate Request S etting ” , and select “ New ” 16. Click “ A utomatic Certif i cate Request ... ”[...]

  • Page 41

    - 36 - 17. The Au t oma t ic C erti f icate Request Setup W iza r d w ill guide you th r ough the Automa t ic Certi f icate Request setup , simply click “ Next ” th r ough to t he last step. 18. Click “ Fin i sh ” to complete the Au t omatic Certi f icate Request Setup 19. Go to Start > Run , and type “ command ” and click “ Enter [...]

  • Page 42

    - 37 - Setting In t ernet Authenticat i on Service 24. Go to Start > Program > A dministrative Tools > Inte r net A uthentication Service . 25. Right-click “ Cl i ent ” , and select “ N e w C l ient ” . 26. Enter the IP address of W RT-410 in the Cl i ent address te x t field, a memo r able name f or W RT-410 in the Client-Vendor t[...]

  • Page 43

    - 38 - 28. In the Inte r net Authentication Service, right - click “ R emo t e A ccess Pol i cies ” 29. Selec t “ New Remote A ccess Pol i cy ” . 30. Selec t “ D a y - A nd-Time-Restriction ” , and click “ A dd ” to continue .[...]

  • Page 44

    - 39 - 31. Unless you w ant to specif y the active dura t ion for 802.1 X authentication, click “ OK ” to accept for having 802.1 x authentication enabled a t all times. 32. Selec t “ Grant remo t e access pe r miss i on ” , and click “ Next ” to continue.[...]

  • Page 45

    - 40 - 33. C lic k “ Edit Profile ” . For TLS Authenticat i on Setup (Steps 34 ~ 35 ) 34. Selec t “ A uthentication ” Tab. 35. Enable “ Extensible A uthentication Protocol ” , and select “ Smart C ard or other Cert i ficate ” f or TLS au t hen t ication. Click “ OK ” . Then go t o step 38.[...]

  • Page 46

    - 41 - For M D5 Authentication S e t up (Steps 36 ~ 37 ) 36. Selec t “ A uthentication ” Tab. 37. Enable “ Extensible A uthentication Protocol ” . Select “ MD5-Challenge ” and enable “ E ncr y pted A uthentication (CH A P) ” for MD5 authentication. Click “ OK ” .[...]

  • Page 47

    - 42 - 38. Selec t “ Internet A uthentication Service (Local) ” , click on “ Action ” f r om t op panel. Then click “ Register Service i n A ctive Directory ” . 39. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers. 40. Right click on the domain, and select “ Properties ” . 41. Selec t ?[...]

  • Page 48

    - 43 - 42. Go to “ Computer Conf i guration ” > “ Windows S ettings ” > “ Securi t y Settings ” > “ A ccount Policies ” > “ Password Pol i c i es ” . D ouble click on “ S t ore password us i ng reversib l e enc r y ption for all users in the domain ” .[...]

  • Page 49

    - 44 - 43. Click “ Define this poli c y s etting ” , select “ E nab l ed ” , and click “ OK ” to continue . 44. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 45. Go to Users . R ight - click on the use r tha t you are granting access, and selec t “ Propert i es ” . 46. Go to “ A [...]

  • Page 50

    - 45 - 48. Go to the “ Dial-in ” tab , and check “ A llo w access ” op t ion for Remote Access Pe r mission and “ No Call-back ” for Callback Options. Then click “ OK ” .[...]

  • Page 51

    - 46 - 4.3 A uthenticator Setup 1. For E A P-MD5 Au t hen t ication, W E P key must be set previously. Go t o Wireless> A uthentication. Enable W E P key, and ente r a desi r ed key string. Y ou can skip this step i f using E A P-TLS Authen t ication . 2. Click on 802.1X for detailed con f iguration. 3. Enable 802 . 1 X Authentica t ion by selec[...]

  • Page 52

    - 47 - 6. En t er the IP address, Por t number, and S hared Secre t K e y used by the Secondar y Radius Server. 7. Click “ A pp ly ” . The 802.1 x settings w ill t ake effect r igh t af t er W RT-410 reboo t s i t sel f. 4.4 W ireles s Clie n t Setup W indo w s XP is originally 802 . 1 X support . As t o o t her opera t ing sys t ems ( w indo w[...]

  • Page 53

    - 48 - 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith . 6. Select “ Da t a encr y ption (WEP enabled ) ” option, but leave othe r op t ions unselected .[...]

  • Page 54

    - 49 - 7. Enter the net w ork key in “ N e t w ork k ey ” t e x t bo x . The string must be t he same as the fi r st set o f W E P key w hich you set t o W RT-410. 8. Click “ OK ” . 9. Select “ A uthentication ” tab. 10. Selec t “ Enab l e ne t work access contro l using IEEE 802.1X ” to enable 802 . 1 x authentica t ion. 11. Selec [...]

  • Page 55

    - 50 - 12. Click “ OK ” . 13. W hen w ireless client has associated w ith W RT - 410, a user authen t ica t ion no t ice appears in system tray. Click on the no t ice to continue. 14. En t er the user name , pass w ord and the logon domain t hat your account belongs. 15. Click “ OK ” to comple t e the valida t ion process. 4.4.2 E A P-TLS A[...]

  • Page 56

    - 51 - CA server. Fu r the r more , you mus t have a valid account/pass w ord to access the server . 1. Ac t ive w eb bro w ser, en t er “ http:/ / 192 . 168 . 1.10/ce r tsrv ” in t he Add r ess field w hich 192.168.1.10 is the IP address of our server. This w ill directly access t o Cer t ifica t e Service of a W indo w s 2000 server. A dialog[...]

  • Page 57

    - 52 - 5. Click “ Submit > ” to con t inue. 6. The Certi f icate Service is no w processing the cer t ificate request.[...]

  • Page 58

    - 53 - 7. The cer t ifica t e is issued by t he server, click “ Install t his certificate ” t o do w nload and sto r e the certi f icate t o your local compu t er. 8. Click “ Y es ” to s t ore the certifica t e to your local computer . 9. Certi f icate is no w installed. Wireless Adapter S etup 1. Go to S t art > Control P anel, double -[...]

  • Page 59

    - 54 - 2. Right-click on the W ireless Net w ork Connection w hich using W L - 3555. 3. Click “ Properties ” to open up the P r oper t ies setting w indo w . 4. Click on the “ Wireless Ne t work ” t ab. 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith .[...]

  • Page 60

    - 55 - 6. Select “ The k e y is provided for me automatica l ly ” option. 7. Click “ OK ” .[...]

  • Page 61

    - 56 - 8. Click “ A uthentication ” tab 9. Select “ Enable ne t work access control using IEEE 802 . 1X ” op t ion t o enable 802.1 x authen t ica t ion. 10. Selec t “ Smart Card or other Certificate ” from the drop-do w n list bo x for EAP type. 11. Click “ OK ” . 12. W hen w ireless client has associated w ith W RT - 410, W indo w[...]

  • Page 62

    - 57 - 13. Selec t the cer t ifica t e that w as issued by the server (in ou r demons t ration: W irelessCA), and click “ OK ” to continue. 14. M ake su r e this cer t ificate is issued by correct server, and click “ OK ” to complete the au t hentica t ion process.[...]

  • Page 63

    - 58 - Chapter 5 Troubleshooting This chapter provides solutions to problems usually encoun t ered during the ins t alla t ion and ope r ation of the Wireless Broadband Router . Read t he descrip t ion belo w to solve your problems. 5.1 F requent l y A s ked Questions What is W P A (Wi-Fi Protected A ccess)? W P A resolves the issue of w eak W E P [...]

  • Page 64

    - 59 - This ne w produc t s use the A CX 100 chip from T e x as Instrumen t s. In addition to mee t ing t he e x isting s t andard, t he chip also suppo rt s a ne w modulation scheme developed by TI, called Packet Binar y Convolution C ode (PBCC). I t's t his scheme that gives the produc t s the e x tra kick : Even at lo w e r speeds, PBCC pro[...]

  • Page 65

    - 60 - DNS DNS s t ands for D omain Name Sys t em . DNS conver t s machine names to the I P add r esses tha t a l l machines on the net have. It t r anslates from name to address and from address t o name . DOM A IN N A ME The domain name typically re f ers to an I nte r net site add r ess . DTIM DT I M ( Delivery T ra f fic I ndication M essage) p[...]

  • Page 66

    - 61 - IP I P (Internet Pro t ocol) is the protocol in the TCP/I P communications protocol suite that con t ains a net w or k address and allo w s messages to be routed to a di f ferent net w ork or subnet. H o w eve r , I P does not ensu r e delivery of a complete message — TC P provides the f unction of ensuring deliver y . IP A DDRESS The I P [...]

  • Page 67

    - 62 - PING Ping (Packet INte r net Groper) is a utility used to find out if a p articular I P address is present online, and is usually used by net w orks f or debugging. PORT Por t s a r e the communications pa t h w ays in and out of compu t ers and net w ork devices (route r s and s w itches ) . M ost PCs have se r ial and p arallel por t s, w [...]

  • Page 68

    - 63 - w ith an incoming I P address to dete r mine w hether t o accept or reject t he p acket. SYSLOG SERVER A SysLog server monitors incoming Syslog messages and decodes the messages f or logging purposes. TCP ( T ransmission C ontrol P r otocol) is the t r anspor t pro t ocol in TCP/I P t ha t ensures messages ove r th e net w ork are t r ansmit[...]

  • Page 69

    - 64 - W LAN. W AN W A N ( W ide Area Net w ork ) is a communica t ions net w ork t hat covers a w ide geographic area such as a country (cont r as t ed w ith a L A N, w hich cove r s a small area such as a com p any building).[...]