User's Guide
Table Of Contents
- Disclaimers
- Table of Contents
- CHAPTER 1 Introduction
- CHAPTER 2 Basic Mode Setup
- CHAPTER 3 Expert Mode
- Overview of Major Capabilities
- Wide Area Network Termination
- PPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM)
- Instant-On PPP
- Simplified Local Area Network Setup
- DHCP (Dynamic Host Configuration Protocol) Server
- DNS Proxy
- Management
- Embedded Web Server
- Diagnostics
- Security
- Remote Access Control
- Password Protection
- Network Address Translation (NAT)
- Cayman Advanced Features for NAT
- Internal Servers
- Pinholes
- Default Server
- Combination NAT Bypass Configuration
- IP-Passthrough
- VPN IPSec Pass Through
- VPN IPSec Tunnel Termination
- Stateful Inspection Firewall
- Access the Web Interface
- Toolbar
- Navigating the Web Interface
- Restart
- Help
- Configure
- Button: Configure
- Quickstart
- How to Use the Quickstart Page
- Link: Configure -> Quickstart
- Setup Your Gateway using a PPP Connection
- LAN
- Link: Configure -> LAN
- WAN
- Link: Configure -> WAN
- Link: Advanced
- Link: IP Static Routes
- Link: IP Static ARP
- Link: Pinholes
- Configure Specific Pinholes
- Planning for Your Pinholes
- Example: A LAN Requiring Three Pinholes
- Pinhole Configuration Procedure
- Link: IPMaps
- Configure the IPMaps Feature
- What are IPMaps and how are they used?
- What types of servers are supported by IPMaps?
- Can I use IPMaps with my PPPoE or PPPoA connection?
- Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway?
- Link: Default Server
- Configure a Default Server
- Typical Network Diagram
- NAT Combination Application
- IP-Passthrough
- A restriction
- Link: DNS
- Link: DHCP Server
- Link: SNMP
- Link: Advanced -> Ethernet Bridge
- Configuring for Bridge Mode
- Link: System
- Link: Syslog Parameters
- Link: Internal Servers
- Link: Software Hosting
- Rename a User(PC)
- Link: Clear Options
- Security
- Button: Security
- Link: Passwords
- Create and Change Passwords
- Link: Firewall
- BreakWater Basic Firewall
- Link: IPSec
- VPN IPSec Tunnel at the Gateway
- Parameter Description and Setup
- IPSec Tunnel Parameter Setup Worksheet
- SafeHarbour Tunnel Setup
- Link: Stateful Inspection
- Stateful Inspection Firewall installation procedure
- Exposed Addresses
- Stateful Inspection Options
- Open Ports in Default Stateful Inspection Installation
- Log Event Dispositions
- Link: Security Log
- Install
- Overview of Major Capabilities
- CHAPTER 4 Basic Troubleshooting
- CHAPTER 5 Advanced Troubleshooting
- CHAPTER 6 Command Line Interface
- Overview
- Starting and Ending a CLI Session
- Using the CLI Help Facility
- About SHELL Commands
- SHELL Commands
- About CONFIG Commands
- CONFIG Commands
- DSL Commands
- ATM Settings
- Bridging Settings
- DHCP Settings
- DMT Settings
- Domain Name System Settings
- IP Settings
- IP-over-PPP Settings
- Static ARP Settings
- IPMaps Settings
- Network Address Translation (NAT) Default Settings
- Network Address Translation (NAT) Pinhole Settings
- PPPoE /PPPoA Settings
- Configuring Basic PPP Settings
- Configuring Port Authentication
- Ethernet Port Settings
- Command Line Interface Preference Settings
- Port Renumbering Settings
- Security Settings
- SNMP Settings
- System Settings
- Syslog
- Wireless Settings (supported models)
- CHAPTER 7 Glossary
- CHAPTER 8 Technical Specifications and Safety Information
- Index
254
MTU. Maximum Transmission Unit. The maximum packet size,
in bytes, that can be sent over a network interface.
MULTI-LAYER. The Open System Interconnection (OSI) model
divides network traffic into seven distinct levels, from the Physi-
cal (hardware) layer to the Application (software) layer. Those in
between are the Presentation, Session, Transport, Network,
and Data Link layers. Simple first and second generation fire-
wall technologies
inspect between 1 and 3 layers of the 7 layer
model, while our SMLI engine inspects layers 2 through 7.
-----N-----
NAK. Negative acknowledgment. See ACK.
Name. The Name parameter refers to the name of the config-
ured tunnel. This is mainly used as an identifier for the adminis-
trator. The Name parameter is an ASCII and is limited to 31
characters. The tunnel name is the only IPSec parameter that
does not need to match the peer gateway.
NCP. Network Control Protocol.
Negotiation Method. This parameter refers to the method
used during the Phase I key exchange, or IKE process. SafeHar-
bour supports Main or Aggressive Mode. Main mode requires 3
two-way message exchanges while Aggressive mode only
requires 3 total message exchanges.
null modem. Cable or connection device used to connect two
computing devices directly rather than over a network.










