IntraPort 2 and IntraPort 2+ VPN Access Server Administrator’s Guide Compatible Systems Corporation 4730 Walnut Street Suite 102 Boulder, Colorado 80301 303-444-9532 800-356-0283 http://www.compatible.
IntraPort 2 and IntraPort 2+ VPN Access Server Administrator’s Guide, Version 1.5 Copyright © 1999, Compatible Systems Corporation All rights reserved. IntraPort, RISC Router, MicroRouter and CompatiView are trademarks of Compatible Systems Corporation. Other trademarks are the property of their respective holders. Copyright© 1997-1999 by Hi/fn, Inc. Includes one or more U.S. Patent Nos.: 4,701,745; 5,003,307; 5,016,009; 5,126,739; 5,146,221; 5,414,425; 5,414,850; 5,463,390; 5,506,580; 5,532,694.
Chapter 1 - Introduction 1 ABOUT THE INTRAPORT 2/2+ VPN ACCESS SERVER A NOTE ABOUT REMOTE CLIENT CONNECTIONS INTRAPORT 2/2+ VPN ACCESS SERVER INSTALLATION OVERVIEW 1 1 1 Chapter 2 - Getting Started 5 A FEW NOTES WHAT YOU WILL NEED TO GET STARTED Supplied with the IntraPort 2/2+ VPN Access Server Needed for Installation Ethernet Connection Requirements VPN Client Software Requirements 5 5 5 5 6 6 6 7 7 Chapter 3 - Network Installation 9 Please Read the Manuals Warranty and Service Getting Help wit
Chapter 6 - Basic Configuration Guide 19 SETUP OPTIONS Diagram of Dual-Ethernet Setup Diagram of Single-Ethernet Setup CONFIGURATION USING COMPATIVIEW VPN Client Tunnel Settings CONFIGURING THE SERVER FOR LAN-TO-LAN TUNNELS BASIC CONFIGURATION USING COMMAND LINE VPN Client Tunnel Settings CONFIGURING THE SERVER FOR LAN-TO-LAN TUNNELS 19 20 21 22 22 37 41 41 48 Chapter 7 - Alternate Protocols and Security Parameters 50 IPX Protocol SAVING A CONFIGURATION FILE TO FLASH ROM 50 50 50 51 51 51 51 51 52 5
Appendix B - Connector and Cable Pin Outs Pin Outs for DB-25 Male to DB-25 Female RS-232 Data & Console Cable Appendix C - Security Dynamics ACE/Server Information 58 58 59 Appendix D - LED Patterns and Test Switch Settings 61 IntraPort 2/2+ VPN Access Servers LED Patterns Ethernet Back Panel Indicators LEDs Front Panel LEDs Sys Ready Power On, No Traffic Ethernet Traffic Indicators IntraPort 2 Connections/Users LEDs IntraPort 2+ Connections/Users LEDs IntraPort 2 Special Indicators IntraPort 2+ Special
iv
Chapter 1 - Introduction 1 Chapter 1 - Introduction About the IntraPort 2/2+ VPN Access Server Congratulations on your purchase of the IntraPort 2 or IntraPort 2+ VPN Access Server. These VPN Access Servers provide secure Internet-based remote access and site-to-site connections. The IntraPort 2 will support up to 16 simultaneous LAN-to-LAN connections and up to 64 simultaneous remote client connections.
Chapter 1 - Introduction 2 In short, the installation steps are: 1. Install the IntraPort 2 or IntraPort 2+ hardware on your Ethernet LAN and connect one or both of the 10/100 twisted-pair Ethernet interfaces to a Fast Ethernet or Ethernet hub. 2. Select the management tool you wish to use with the server. If you want to use the CompatiView management software, you must install the software on a Windows PC computer which is connected to your network. 3.
Chapter 1 - Introduction 3 Alternate Protocols and Security Parameters This part of the manual lists configuration parameters that must be set in order to use the IntraPort 2/2+ VPN Access Server with protocols other than TCP/IP, and when using additional security parameters such as SecurID and RADIUS.
.
Chapter 2 - Getting Started 5 Chapter 2 - Getting Started A Few Notes Please Read the Manuals The manuals included with your IntraPort 2/2+ VPN Access Server contain very important information about the product and Virtual Private Networking in general. Please read this manual thoroughly, and refer to the management reference guides as required. It’s worth the few minutes it will take. Also, please fill out the warranty registration card and return it to us today.
Chapter 2 - Getting Started 6 questions via e-mail to support@compatible.com. Compatible Systems’ phone number is listed on the front of this guide. We will be happy to help you. What You Will Need To Get Started Before installing the IntraPort 2/2+ VPN Access Server, please check the list below to make sure that you have received all of the items that are supplied with the server package. You should also make sure you have any additional items that are necessary to connect the server to your network.
Chapter 2 - Getting Started 7 Ethernet Connection Requirements The server’s Ethernet interfaces directly support full or half duplex 100BaseTx or 10BaseT twisted-pair Ethernet. To connect the server’s Ethernet interfaces to twisted-pair Ethernet cabling, you will need an unshielded twisted-pair station cable that is connected to a 10BaseT-compatible twisted-pair hub (for a transmit speed of 10 Mbps) or a 100Mbps Fast Ethernet hub (at either transmit speed) for each interface you plan to connect.
.
Chapter 3 - Network Installation 9 Chapter 3 - Network Installation Figure 1. IntraPort 2/2+ VPN Access Server Back Panel This section of the manual describes how to connect the IntraPort 2/2+ VPN Access Server to your Ethernet network. In summary, the steps for installation are: 1. Make sure the server is powered down and not connected to any power source. 2. Connect the server to the Ethernet network(s). 3. Connect a management console to the server (optional). 4.
10 Chapter 3 - Network Installation The other option is to set up the server behind your Internet access router/firewall using Ethernet 0 only. In this scenario, Ethernet 1 is not used and should not be plugged in to anything. You will also have to set up your firewall to allow IPSec traffic through (see the section on setting up an IP Gateway for Ethernet 0 in Chapter 6 for more information). The 10/100 Ethernet interfaces directly support full or half duplex 100BaseTx or 10BaseT twisted-pair Ethernet.
Chapter 4 - CompatiView Software Installation 11 Chapter 4 - CompatiView Software Installation All of the products in the Compatible Systems networking family, including all IntraPort servers, RISC Router and MicroRouter models, can be managed from a single management platform called CompatiView. CompatiView is included on the CD-ROM which was shipped with your IntraPort 2/2+ VPN Access Server. If your IntraPort 2/2+ is running software version 5.0 or later, then you must use CompatiView version 5.
v Note: To choose the active transport protocol on a Windows machine which has both IPX and IP installed, select “Options” from the Database menu and click the General tab. Then select the appropriate radio button under “Transport.” Installation and Operation The Windows version of the CompatiView program can be found in the Network Management/CompatiView/Windows directory on the CD-ROM that was included with your IntraPort 2/2+ VPN Access Server.
Chapter 4 - CompatiView Software Installation 13 two most common IPX frame types upon startup (802.2 and 802.3 (raw)). If CompatiView has the IPX/SPX protocol selected as its transport, it will be necessary to either powerup the server before powering up the workstation, or reboot the workstation after the server has completed its boot sequence. This process will ensure that the workstation and the server have the proper IPX network bindings for communication.
.
Chapter 5 - Command Line Management 15 Chapter 5 - Command Line Management The command line interface allows you to configure and monitor the server in-band via Telnet or out-of-band with a terminal connected to the server’s Console interface. v Note: Proper syntax is vital to effective operation of command line management. Case is not significant – you may enter commands in upper case, lower case, or a combination of the two.
Temporarily Reconfiguring a Host for Command Line Management You can temporarily reconfigure an IP host in order to set the server’s IP parameters to allow in-band Telnet access. If you wish to set the server’s basic IP parameters in this fashion, the host must be on the same Ethernet segment as the IntraPort’s server’s 0 interface. You can then do the following: 1. Set the host’s IP address to 198.41.12.2, with a Class C subnet mask (255.255.255.0) and then Telnet to 198.41.12.1. 2.
Chapter 5 - Command Line Management 17 command line interface, do the following: • A. Use the configure command and set the IPAddress, SubnetMask, and IPBroadcast keywords in the IP Ethernet 0 section. B. Use the save command to save the changes to the device’s Flash ROM. You may also use CompatiView from a reconfigured IP host (if using the IP transport protocol), or anywhere on your network (if using the IPX transport protocol).
.
Chapter 6 - Basic Configuration Guide 19 Chapter 6 - Basic Configuration Guide This chapter provides a step-by-step outline of the minimum required parameters which must be configured into the device for proper operation. Detailed information on the meaning of the server’s parameters is provided in the CompatiView Management Software Reference Guide and the Text-Based Configuration and Command Line Management Reference Guide.
20 Chapter 6 - Basic Configuration Guide Diagram of Dual-Ethernet Setup Figure 2.
Chapter 6 - Basic Configuration Guide Diagram of Single-Ethernet Setup Figure 3.
22 Chapter 6 - Basic Configuration Guide Configuration Using CompatiView This section provides a list of parameters that must be entered into a server for proper operation using CompatiView, Compatible Systems’ management software. If you wish to use the command line interface to configure the server, see the next section in this chapter, Basic Configuration Using Command Line.
Chapter 6 - Basic Configuration Guide 23 2. Set basic IP parameters for Ethernet 0. Dual Ethernet Single Ethernet TCP/IP Routing: Ethernet 0 To access this dialog box, select TCP/IP Routing under Ethernet 0 in the Device View. A. Click the IP Routing radio button. B. Enter the internal TCP/IP address you have assigned the IntraPort 2/2+. Verify that you have the IP Address, the Network IP Subnet Mask and the Network IP Broadcast Mask correctly entered.
24 Chapter 6 - Basic Configuration Guide 3. (Dual Ethernet) Set basic IP parameters for Ethernet 1. TCP/IP Routing: Ethernet 1 To access this dialog box, select TCP/IP Routing under Ethernet 1 in the Device View. A. Click the IP On radio button. B. Enter the external TCP/IP address you have assigned the IntraPort 2/2+. This address must not be in the same TCP/IP network as Ethernet 0 or you will disable TCP/IP in the IntraPort 2/2+.
Chapter 6 - Basic Configuration Guide 25 4. Set an IP Gateway for Ethernet 0. IP Static Routes To access the IP Static Routes dialog box, select IP Static Routes under Global in the Device View. A. Click the Add... button. The Static Route dialog box will appear: Dual Ethernet Static Route Single Ethernet Static Route B. Click the IP Address radio button in the Gateway section. For dual Ethernet setups, enter the internal TCP/IP address of your firewall or proxy, whichever is applicable.
26 Chapter 6 - Basic Configuration Guide Leave all other parameters at their default settings for basic configuration, or refer to the CompatiView Management Software Reference Guide for more advanced configuration settings. v Note: For single Ethernet setups, you must configure the firewall to allow: •UDP port 500 (ISAKMP) •Protocol number 51, which is the AH (Authentication Header) protocol packet type - and/or •Protocol number 50, which is the ESP (Encapsulating Security Payload) protocol packet type C.
Chapter 6 - Basic Configuration Guide 27 5. Set an IPSec Gateway. IPSec Gateway To access this dialog box, select IPSec Gateway under Global in the Device View. A. For dual Ethernet setups, the IPSec Gateway is the equivalent of a default gateway for the IPSec interface (Ethernet 1). Enter the TCP/IP address of the upstream or Internet router for your network. This must be an address on the same TCP/IP network as the Ethernet 1 address of the IntraPort 2/2+.
28 Chapter 6 - Basic Configuration Guide 6. Set an IKE Policy. There are two phases to the IKE negotiation. During Phase 1 negotiation, the IntraPort and Client must authenticate each other. The IKE Policy dialog box controls this Phase 1 negotiation. Phase 2 negotiation involves the setup of an individual tunnel connection and is controlled by the VPN Group Configuration, documented in Step 7. IKE Policy To access this dialog box, select IKE Policy under Global in the Device View.
Chapter 6 - Basic Configuration Guide 29 7. Set up VPN Group Configurations. VPN Group Configuration: General Tab To access this dialog box, select VPN Group Configuration in the Device View. A. Click on the New... button. B. Enter a New VPN Group Config Name (e.g. Sales, Accounting, etc.) in the pop-up box. C. Click OK. You are now ready to enter group parameters. D. On the General Tab: • Leave the Bind To pull-down menu set to Ethernet 0.
Chapter 6 - Basic Configuration Guide 30 without receiving any traffic from a client belonging to this VPN Group Configuration without ending the tunnel session. • Set the Minimum Client Version or keep the default value. This places a limit on the VPN Client Software version number which will be allowed to connect. Leave all other parameters at their default settings for basic configuration, or refer to the CompatiView Management Software Reference Guide for more advanced configuration settings.
Chapter 6 - Basic Configuration Guide 31 IKE Configuration Transform List • The default settings of MD5 for Authentication and DES for Encryption are adequate for most setups. Click OK. In the IKE Key Management dialog box, you may click on the PFS checkbox to add additional security parameters during tunnel sessions. (This is optional.
Chapter 6 - Basic Configuration Guide 32 Dual Ethernet VPN Group Configuration: IP Connection Tab Single Ethernet VPN Group Configuration: IP Connection Tab F. On the IP Connection Tab: • Enter the Start IP Address. This specifies the first IP address to be assigned to client sessions under this configuration. This address will be incremented by one for each new client session, until the Max Connections number (entered on the General tab) is reached.
Chapter 6 - Basic Configuration Guide 33 same network as Ethernet 0 or a subinterface thereof). Also, they cannot conflict with those used for any other VPN Groups. v Note: For large numbers of users (i.e., over 50), it’s recommended that the block of addresses be specified as a Local IP Net because address administration is easier. Using a Start IP Address is recommended for smaller numbers of users because the routing setup is simpler.
34 Chapter 6 - Basic Configuration Guide VPN Group Configuration: IPX Connection Tab H. If you will be tunneling IPX traffic, click the IPX Connection Tab. • Enter an IPX network number in the Start IPX Network edit box. This IPX network number is the first IPX address assigned to an incoming Client tunnel session. The Start IPX Network also works with the Max Connections value, which means you must have at least 30 consecutive unused IPX addresses available.
Chapter 6 - Basic Configuration Guide 35 8. Set up VPN Users. If you are using a RADIUS server for user authentication, you will need to set up VPN users on that server. If not, then you must enter each user into the VPN User database. Bear in mind that the values for each user must be identical in the VPN Client configuration on the remote computer. VPN User Configuration To access this dialog box, select VPN User Configuration in the Device View. A. Click the Add... button.
36 Chapter 6 - Basic Configuration Guide sent. This secret is used for VPN using IKE Key Management. The same secret must also be entered into the VPN Client for the tunnel session to be successful. v Note: STEP/STAMP is Compatible System’s proprietary tunnel negotiation protocol. It can be used to allow connections from users running older versions of the VPN Client software, but is not recommended for new users and is not covered here. C. Click OK. You may repeat Step 8 as needed to add all users. 9.
Chapter 6 - Basic Configuration Guide 37 Configuring the Server for LAN-to-LAN Tunnels This section configures VPN tunnel parameters and defines a virtual port for LAN-to-LAN tunnel traffic. It assumes that you have already assigned IP addresses to the Ethernet interface(s), and set up static routes, as shown in VPN Client Tunnel Settings. v Note: VPN Ports are only used for LAN-to-LAN tunnels. VPN Client tunnels do not use VPN Ports.
38 Chapter 6 - Basic Configuration Guide C. If you are using both Ethernet ports, then the Bind To interface should be set to Ethernet 1. For single Ethernet setups, it should be Ethernet 0. This specifies which interface on this device will act as the end point for the tunnels defined by this configuration. Packets sent from this device to the remote Tunnel Partner will use this interface’s IP address as a source address. D. Click OK. 3.
Chapter 6 - Basic Configuration Guide 39 will only initiate tunnel establishment attempts and will not respond to them. If Respond is selected, this Tunnel Partner will use IKE, but will only respond to tunnel establishment attempts and will not initiate them. B. Enter the Shared Key. This is a shared alphanumeric secret that is used to generate session keys. C. Select the authentication and encryption algorithms to be used for tunnel sessions using the IKE Configuration Transform list box.
40 Chapter 6 - Basic Configuration Guide 4. Save the configuration to a file and download to the device. A. From the File menu choose Save To > File. This will bring up a file save dialog box. Name the device configuration file, making sure that you associate the file name with the IntraPort 2/2+ and can find the file later. B. From the File menu choose Save To > Device. This will bring up a download configuration dialog window. Choose the IntraPort 2/2+ if given the option.
Chapter 6 - Basic Configuration Guide 41 Basic Configuration Using Command Line This section briefly discusses the major parameters that must be set in order to use the IntraPort 2/2+ VPN Access Server using command line management or text-based configuration, either out-of-band (through the server’s Console interface) or in-band through Telnet. Detailed information on the meaning of the server’s parameters is provided in the Text-Based Configuration and Command Line Management Reference Guide.
Chapter 6 - Basic Configuration Guide 42 2. Set basic IP parameters for Ethernet 0. This will be the internal TCP/IP addressing information you have assigned to the IntraPort 2/2+ Use configure and set the IPAddress, SubnetMask, and IPBroadcast keywords in the IP Ethernet 0 section. Dual Ethernet Setup Example config IP Ethernet 0 [ IP Ethernet 0 ] # ipaddress=192.168.233.1 [ IP Ethernet 0 ] # subnetmask=255.255.255.0 [ IP Ethernet 0 ] # ipbroadcast=192.168.233.
Chapter 6 - Basic Configuration Guide 43 4. Set an IP Gateway for Ethernet 0. For dual Ethernet setups, this is the internal TCP/IP address of your firewall or proxy, whichever is applicable. For single Ethernet setups, this is the internal TCP/IP address of your upstream Internet access/firewalling router. In either case, this address must be on the same TCP/IP network as the Ethernet 0 address of the IntraPort 2/2+. Use edit config to modify the IP Static section.
Chapter 6 - Basic Configuration Guide 44 5. Set an IPSec Gateway. For dual Ethernet setups, the IPSec Gateway is the equivalent of a default gateway for the IPSec interface (Ethernet 1). Enter the TCP/IP address of the upstream or Internet router for your network. This must be an address on the same TCP/IP network as the Ethernet 1 address of the IntraPort 2/2+. For single Ethernet setups, the IPSec Gateway is an optional setting. It serves as a default gateway for all IPSec (i.e., tunneled) traffic.
Chapter 6 - Basic Configuration Guide 45 7. Set up VPN Group Configurations. This is where tunneling profiles for a group of one or more IntraPort 2/2+ users are defined. Use configure VPN Group Name to create a VPN Group section and set the following keywords in the section you just created: BindTo-Specifies which interface on the device will act as the local end point for the tunnels defined by this configuration.
Chapter 6 - Basic Configuration Guide 46 Ethernet example, 192.168.233.0/24), all traffic from a client going to the internal network will be tunneled through the IntraPort 2/2+. This is the most common configuration. There can be multiple entries, including individual addresses (i.e. hosts). As a special case, the entry 0.0.0.0/0 will send all IP traffic through the tunnel, although the ExcludeLocalLAN keyword can still be used to exclude LAN traffic if desired.
Chapter 6 - Basic Configuration Guide 47 8. Set up VPN Users. Users are added to the configuration by entering a few unique parameters, and each is assigned to a VPN Group Configuration, configured in the previous step. Use edit config to set the parameters in the VPN Users section. All values are case sensitive. Example Edit [ VPN Users ] > append 1 Enter lines at the prompt. To terminate input, enter a . on a line all by itself.
Chapter 6 - Basic Configuration Guide 48 Configuring the Server for LAN-to-LAN Tunnels This section configures VPN tunnel parameters and defines a virtual port for LAN-to-LAN tunnel traffic. It assumes that you have already assigned IP addresses to the Ethernet interface(s), and set up static routes, as shown in VPN Client Tunnel Settings. v Note: VPN Ports are only used for LAN-to-LAN tunnels. VPN Client tunnels do not use VPN Ports.
Chapter 6 - Basic Configuration Guide 49 If Manual is specified, this Tunnel Partner will not use IKE, and the tunnel’s encryption and authentication parameters must be manually set in the Manual Key Management dialog box, which is not described here. v Note: For more information regarding non-IKE encryption and authentication, refer to the Text-Based Configuration and Command Line Management Reference Guide.
50 Chapter 7 - Alternate Protocols and Security Parameters Chapter 7 - Alternate Protocols and Security Parameters This chapter briefly discusses the configuration of the IntraPort 2/2+ VPN Access Server for AppleTalk and IPX, and with RADIUS and SecurID authentication servers.
Chapter 7 - Alternate Protocols and Security Parameters 51 AppleTalk Protocol Required for AppleTalk Generally, there are no required changes from the shipping Ethernet configuration for AppleTalk. The Ethernet interface will autoconfigure to use AppleTalk Phase 2, and will adapt to conditions on the Ethernet. Suggested for AppleTalk You may want to set your own network numbers, rather than using the autoconfigured values. You may also want to use more meaningful zone names.
Chapter 7 - Alternate Protocols and Security Parameters 52 RADIUS Server User Authentication Settings In order for client authentication and accounting to be done on a RADIUS server, the RADIUS server must be configured with four pieces of data for each user. • User name • Login password • Group configuration • Tunnel secret The user name is kept in the User-Name attribute in the RADIUS server and the login password is kept in the Password attribute.
Chapter 7 - Alternate Protocols and Security Parameters 53 attribute settings will require that you enter users in the Users text file. See the user manual for your server for more information on exporting, editing and importing the Users text file. In addition to the RADIUS server settings, the user name, login password and tunnel secret must match the settings for each user in the User Properties window of the VPN Client.
Chapter 7 - Alternate Protocols and Security Parameters 54 Setting the IntraPort for an ACE/Server Just a few basic settings are required for the IntraPort to communicate with an ACE/Server. • SecurID on • Encryption method • ACE/Server IP address • Enable SecurID for a group of IntraPort users CV: Use the SecurID Configuration Window (under Global/SecurID Configuration) to set up a server. Use the SecurID tab in the VPN Group Configuration Window to enable SecurID for a VPN group.
Chapter 7 - Alternate Protocols and Security Parameters 55 Saving a Configuration File to Flash ROM Once a configuration is complete, you can save it to the router’s Flash ROM. Until saved, all changes are made in a separate buffer and the server’s interfaces continue to run as before the changes were made. CV: Use the Save to>Device option from the File menu. TB: Use the save command.
.
Appendix A - Shipping Defaults Appendix A - Shipping Defaults Ethernet Interfaces Default Password • letmein IP Defaults • Ethernet 0 is on • Address: 198.41.12.1 • Subnet mask: 255.255.255.0 • Broadcast address: 198.41.12.
58 Appendix B - Connector and Cable Pin Outs Appendix B - Connector and Cable Pin Outs Pin Outs for DB-25 Male to DB-25 Female RS-232 Data & Console Cable The cable supplied with the IntraPort 2/2+ VPN Access Server is 25 conductors connected straight through. Connections on the Console interface follow the standard RS-232 pin outs.
Appendix C - Security Dynamics ACE/Server Information 59 Appendix C - Security Dynamics ACE/Server Information ACE/Server software and SecurID tokens can be purchased directly from Security Dynamics Technologies, Inc. Use the following information to contact Security Dynamics for more information: Security Dynamics Technologies, Inc. 20 Crosby Drive Bedford, MA 01730, U.S.A. 800-SECURID (800-732-8743 or 888-732-8743) To telephone from outside the U.S., 781-687-7000 E-mail: info@securitydynamics.
.
Appendix D - LED Patterns and Test Switch Settings 61 Appendix D - LED Patterns and Test Switch Settings IntraPort 2/2+ VPN Access Servers LED Patterns Ethernet Back Panel Indicators LEDs The IntraPort 2 and IntraPort 2+ VPN Access Servers feature two pairs of lights on the back panel to indicate the hardware status of the two Ethernet ports. Link: The Link light indicates that there is a good connection to the hub. Activity: The Activity light indicates that there is activity across the link.
62 Appendix D - LED Patterns and Test Switch Settings IntraPort 2 Connections/Users LEDs Connections/Users LED User Range 1 1-5 6 6 - 11 12 12 - 17 18 18 - 23 24 24 - 29 30 30 - 35 36 36 - 41 42 42 - 47 48 48 - 53 54 54 - 64 IntraPort 2+ Connections/Users LEDs Connections/Users LED User Range 1 1 - 19 20 20 - 39 40 40 - 59 60 60 - 79 80 80 - 99 100 100 - 119 120 120 - 139 140 140 - 159 160 160 - 179 180 180 - 200
Appendix D - LED Patterns and Test Switch Settings 63 IntraPort 2 Special Indicators Ethernet Lights Connections/Users Indication 4&5 flashing 36&42 flashing Router stacks starting up. 2&3 flashing 1&6, 24&30, 48&54 flashing No OS loaded. Running from ROM. 1,4&5 flashing 36,42 (and Sys Rdy) flashing Erasing OS or config in Flash ROM. Scanning from the outside toward the center Flash ROM erase due to switch setting five or six is complete. Set switch to zero and cycle power.
.
Appendix E - Downloading Software From Compatible Systems 65 Appendix E - Downloading Software From Compatible Systems The latest versions of operating software for all Compatible Systems products are available at our Web site. The latest version of CompatiView management software is also available. To download software, follow the instructions below. The Compatible Systems WWW Server The WWW Server is accessible via the Internet. 1. Use your browser to access http://www.compatible.
.
Appendix F - Terms and Conditions 67 Appendix F - Terms and Conditions Compatible Systems Corporation (Compatible Systems) offers to sell only on the condition that Customer’s acceptance is expressly limited to Compatible Systems’ terms and conditions of sale. Compatible Systems’ acceptance of any order from Customer is expressly made conditional on assent to these terms and conditions of sale unless otherwise specifically agreed to in writing by Compatible Systems.
THE WARRANTIES SET FORTH IN THESE TERMS AND CONDITIONS ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESSED OR IMPLIED. WITHOUT LIMITATION ON THE GENERALITY OF THE FOREGOING SENTENCE, COMPATIBLE SYSTEMS EXPRESSLY DISCLAIMS AND EXCLUDES ALL IMPLIED WARRANTIES OF MERCHANTIBILITY AND OF FITNESS (GENERALLY OR FOR A PARTICULAR PURPOSE). 2. Shipments. All delivery indications are estimated and are dependent in part upon prompt receipt of all necessary information to service an order.
Appendix F - Terms and Conditions 69 appropriate, of the subsequent purchaser). IN NO EVENT SHALL COMPATIBLE SYSTEMS BE LIABLE FOR ANY SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES ARISING OUT OF THE SALE, USE, INSTALLATION OR OPERATION OF THE PRODUCTS, WHETHER A CLAIM IS BASED ON STRICT LIABILITY, BREACH OF WARRANTY, NEGLIGENCE, OR ANY OTHER CAUSE WHATSOEVER, WHETHER OR NOT SIMILAR.