user manual

MOTOMESH 1.0.1 Vehicle Mounted Modem Users Guide
6881011Y54-A
3-11
September 2005
Field Name Field Description Field Default
Value
The IP address range must
reflect the number of clients
plus one, attached to the VMM
via hub or other connection. The
first IP address will be used by
the DHCP server itself; this is
why one extra address should be
allocated in the designated IP
address range.
DHCP Range End
This is the last IP address to end the range of addresses begun
with the IP address specified in the DHCP Start IP address
field.
192.168.0.50
CIDR
Enter a CIDR value (in bits), reflecting the desired network
type.
24
DHCP Lease
Duration(s)
This is the duration (in seconds) of the DHCP leases that the
VMM offers to the attached Ethernet devices.
300
Security Settings Section (Authentication)
There are three security authentication settings available to the MOTOMESH VMM device: Force
Authorized, Force Unauthorized, and Local. Security authentication modes are selected from within
the Security Settings section of the MOTOMESH Device Administration Configuration page in the
Authorization Control field
The table below describes each field within the Security Settings section.
Table 3-5 Device Web Interface - Security Settings Section (Configuration Tab)
Field Name Field Description Field Default
Value
To allow for various levels of security and authentication control, there are
three security authentication settings available to the MOTOMESH VMM
device: Force Authorized, Force Unauthorized, and Local.
Force Authorized: In Force Authorized mode, there are effectively no
security and authentication controls, resulting in open authentication for all
network devices. There will be no security measures applied to links
between devices that are currently set to Force Authorized. Hardware
authentication via the HAS is still performed but password authentication
is not carried out at the user level and there is no integrity check carried out
for all packets transferred between any source and destination node
Authorization
Control
Force Unauthorized:
In Force Unauthorized mode, all devices seeking authorization for network
access will be denied, effectively locking down the network. The Force
Unauthorized setting will not allow any network device to establish
communication with any other node that may attempt to communicate with
Force Authorized