User's Manual
Table Of Contents
- Chapter 1 Introduction
- Features and Benefits
- Transparent Ethernet Bridging with Advanced Filtering for Security and Network Reliability
- IP Routing with Advanced Filtering for Security
- SNMP Management
- SNMP Features
- SNMP Management
- IP-Router Features
- Encryption Features (Add-on Option)
- Wireless Multipoint Protocol
- Additional Functionality for SPEEDLAN 4100 & 4200
- Features
- Chapter 2 Quick Start
- System Description
- Package Contents
- Installation Steps
- Installation Diagram
- Polarizations on a Grid Antenna
- Chapter 3 Hardware
- Upgrading the Firmware
- Chapter 4 Overview of Configurator
- Installation and Setup
- Toolbar and Menus
- Chapter 5 Configuring SPEEDLAN 4100 & 4200
- General Setup
- Interface & Advanced Interface Setup
- The Setup Buttons
- Chapter 6 Bridging Setup
- Bridge Setup
- Chapter 7 Setting Up the IP Addresses (IP Host Setup)
- Part I - Quick Overview of IP Addressing
- Part II - Setting Up the IP Address
- Chapter 8 IP-Router Setup
- IP Routing Setup
- Chapter 9 SNMP Setup
- SNMP Setup
- Chapter 10 System Access Setup
- System Access Setup
- Chapter 11 SNMP Monitoring
- Remote Statistics
- Interface Monitor
- Ethernet-like Interface Monitor
- Campus PRC Station Entries
- 11Mb RF Interface
- SNMP Monitor
- IP Monitor
- IP/TCP/UDP Monitor
- ICMP Monitor
- Chapter 12 Tables
- System Information
- Bridge Learn Table
- IP ARP Table
- IP Route Table
- IP/TCP Connection Table
- IP/UDP Listener Table
- Local IP-Address Table
- Chapter 13 Analyzing Wireless Equipment
- Select Another Device
- Analysis Polling Interval
- Wireless Link Test
- Antenna Alignment
- Glossary for Standard Data Communications
- Glossary for Standard Data Communications
- Appendix Protocols & Ethernet Addresses
- Common Ethernet Protocols
- Common Ethernet Vendor Addresses
- Common Ethernet Multicast Addresses
- Common Ethernet Broadcast Addresses
SPEEDLAN 4100 & 4200 Installation and Operation User Guide
6-8 Bridging Setup
• Interface Threshold
This setting determines the maximum number of broadcast or multicast packets that can
occur during a one-second period before a storm is declared for the assigned interface.
Once it is determined that a storm is occurring, any additional broadcast or multicast pack-
ets received on that interface will be denied until the storm is determined to be over. The
storm will be determined to be over once a one-second period has occurred with no broad-
cast or multicast packets received on that interface. The settings for broadcast packets and
multicast packets are configured independently.
• Preset Button
This button sets the broadcast and multicast storm thresholds to the recommended values.
These values have been determined to offer good protection without interfering with the
operation of the typical network. These values may need to be tuned for your particular
network.
Tunnel Partners Button
Click Tunnel Partners to encapsulate Ethernet packets received from the local interface in an IP/
UDP packet and then send them to one or more tunnel partners. Tunneling can be used to set up
virtual Ethernet networks. In the General Setup dialog box, if the Remote Bridging using IP
Tunnels is enabled, Tunnel Partners can be set up. This dialog box specifies the IP addresses of each
of the bridge/routers that are to participate in the tunnel group. Specify the addresses of all the
bridges that are participating in the tunnel group but DO NOT specify the IP addresses on this
brouter.
• Encrypt Bridge Tunnel Packets
If purchased, a brouter (from Wave Wireless) may contain a special software-encryption
algorithm that is distinct from the optional SPEEDLAN encryption chip on the brouter. If
Data Encryption is enabled on the General Setup dialog box and if an Encryption Key is
set up in the Data Encryption menu, enabling encryption here will cause all Ethernet packets
transmitted to tunnel partners to be encrypted and encapsulated inside IP packets. The IP
packet itself cannot be encrypted because industry-standard IP routers, like those on the
Internet, would not be able to forward the encrypted packets.