Eagle Manual
Eagle Manual
Eagle Manual
24
DA
LS
DA
V.24
V.24
LS/DA
2 V.24
R
1
2
2
1
LS
V.24
+24V (P2)
FAULT
STATUS
FAULT
IP-ADDRESS
+24V (P1)
IP-ADDRESS
FAULT
0V
0V
LS
1
EAGLE
Aufkleber MAC-Adresse
DA
P
+24V (P2)
LS
LS/DA
FAULT
2
FAULT
RM
STATUS
+24V (P1)
DA
k
+24V (P2)
0V
0V
g
RS2-4R
EAGLE
Aufkleber MAC-Adresse
1
0 1
RM
V.24
1 2 RING
R
V.24
+24V (P2)
2 V.24
R
1
+24V (P1)
PP
0V
0V
LS/DA
FAULT
k
x
h
0V
0V
1
FAULT
STATUS
+24V (P1)
IP-ADDRESS
IP-ADDRESS
EAGLE
Aufkleber
MAC-Adresse
Aufkleber
MAC-Adresse
FAULT
LS/DA
+24V (P2)
0V
0V
IP-ADDRESS
+24V (P1)
Aufkleber MAC-Adresse
EAGLE
FAULT
STATUS
2 V.24
R
V.24
DA
LS
DA
V.24
V.24
LS/DA
2 V.24
R
1
2
2
1
LS
V.24
+24V (P2)
FAULT
STATUS
FAULT
IP-ADDRESS
+24V (P1)
IP-ADDRESS
FAULT
0V
0V
LS
1
EAGLE
Aufkleber MAC-Adresse
DA
P
+24V (P2)
LS
LS/DA
FAULT
2
FAULT
RM
STATUS
+24V (P1)
DA
k
+24V (P2)
0V
0V
g
RS2-4R
EAGLE
Aufkleber MAC-Adresse
1
0 1
RM
V.24
1 2 RING
R
V.24
+24V (P2)
2 V.24
R
1
+24V (P1)
PP
0V
0V
LS/DA
FAULT
k
x
h
0V
0V
1
FAULT
STATUS
+24V (P1)
IP-ADDRESS
IP-ADDRESS
EAGLE
Aufkleber
MAC-Adresse
Aufkleber
MAC-Adresse
FAULT
LS/DA
+24V (P2)
0V
0V
IP-ADDRESS
+24V (P1)
Aufkleber MAC-Adresse
EAGLE
FAULT
STATUS
2 V.24
R
The naming of copyrighted trademarks in this manual, even when not specially indicated, should
not be taken to mean that these names may be considered as free in the sense of the trademark
and tradename protection law and hence that they may be freely used by anyone.
039 500-001-02-1004
Hirschmann worldwide:
Hirschmann worldwide:
U Germany
Hirschmann Electronics GmbH & Co. KG
Automation and Network Solutions
Stuttgarter Strae 45-51
D-72654 Neckartenzlingen
Tel. ++49-7127-14-1480
Fax ++49-7127-14-1502
email: ans-hi-line@nt.hirschmann.de
Internet: www.hirschmann.de
U Switzerland
Hirschmann Electronics GmbH & Co. KG, Neckartenzlingen
Niederlassung Uster
Seestr. 16
CH-8610 Uster
Tel. ++41-44905-8282
Fax ++41-44905-8289
email: ans_ch@hirschmann.ch
U France
Hirschmann Electronics S.A.S.
2, rue des Charpentiers
F-95330 Domont
Tel. ++33-1-39350100
Fax ++33-1-39350102
email: ans@hirschmann.fr
EAGLE
Release 1.02 10/04
Hirschmann worldwide:
U Great Britain
Hirschmann Electronics Ltd.
4303 Waterside Centre
Solihull Parkway
Birmingham Business Park
Birmingham
West Midlands B37 7YN
Tel. ++44-121 329 5000
Fax ++44-121 329 5001
email: enquiry@hirschmann.co.uk
U Netherlands
Hirschmann Electronics B.V.
Pampuslaan 170
NL-1382 JS Weesp
Tel. ++31-294-462591
Fax ++31-294-462554
email: ans@hirschmann.nl
U Spain
Hirschmann Electronics S.A.
Calle Traspaderne, 29
Barrio del Aeropuerto
Edificio Barajas I, 2a Planta
E-28042 Madrid
Tel. ++34-1-7461730
Fax ++34-1-7461735
email: hes@hirschmann.es
U Hungary
Hirschmann Electronics Kft.
Rokolya u. 1-13
H-1131 Budapest
Tel. ++36-1-3494199
Fax ++36-1-3298453
email: hirschmann.budapest@axelero.hu
EAGLE
Release 1.02 10/04
Hirschmann worldwide:
U USA
Hirschmann Electronics Inc.
20440 Century Boulevard, Suite 150
Germantown, MD 20874
Tel. ++1-240-686 2300
Fax ++1-240-686 3589
email: ans@hirschmann-usa.com
U Singapore
Hirschmann Electronics Pte. Ltd.
2 International Business Park #11-02/03 Tower One
The Strategy Singapore 609930
Tel: ++65 6316 7797
Fax:++65 6316 7977
email: hirschmann.svi@pacific.net.sg
U China
Hirschmann Electronics Pte Ltd Shanghai Office
Room 828, Summit Centre,
1088 West Yan An Road
Shanghai 200052
P.R. China
Tel: ++86-21 6207 6637
Fax: ++86-21 6207 6837
Mobile: ++86-1370 185 7382
E-Mail: hirschmann@sh163.net
EAGLE
Release 1.02 10/04
Hirschmann worldwide:
EAGLE
Release 1.02 10/04
Hirschmann Competence
Hirschmann Competence
In the longterm, product excellence alone is not an absolute guarantee of a
successful project implementation. Comprehensive service makes a difference worldwide. In the current scenario of global competition, the Hirschmann Competence Center stands head and shoulders above the
competition with its comprehensive spectrum of innovative services:
D Consulting incorporates comprehensive technical advice, from system
evaluation through network planning to project planning.
D Training offers you an introduction to the technological fundamentals,
product briefing and user training with certification.
D Support ranges from commissioning through the standby service to maintenance concepts.
With the Competence Center, you firmly rule out any compromise: the clientspecific package leaves you free to choose the service components that you
will use.
Internet:
http://www.hicomcenter.com
EAGLE
Release 1.02 10/04
Hirschmann Competence
10
EAGLE
Release 1.02 10/04
Safety instructions
Safety instructions
U Supply voltage
The devices are designed for operation with a safety extra-low voltage.
They may only be connected to the supply voltage connections and to
the signal contact with PELV circuits or alternatively SELV circuits with
the voltage restrictions in accordance with IEC/EN 60950.
The supply voltage is electrically isolated from the housing.
V Never start operation with damaged components!
V Relevant for North America:
The subject unit is to be suppplied by a Class 2 power source
complying with the requirements of the National Electrical Code, table
11(b). If power is redundant supplied (two individual power sources)
the power sources together should comply with the requirements of
the National Electrical Code, table 11 (b).
V Relevant for North America:
Use 60/75C or 75C copper(CU)wire only.
V Relevant fr Nordamerika:
Power, input and output (I/O) wiring must be in accordance with
Class I, Division 2 wiring methods [Article 501-4(b) of the National
Electrical Code, NFPA 70] and in accordance with the authority having
jurisdiction.
U Shielding ground
The shielding ground of the connectable twisted pair lines is connected
to the front panel as a conductor.
V Beware of possible short circuits when connecting a cable section with
conductive shielding braiding.
EAGLE
Release 1.02 10/04
11
Safety instructions
U Housing
Only technicians authorized by Hirschmann are permitted to open the
housing.
The device is grounded via the separated ground screw. It is located on
the bottom of the front panel.
V Make sure that the electrical installation meets local or nationally
applicable safety regulations.
V The ventilation slits must not be covered to ensure free air circulation.
V The distance to the ventilation slots of the housing has to be a
minimum of 10 cm.
V Never insert pointed objects (thin screwdrivers, wires, etc.) into the
inside of the subrack! Failure to observe this point may result in injuries
caused by electric shocks.
V The housing has to be mounted in upright position.
V If installed in a living area or office environment, the device must be
operated exclusively in switch cabinets with fire protection
characteristics according to EN 60950.
U Environment
The device may only be operated in the listed maximum surrounding air
temperature range at the listed relative air humidity range (noncondensing).
V The installation location is to be selected so as to ensure compliance
with the climatic limits listed in the Technical Data.
V To be used in a Pollution Degree 2 environment only.
12
EAGLE
Release 1.02 10/04
Safety instructions
EAGLE
Release 1.02 10/04
13
Safety instructions
14
EAGLE
Release 1.02 10/04
Safety instructions
U FCC note:
Appropriate testing has established that this device fulfills the
requirements of a class A digital device in line with part 15 of the FCC
regulations.
These requirements are designed to provide sufficient protection against
interference where the device is being used in a business environment.
The device creates and uses high frequencies and can radiate same,
and if it is not installed and used in accordance with this operating
manual, it can cause radio transmission interference. The use of this
device in a living area can also cause interference, and in this case the
user is obliged to cover the costs of removing the interference.
U Recycling note:
After usage, this product must be disposed of properly as electronic
waste in accordance with the current disposal regulations of your county
/ state / country.
EAGLE
Release 1.02 10/04
15
Safety instructions
16
EAGLE
Release 1.02 10/04
Content
Content
Hirschmann worldwide:
Hirschmann Competence
Safety instructions
11
1 Introduction
25
1.1
27
1.2
Product features
29
1.3
Device models
31
2 Typical
application scenarios
EAGLE
Release 1.02 10/04
33
17
Content
3 Hardware
39
3.1
Display
41
41
43
43
Recovery button
45
3.2
4 Installation and
startup procedure
47
4.1
Device installation
49
4.1.1
4.1.2
4.1.3
4.1.4
49
50
52
54
4.2
Startup operation
57
4.3
Basic settings
59
59
62
64
18
EAGLE
Release 1.02 10/04
Content
5 Configuration
65
5.1
67
67
69
Remote configuration
71
71
72
5.2
6 Web-based management
77
6.1
Overview
79
6.2
System menu
81
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
81
84
85
86
88
6.3
6.4
System:Configurations-Profiles
System:Reboot
System:Logs - Display
System:HiDiscovery
System:Signal contact
Ports menu
91
91
Redundancy
93
93
EAGLE
Release 1.02 10/04
19
Content
6.5
Network menu
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.6
6.7
6.8
20
Network:Base
Network:Transparent mode
Network:Router
Network:PPPoE
Network:PPTP
Network:Status
95
95
100
102
104
105
107
109
6.6.1
6.6.2
6.6.3
6.6.4
6.6.5
6.6.6
110
112
114
116
119
120
Firewall:Incoming
Firewall:Outgoing
Firewall:Port Forwarding
Firewall:NAT
Firewall:Extended Settings
Firewall:Logs - Display
121
6.7.1
6.7.2
6.7.3
6.7.4
6.7.5
6.7.6
122
135
138
139
140
140
VPN:Connections
VPN:Machine Certificate
VPN:L2TP
VPN Configuration, IPsec Status - Display
VPN:L2TP Status - Display
VPN:VPN Logs - Display
Services menu
141
6.8.1
6.8.2
6.8.3
6.8.4
6.8.5
6.8.6
6.8.7
141
144
145
147
149
152
154
Services:DNS
Services:DynDNS Monitoring
Services:DynDNS registration
Services:DHCP
Services:NTP
Services:Remote Logging
Services:SNMP Traps
EAGLE
Release 1.02 10/04
Content
6.9
Access menu
157
6.9.1
6.9.2
6.9.3
6.9.4
6.9.5
6.9.6
157
159
160
163
166
169
Access:passwords
Access:Language
Access:HTTPS
Access:SSH
Access:SNMP
Access:Serial line
Features:Install Update
Features:Update Server
Features:Software information - Display
Features:Hardware information
173
173
175
176
177
179
179
180
183
185
EAGLE
Release 1.02 10/04
21
Content
187
7.1
Performing a restart
189
7.2
191
7.2.1 Aim
7.2.2 Action
191
191
193
195
196
198
7.3
8 HiConfig
22
199
EAGLE
Release 1.02 10/04
Content
A Appendix
207
FAQ
209
211
SNMP traps
213
Certifications
215
Technical data
217
Literature references
221
Reader's comments
223
225
B Glossar
227
C Stichwortverzeichnis
235
EAGLE
Release 1.02 10/04
23
Content
24
EAGLE
Release 1.02 10/04
Introduction
1 Introduction
Today, Ethernet is the most widely used type of communications technology.
It has become the de facto standard in an office environment. Ethernet
technology is also gaining significance in the field of industrial automation.
In addition to the advantages of using a standardized form of communication,
Ethernet allows for a seamless infrastructure that extends from the office all
the way to the machine or sensor. Consequently, not only are process and
production data available on the field level, but they also integrate
seamlessly with interdepartmental data acquisition systems.
Despite these advantages there are new issues that must be solved to be
able to operate the installations securely and reliably. A top-priority issue is
that of security which is determined by the factors: authentication,
authorization, confidentiality, availability and data integrity.
EAGLE
Release 1.02 10/04
25
Introduction
26
EAGLE
Release 1.02 10/04
Introduction
EAGLE
Release 1.02 10/04
27
Introduction
RS2-
x
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
k
1
FAULT
MICE
+24V (P2)
+24V (P1)
0V
0V
Aufkleber MAC-Adresse
V.24
RS2-
RS2-
MICE
Fig. 1:
28
EAGLE
Release 1.02 10/04
Introduction
29
Introduction
30
EAGLE
Release 1.02 10/04
Introduction
Device identifier:
EAGLE
Release 1.02 10/04
31
Introduction
Device type
TP ports
10/100
EAGLE TX/TX
EAGLE TX/MM SC
EAGLE TX/SM SC
EAGLE TX/LH SC
EAGLE MM SC/TX
EAGLE MM SC/MM SC
EAGLE MM SC/SM SC
EAGLE MM SC/LH SC
EAGLE (FW) TX/TX
EAGLE (FW) TX/MM SC
EAGLE (FW) TX/SM SC
EAGLE (FW) TX/LH SC
EAGLE (FW) MM SC/TX
EAGLE (FW) MM SC/MM SC
EAGLE (FW) MM SC/SM SC
EAGLE (FW) MM SC/LH SC
2
1
1
1
1
2
1
1
1
1
F/O port
F/O port
multimode singlemode
100 MBit/s 1300 nm,
100 MBit/s
F/O port
singlemode
1550 nm,
100 MBit/s
1
1
1
1
2
1
1
1
1
1
1
1
1
2
1
1
1
1
32
EAGLE
Release 1.02 10/04
MACH 3002
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
unsecure
network
FAULT
Industrial Backbone
+24V (P2)
Aufkleber MAC-Adresse
+24V (P1)
0V
0V
VPN
V.24
MACH 3002
Fig. 3:
EAGLE
Release 1.02 10/04
33
34
EAGLE
Release 1.02 10/04
MICE
MICE
Cell/ Subnet 3
Cell/Subnet 2
RS2-
RS2-
RS2-
RS2-
MICE
MICE
x
x
EAGLE
EAGLE
P
FAULT
STATUS
LS/DA
1
FAULT
STATUS
2 V.24
R
IP-ADDRESS
2 V.24
R
IP-ADDRESS
P
LS/DA
1
2
+24V (P2)
0V
0V
FAULT
Aufkleber MAC-Adresse
+24V (P2)
Aufkleber MAC-Adresse
+24V (P1)
0V
0V
FAULT
+24V (P1)
V.24
V.24
MICE
RS2-
Industrial Backbone /
Subnet 1
RS2-
MACH 3002
Fig. 4:
EAGLE
Release 1.02 10/04
35
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
k
1
MICE
+24V (P2)
Aufkleber MAC-Adresse
+24V (P1)
0V
0V
FAULT
V.24
RS2-
RS2-
MICE
Fig. 5:
36
EAGLE
Release 1.02 10/04
MACH 3002
MACH 3002
Industrial Backbone
Industrial Backbone
FAULT
STATUS
2 V.24
R
IP-ADDRESS
k
1
unsecure
network
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
k
1
2
Aufkleber MAC-Adresse
V.24
Fig. 6:
g
+24V (P1)
Aufkleber MAC-Adresse
FAULT
0V
0V
+24V (P1)
+24V (P2)
+24V (P2)
FAULT
IP-ADDRESS
EAGLE
P
LS/DA
0V
0V
V.24
EAGLE
Release 1.02 10/04
37
38
EAGLE
Release 1.02 10/04
Hardware
3 Hardware
1
DA
FAULT
0V
0V
+24V (P2)
V.24
Fig. 7:
V.24
V.24
V.24 interface
external
management
and modem
TX
g
+24V (P1)
+24V (P2)
FAULT
+24V (P1)
DA
0V
0V
LS
g
+24V (P1)
Aufkleber MAC-Adresse
DA
Port 1
(trusted)
LS
V.24
Port 1 and 2
TX (RJ45 connector, autonegotiaton
+ autopolarity + autocrossing)
or FX (SC connector; multimode,
singlemode, longhaul)
LS
Aufkleber
MAC-Adresse
Aufkleber
MAC-Adresse
FAULT
+24V (P2)
0V
0V
+24V (P1)
Aufkleber MAC-Adresse
Recovery button
LS
2 V.24
R
EAGLE TX/TX
EAGLE TX/MM SC
EAGLE TX/SM SC
EAGLE TX/LH SC
EAGLE MM SC/TX
EAGLE MM SC/MM SC
EAGLE MM SC/SM SC
EAGLE MM SC/LH SC
x
x
x
x
EAGLE FW TX/TX
EAGLE FW TX/MM SC
EAGLE FW TX/SM SC
EAGLE FW TX/LH SC
EAGLE FW MM SC/TX
EAGLE FW MM SC/MM SC
EAGLE FW MM SC/SM SC
EAGLE FW MM SC/LH SC
x
x
x
x
Port 2
(untrusted)
g
LH
SM
2 V.24
R
LED display
elements
FAULT
STATUS
MM
TX
DA
LS/DA
LH
FAULT
STATUS
SM
MM
LS/DA
EAGLE
IP-ADDRESS
Aufkleber MAC-Adresse
FAULT
RM
STATUS
FAULT
IP-ADDRESS
2
0 1
RM
V.24
1 2 RING
R
V.24
+24V (P2)
2 V.24
R
0V
0V
LS/DA
EAGLE
IP-ADDRESS
PP
FAULT
STATUS
FAULT
+24V (P2)
LS/DA
RS2-4R
EAGLE
IP-ADDRESS
IP-ADDRESS
x
h
0V
0V
EAGLE
+24V (P1)
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Front view
EAGLE
Release 1.02 10/04
39
Hardware
40
EAGLE
Release 1.02 10/04
Hardware
3.1 Display
3.1 Display
EAGLE
FAULT
STATUS
LS/DA
1
Fig. 8:
2 V.24
R
Display
EAGLE
Release 1.02 10/04
Meaning
Supply voltage 1 is present.
Supply voltage 1 is less than 9.6 V.
41
Hardware
3.1 Display
Meaning
Supply voltage 2 is present.
Supply voltage 2 is less than 9.6 V.
Meaning
The indicator contact is open, i.e. it indicates an error.
The indicator contact is closed, i.e. it does not indicate an error.
If the Operational supervision on page 88 is active for the signal contact, then the error display is independant of the signal contact position.
Meaning
Initialization of the device.
Device is operational.
42
Meaning
Error in memory operation.
Loading the configuration from the ACA.
Saving the configuration to the ACA.
EAGLE
Release 1.02 10/04
Hardware
3.1 Display
Meaning
No valid link.
Valid link.
Receiving data.
Initialization phase after a reset.
EAGLE
Release 1.02 10/04
43
Hardware
44
3.1 Display
EAGLE
Release 1.02 10/04
Hardware
EAGLE
Release 1.02 10/04
45
Hardware
46
EAGLE
Release 1.02 10/04
4 Installation and
startup procedure
The EAGLE industrial firewall/VPN system has been developed for practical
applications in a harsh industrial environment. Accordingly, the installation
process has been kept simple. The few configuration settings required for
operation are described in this chapter.
Note: For security reasons, change the root and the administrator passwords
when you initially change the configuration.
EAGLE
Release 1.02 10/04
47
Before
RS2-
MICE
RS2-
RS2-
MICE
After
RS2-
x
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
k
1
2
Aufkleber MAC-Adresse
MICE
+24V (P2)
0V
0V
+24V (P1)
FAULT
V.24
RS2-
RS2-
MICE
Fig. 9:
48
EAGLE
Release 1.02 10/04
U Supply voltage
The supply voltage can be connected redundantly. Both inputs are
uncoupled. There is no distributed load. With redundant supply, the
transformer supplies the device alone with the higher output voltage.
The supply voltage is electrically isolated from the housing.
U Signal contact
The signal contact monitors proper functioning of the device,
thus enabling remote diagnostics.
A break in contact is reported via the potential-free signal contact
(relay contact, closed circuit):
D The failure of at least one of the two supply voltages (supply voltage 1
or 2 < 9,6 V).
D A continuous malfunction in the device (internal 3.3 VDC voltage).
D The defective link status of at least one port. With the device the
indication of link status can be masked by the management for each
port. Link status is not monitored in the delivery condition.
D Error during self-test.
EAGLE
Release 1.02 10/04
49
+24 V (P1)
0V
0V
+24 V (P2)
Fault
Fig. 10:
V Pull the terminal block off the device and connect the power supply and
signal lines.
4.1.2 Assembly
On delivery, the device is ready for operation.
V Attach the upper snap-in guide of the device into the top-hat rail and press
it down against the top-hat rail until it snaps into place.
50
EAGLE
Release 1.02 10/04
Fig. 11:
Assembly
Note: The front panel of the housing is grounded via a ground connection.
Note: The housing must not be opened.
Note: The shielding ground of the industrial connectable twisted pair lines is
connected to the front panel as a conductor.
EAGLE
Release 1.02 10/04
51
4.1.3 Interfaces
U 10/100 Mbit/s connection
10/100 Mbit/s ports (8-pin R45 socket) enable the connection of terminal
devices or independent network segments in compliance with the
IEEE 802.3 100BASE-TX / 10BASE-T standards. These ports support:
D auto-negotiation
D autocrossing (when autonegotiation is switched off)
D autopolarity
D 100 Mbit/s half duplex mode
D 100 Mbit/s full duplex mode
D 10 Mbit/s half duplex mode
D 10 Mbit/s full duplex mode
State on delivery: Autonegotiation activated. Alternative to the Webbased interface (see Ports:Configuration Table on page 91), the
HiConfig interface (see HiConfig on page 199) allows you to change
this setting. While you have access to the Web-based interface of the
EAGLE via the secure and insecure port, you can also reach the
HiConfig interface via the V.24 port.
The socket housings are electrically connected to the front panel.
n.c.
n.c.
TDn.c.
n.c.
TD+
RDRD+
Fig. 12:
Pin 8
Pin 7
Pin 6
Pin 5
Pin 4
Pin 3
Pin 2
Pin 1
52
EAGLE
Release 1.02 10/04
Note: Make sure, that you conncet LH ports only to LH ports, SM ports
only to SM ports and MM ports only to MM ports.
RJ11
DB9
Pin 5
Pin 8
Pin 6
Pin 1
Pin 1
CTS
n.c.
TX
GND
RX
RTS
Fig. 13:
1
2
3
4
5
6
2
3
5
EAGLE
Release 1.02 10/04
53
RJ11
DB9
Pin 1
Pin 7
Pin 6
Pin 1
Pin 5
CTS
n.c.
TX
GND
RX
RTS
Fig. 14:
1
2
3
4
5
6
1
2
3
4
5
6
7
8
9
4.1.4 Disassembly
V In order to remove the device from the top-hat rail, move the screwdriver
horizontally under the chassis in the locking gate, pull this down without
tilting the screwdriver and fold the device up.
54
EAGLE
Release 1.02 10/04
Fig. 15:
Disassembly
EAGLE
Release 1.02 10/04
55
56
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
57
58
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
59
Fig. 16:
HiDiscovery
60
EAGLE
Release 1.02 10/04
By double-clicking a line, you open a window in which you can enter the
device name and the IP parameter.
Fig. 17:
Note: For security reasons, switch off the HiDiscovery function for the device
in the Web-based management, after you have assigned the IP parameters
to the device.
EAGLE
Release 1.02 10/04
61
62
EAGLE
Release 1.02 10/04
Fig. 18:
If no IP address has been entered for the standard gateway in this dialog
box, e.g. because Obtain an IP address automatically has been
activated, enter an IP addresses manually. To do so, first activate Use
the following IP address and then enter, as an example, the following
addresses:
IP address:192.168.1.2
Subnet mask:255.255.255.0
Standard gateway:192.168.1.1
Note: Do not - under any circumstances - set the configuration computer
to an address like 1.1.1.2!
V On the DOS level (Start:Programs:Accessories:Command
Prompt), enter:
arp
-s
EAGLE
Release 1.02 10/04
aa-aa-aa-aa-aa-aa
63
Example:
You have determined that the address of the standard gateway is:
192.168.1.1
Then the command should be:
arp -s
192.168.1.1
aa-aa-aa-aa-aa-aa
64
EAGLE
Release 1.02 10/04
Configuration
5 Configuration
Requirements
D When you make the initial configuration, there must be a valid connection
at both network ports (secure and insecure). If this not be possible, enter
a standard gateway on the configuration computer (see the example on
page 63).
D For local configuration:
The computer with which you make the configuration must be either
directly connected to the device,
or it must be connected to it via the local network.
D For remote configuration on the insecure port:
The EAGLE must be configured in such a way that it allows remote
configuration.
D The EAGLE must be switched on, i.e. must be connected to a power
supply unit so that it is supplied with current.
D The EAGLE must be connected, i.e. the required connections must
function properly.
EAGLE
Release 1.02 10/04
65
Configuration
66
EAGLE
Release 1.02 10/04
Configuration
Mode
Transparent
Router or PPPoE
Address
https://1.1.1.1/
https://192.168.1.1/
Proceed as follows:
V Start a Web browser.
(For example, MS Internet Explorer Version 5.0 or later or Netscape
Communicator Version 4.0 or later; the Web browser must support SSL
(i.e. https).)
EAGLE
Release 1.02 10/04
67
Configuration
V Make certain that the browser does not automatically setup a connection
when it starts, because otherwise the connection startup to the EAGLE
could be impaired.
In MS Internet Explorer, you can prevent this with the following setting:
In the Extras menu, select Internet Options... and click on
the Connections tab. Make certain that "Never dial a connection" is
selected under Dial-up and Virtual Private Network settings.
V Enter the complete address of the EAGLE into the browser's address
field.
Afterwards:
The EAGLE's Administrator Web page will be displayed. The security
notice shown on the next page will displayed.
Note: If the Administrator Web page is not displayed...
If - even after repeated attempts - the browser still reports that the page
cannot be displayed, try the following:
D Check if both ports have a network connection.
D Check whether the standard gateway has been initialized on the
connected configuration system. See System configuration via Webbased management on page 62.
D Try disabling any existing firewall.
D Make certain that the browser does not use a proxy server.
In MS Internet Explorer (Version 6.0), you can prevent this with the
following setting: In the Extras menu, select Internet Options...
and click on the Connections tab. Under LAN Settings click on the
Properties... button and, in the Local Area Network (LAN)
Settings dialog, check to make certain that Use a proxy server for
your LAN (under Proxy server) is not activated.
D If any other LAN connection is active on the system, deactivate it until the
configuration has been completed.
Under the Windows Start menu:Settings:Control
Panel:Network Connections or Network and Dial-up
Connections, right click on the associated icon and select Disable in
the pop-up menu.
68
EAGLE
Release 1.02 10/04
Configuration
Fig. 19:
Name
Login
Passwort
Entry
admin
private
EAGLE
Release 1.02 10/04
69
Configuration
Fig. 20:
70
EAGLE
Release 1.02 10/04
Configuration
EAGLE
Release 1.02 10/04
71
Configuration
U Local installation:
V Connect your modem on the one end to the telephone network and
on the other end to the V.24 port of the EAGLE via the mode cable
(see Accessories on page 220).
U Remote installation:
V Connect your PC to the telephone network via the built-in or external
modem.
RS2-
x
EAGLE
INSYS
P
FAULT
STATUS
LS/DA
1
IP-ADDRESS
k
1
MICE
+24V (P2)
Aufkleber MAC-Adresse
+24V (P1)
FAULT
g
0V
0V
Telephone line
2 V.24
R
V.24
Modem
RS2-
unsecure
network
RS2-
MICE
Fig. 21:
72
EAGLE
Release 1.02 10/04
Configuration
Fig. 22:
Select "Properties" to
check the settings for
the connection (see the
following two figures).
Fig. 23:
Establishing a connection
EAGLE
Release 1.02 10/04
73
Configuration
Fig. 24:
Fig. 25:
74
EAGLE
Release 1.02 10/04
Configuration
After a connection has been set up, the connection symbol will appear in
the task bar tray at the bottom right.
V Left-click the connection symbol and select Status.
V In the status window click the register card "Details".
This register card contains the
IP address of the EAGLE (= server IP address).
V Enter htpps:// followed by this IP address in the address bar of your
browser to establish the connection to the EAGLE's Web-based
administrator user interface.
Requirement: Configuration of the serial interface (see the following
figure).
Fig. 26:
EAGLE
Release 1.02 10/04
75
Configuration
76
EAGLE
Release 1.02 10/04
Web-based management
6 Web-based management
The EAGLE supports both SNMP management and Web-based
management and can thus offer
D extensive diagnostic and configuration functions for fast startup and
D extensive network and device information.
The EAGLE supports the TCP/IP protocol family.
The user-friendly Web-based interface gives you the option of managing the
MICE from any location in the network via a standard browser such as the
Netscape Navigator/Communicator or the Microsoft Internet Explorer.
The Web-based interface allows you to graphically configure the EAGLE.
EAGLE
Release 1.02 10/04
77
Web-based management
78
EAGLE
Release 1.02 10/04
Web-based management
6.1 Overview
6.1 Overview
The Overview dialog shows you a graphic display of the EAGLE and the
system data:
D Name: any name you wish to assign to the EAGLE for easier
identification.
D Location: Location of this EAGLE.
D Power supply 1/2: Status of the power supply units.
D Uptime: Time that has elapsed since the EAGLE was last restarted.
D Temperature, displays the temperature inside the EAGLE. Enter the
lower and upper temperatures as alarm thresholds.
Fig. 27:
System data
EAGLE
Release 1.02 10/04
79
Web-based management
80
6.1 Overview
EAGLE
Release 1.02 10/04
Web-based management
Fig. 28:
Configuration profiles
EAGLE
Release 1.02 10/04
81
Web-based management
Stored
configuration
profile
Fig. 29:
82
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
83
Web-based management
6.2.2 System:Reboot
At the end of restart, the text appears Restarted.
A reboot can be initiated by switching the device off and then back again or
by pressing the Recovery button (see Performing a restart on page 189).
Fig. 30:
84
Reboot
EAGLE
Release 1.02 10/04
Web-based management
Fig. 31:
Logs
EAGLE
Release 1.02 10/04
85
Web-based management
6.2.4 System:HiDiscovery
The HiDiscovery protocol allows you to assign the EAGLE an IP address
based on its MAC address. Activate the HiDiscovery protocol if you want
to assign an IP address to the EAGLE from your PC with the enclosed
HiDiscovery software (setting on delivery: active).
Note: For security reasons, the EAGLE HiDiscovery function supports only
the secure port
Fig. 32:
HiDiscovery
86
EAGLE
Release 1.02 10/04
Web-based management
MACH 3002
x
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
MICE
Industrial Backbone
Aufkleber MAC-Adresse
+24V (P2)
0V
0V
+24V (P1)
FAULT
V.24
MACH 3002
Subnet 1
RS2-
RS2-
MICE
Fig. 33:
Network Management
EAGLE
Release 1.02 10/04
87
Web-based management
U Signal contact
Setting the function of the signal contact:
D Operational supervision
D Manual setting
U Operational supervision
A break in contact is reported via the zero-potential signal contact
(relay contact, closed circuit):
D the failure of at least one of the two supply voltages (power supply
voltage 1 or 2 < 9,6 V).
Note: With a non-redundant supply of the supply voltage, the EAGLE will
report a supply power failure. You can prevent this by
feeding the supply voltage over both inputs or
by selecting Ignore redundant power supply.
D the defective link status of at least one port. The link status message
can be masked for
Ignore: no link monitor
Supervise only internal port (trusted)
Supervise only external port (untrusted)
Supervise both ports
Link status is not monitored in the delivery condition.
U Manual settings
This mode gives you the option of remote switching the signal contact.
V Select Open (Alarm) to open the contact.
V Select Closed to close the contact.
88
EAGLE
Release 1.02 10/04
Web-based management
Application options:
D Simulation of an error during SPS error monitoring.
D Remote control of a device via SNMP, such as switching on a camera.
Fig. 34:
Signal contact
EAGLE
Release 1.02 10/04
89
Web-based management
90
EAGLE
Release 1.02 10/04
Web-based management
Fig. 35:
Port configuration
U Automatic Configuration
In the Automatic Configuration (Autonegotiation) column, you can
activate the automatic selection of a port's operating mode by marking
the appropriate field. After the au-tonegotiation has been switched on,
it takes a few seconds for the oper-ating mode to be set.
EAGLE
Release 1.02 10/04
91
Web-based management
U Manual Configuration
In the Manual Configuration column, you set the operating mode for
this port. The choice of operating modes depends on the media module.
The possible operating modes are:
D 10 Mbit/s half duplex (HDX),
D 10 Mbit/s full duplex (FDX),
D 100 Mbit/s HDX and
D 100 Mbit/s FDX.
Note: The active automatic configuration has priority over the manual
configuration.
92
EAGLE
Release 1.02 10/04
Web-based management
6.4 Redundancy
6.4 Redundancy
6.4.1 Redundancy:Layer 2 Redundancy
This dialog offers you the option of including the EAGLE in the path of the
Redundant Ring /Network Coupling or Dual Homing (requirement for Dual
Homing: redundancy check is deactivated in the MACH 3000).
V For this application select the operating mode
Multi-client transparent mode.
Fig. 36:
Layer 2 Redundancy
EAGLE
Release 1.02 10/04
93
Web-based management
6.4 Redundancy
U Redundancy port
Select the port that leads directly to the coupling switch (see Fig. 37).
MICE
Stand-by switch
Cell 1
MICE
RS2-
RS2-
Coupling switch
x
EAGLE
EAGLE
FAULT
STATUS
LS/DA
FAULT
STATUS
2 V.24
R
IP-ADDRESS
IP-ADDRESS
LS/DA
2 V.24
R
2
2
Aufkleber MAC-Adresse
+24V (P2)
0V
0V
Redundancy port
FAULT
g
+24V (P1)
Aufkleber MAC-Adresse
+24V (P2)
0V
0V
+24V (P1)
V.24
FAULT
V.24
MACH 3002
MACH 3002
Industrial Backbone
MACH 3002
Fig. 37:
94
EAGLE
Release 1.02 10/04
Web-based management
Fig. 38:
Network:Base
Variable
in transparent mode
in router mode
in PPPoE mode
Local netmask
IP address
1.1.1.1
192.168.1.1
192.168.1.1
255.255.255.0
EAGLE
Release 1.02 10/04
95
Web-based management
Note: When the Network Mode has been changed, the device will reboot
automatically.
Note: If you change the address of the EAGLE (e.g. by changing the Network
Mode from Stealth to Router), the device will be immediately, after a restart,
only accessible at the new address. See System configuration via Webbased management on page 62.
Note: If you set the Network Mode to Router, PPPoE or PPTP and then
change the internal IP address and/or the local netmask, make very certain
that you enter the correct values. Otherwise, the EAGLE will no longer be
accessible.
U Network mode
D Transparent mode
The Transparent mode is used to connect an individual (single client,
SCT) or several devices (multi-client, MCT) to secure port (state on
delivery: Multi-client transparent mode).
Integrate the EAGLE into the existing network. The IP parameters of
the existing network do not need to be reconfigured (see Fig. 9).
The EAGLE analyzes the flowing network traffic and configures its
network connection automatically and operates transparently, i. e.
without the client having to be reconfigured.
Here you can enter the local IP parameters of the EAGLE. These
parameters allow you access to the management of the EAGLE.
The firewall security function is available in the SCT and MCT mode.
The VPN security function is available in SCT.
Note: If transparent is selected as the network mode, no entries need
to be made under Internal IPs and additional internal routers. Existing
entries under these points are ignored.
96
EAGLE
Release 1.02 10/04
Web-based management
D Router mode
If the EAGLE is not in transparent mode, it functions as a normal
router and consequently has an external and internal IP address.
The security functions firewall and VPN are available.
Note: If the EAGLE is operated in router mode, a locally connected client
computer of the EAGLE must be defined as the standard gateway, i.e. the
address of the standard gateway must be set to the internal IP address of
the EAGLE (see IP configuration for the Windows clients on page 149.)
Note: If the EAGLE is operated in Router mode and is used to establish
the connection to the Internet, you should activate NAT to allow access
to the Internet from the local network (see Firewall:NAT on page 116).
If NAT is not activated, the device will only allow VPN connections.
D PPPoE mode
The PPPoE mode corresponds to router mode with DHCP with one
difference: To connect to an external network (Internet, WAN) the
PPPoE protocol is used as in Germany which is used by many
DSL modems (for DSL Internet access). The external IP address,
at which the EAGLE can be reached from a remote terminal, is
determined dynamically by the provider.
Address of the device (for configuration purposes):
IP address: 192.168.1.1
Local network mask: 255.255.255.0
Note: If the EAGLE is operated in PPPoE mode, a locally connected
client computer of the EAGLE must be defined as the standard gateway,
i.e. the address of the standard gateway must be set to the internal IP
address of the EAGLE (see IP configuration for the Windows clients on
page 149.)
Note: If the EAGLE is in PPPoE mode, NAT must be activated to enable
access to the Internet (see Firewall:NAT on page 116). If NAT is not
activated, the device will only allow VPN connections.
D PPTP Mode
This mode is similar to PPPoE mode. In Austria, for example,
PPTP is used instead of the PPPoE protocol for DSL connections.
PPTP is the protocol, which was originally used by Microsoft for
VPN connections.
EAGLE
Release 1.02 10/04
97
Web-based management
Note: If the EAGLE is operated in PPTP mode, you must set it as the
standard gateway in the locally connected client computers. In other
words, the address entered for the standard gateway must be the internal
IP address of the EAGLE (see IP configuration for the Windows clients
on page 149).
Note: If the EAGLE is in PPTP mode, NAT must be activated to enable
access to the Internet (see Firewall:NAT on page 116). If NAT is not
activated, the device will only allow VPN connections.
U Internal IPs
Router / PPPoE / PPTP mode
Internal IPs is the IP address, under which the EAGLE can be
accessed from the locally connected LAN.
Default setting:
IP address: 192.168.1.1
Lokal Netmask: 255.255.255.0
You can also specify other addresses, under which the EAGLE can be
accessed by devices on the locally connected network. This can be
useful, for example, if the locally connected network is divided into
subnetworks. In this case, multiple units on different subnetworks can
access the EAGLE under different addresses
V If you wish to define another internal IP, click on New.
V If you wish to delete an internal IP, click on Delete.
The first IP address in the list cannot be deleted.
98
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
99
Web-based management
Fig. 39:
Network:Transparent mode
100
EAGLE
Release 1.02 10/04
Web-based management
U Multiple-Client:
Several devices to be protected are connected to the EAGLE
(default settings). The EAGLE does not support VPN in MCT mode.
Enter the IP parameters under IP local configuration.
EAGLE
Release 1.02 10/04
101
Web-based management
6.5.3 Network:Router
Requirement: The EAGLE has been set to the network mode Router.
Fig. 40:
Network:Router
U External interface
Obtain external configuration via DHCP: Yes / No.
V If the EAGLE obtains the configuration data per DHCP (Dynamic Host
Configuration Protocol) from the DHCP server, set Yes. No other
information is necessary.
V If the EAGLE does not obtain the data via DHCP (Dynamic Host
Configuration Protocol) from the DHCP server, set No.
The EAGLE must then operate in the network mode Router
(see Router mode on page 97). You must then make provide
further information:
102
EAGLE
Release 1.02 10/04
Web-based management
U Default Route
Default Route via IP
Is determined by the Internet service provider (ISP), when the EAGLE
sets up the gateway to the Internet. If the EAGLE is used within the LAN,
the route from the network administrator is specified.
Note: If the local network is not known to the external router, e.g. in the
case of configuration by DHCP, enter the address of your local network
under Firewall:NAT, in other words 0.0.0.0/0
(see Firewall:NAT on page 116).
EAGLE
Release 1.02 10/04
103
Web-based management
6.5.4 Network:PPPoE
Requirement: The EAGLE has been set to the network mode PPPoE.
(see PPPoE mode on page 97).
User name (login) and password are requested by the Internet Service
Provider (ISP), when you wish to establish a connection with the Internet.
Fig. 41:
Network:PPPoE
U PPPoE Login
In this field, enter the user name (Login), which is expected by your
Internet Service Provider when you setup a connection to the Internet.
U PPPoE Password
In this field, enter the password, which is expected by your Internet
Service Provider when you setup a connection to the Internet.
104
EAGLE
Release 1.02 10/04
Web-based management
6.5.5 Network:PPTP
Requirement: The EAGLE has been set to the network mode PPTP
(see PPTP Mode on page 97).
User name (Login) and password are requested by the Internet service
provider (ISP), when you wish to establish a connection with the Internet.
Fig. 42:
Network:PPTP
U PPPoE Login
In this field, enter the user name (Login), which is expected by your
Internet Service Provider when you setup a connection to the Internet.
U PPPoE Password
In this field, enter the password, which is expected by your Internet
Service Provider when you setup a connection to the Internet.
EAGLE
Release 1.02 10/04
105
Web-based management
U Set local IP
Via DHCP
If the address data for access to the PPTP server is supplied by the
Internet service provider per DHCP, select via DHCP.
You do not have to make an entry under Local IP.
Modem IP. This is the address of the PPTP server of the Internet Service
Provider.
static (following field)
If the address data for accessing the PPTP server is not supplied by the
Internet service provider per DHCP, the IP address must be specified as
a local IP address for the PPTP server.
Local IP. IP address, at which the EAGLE can be reached from the
PPTP server.
Modem IP. This is the address of the PPTP server of the Internet Service
Provider.
106
EAGLE
Release 1.02 10/04
Web-based management
6.5.6 Network:Status
U Network mode
Displays the current operating mode of the EAGLE: Transparent (SCT/
MCT), router, PPPoE or PPTP (see Network:Base on page 95).
U External IP
The IP address of the EAGLE at its connection for the insecure network
(WAN or Internet).
If the EAGLE is assigned an IP address dynamically, you can look up the
currently valid IP address here.
In transport mode, the EAGLE takes on the local IP address
(see Network:Transparent mode on page 100).
U Default gateway
The default gateway address is shown here that is entered in the
EAGLE.
Fig. 43:
Network:Status
EAGLE
Release 1.02 10/04
107
Web-based management
108
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
109
Web-based management
6.6.1 Firewall:Incoming
Lists the firewall rules that have been set. They apply to incoming data
packets that are initiated externally.
Note: If no rule has been set, all incoming connections (except for VPN)
are rejected (= factory setting).
Fig. 44:
Firewall:Incoming
U Deleting a rule
V Click on the Delete button next to the entry. Then click on OK.
110
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
111
Web-based management
6.6.2 Firewall:Outgoing
Lists the firewall rules that have been established. They apply to outgoing
data connections that are initiated internally. The default setting allows all
packets to pass through.
With the default rule, all outgoing connections are permitted to pass through.
Fig. 45:
Firewall:Outgoing
U Deleting a rule
V Click on the Delete button next to the entry. Then click on OK.
112
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
113
Web-based management
Fig. 46:
Firewall:Port Forwarding
U Deleting a rule
V Click on the Delete button next to the entry. Then click on OK.
114
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
115
Web-based management
6.6.4 Firewall:NAT
For outgoing addresses the EAGLE can translate the specified sender IP
addresses from its internal network (in the example below: 192.168.x.x)
into its own external address (in the example below: 148.218.112.7 or
149.218.112.8). The EAGLE can break down the assignment of the
incoming data packets using the logical ports.
This method is used if the internal addresses cannot or should not be
routed externally, for example, because a private address range such
as 192.168.x.x is being used or the internal network structure is to be
concealed.
This procedure is also referred to as IP masquerading.
The dialog lists the defined rules for NAT (Network Address Translation).
U Principle of IP masquerading
For addressing purposes, TCP/IP uses so-called port numbers
(UDP, TCP) for the source and destination in addition to the IP
addresses.
Masquerading makes use of this feature.
If the EAGLE receives a data packet in router mode at a secure port,
it will then enter the IP address of the sender (source) and the port in
an internal table. The EAGLE assigns this table entry its own IP port
address and a random port number as new source information.
The EAGLE then forwards the data packet with this new information
at the insecure port.
This is how the receiver sends its reply to this data packet to the EAGLE.
The EAGLE in turn forwards the reply back to the original address using
its internal address.
This method permits a communication request from the the secure to the
insecure network, for example, for one computer located in cell 3 to a
computer in the industrial backbone (see the figure below).
116
EAGLE
Release 1.02 10/04
Web-based management
192.168.0.3
192.168.0.3
MICE
MICE
Cell 3
Cell 2
192.168.0.1
192.168.0.2
192.168.04
192.168.04
RS2-
RS2-
RS2-
RS2-
192.168.0.1
MICE
MICE
x
x
EAGLE
EAGLE
148.218.112.7
FAULT
STATUS
2 V.24
R
IP-ADDRESS
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
P
LS/DA
+24V (P2)
FAULT
+24V (P2)
Aufkleber MAC-Adresse
Aufkleber MAC-Adresse
+24V (P1)
0V
0V
FAULT
+24V (P1)
148.218.112.6
0V
0V
192.168.0.1
V.24
V.24
148.218.112.8
148.218.112.9
MICE
Industrial Backbone
Fig. 47:
RS2-
EAGLE
Release 1.02 10/04
117
Web-based management
Fig. 48:
Firewall:NAT
U Deleting a rule
V Click on the Delete button next to the entry. Then click on OK.
118
EAGLE
Release 1.02 10/04
Web-based management
Fig. 49:
Firewall:Extended Settings
EAGLE
Release 1.02 10/04
119
Web-based management
120
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
121
Web-based management
6.7.1 VPN:Connections
Lists the VPN connections that have been setup.
All of the listed connections may be active at the same time.
Fig. 50:
VPN:Connections
122
EAGLE
Release 1.02 10/04
Web-based management
Fig. 51:
VPN:Connections:Connection
U Deleting a connection
V Click Delete next to the respective entry. Then OK.
U Active
Determine if the connection is to be active (=Yes) or not (= No).
EAGLE
Release 1.02 10/04
123
Web-based management
124
EAGLE
Release 1.02 10/04
Web-based management
192.168.208.2
MACH 3002
x
unsecure
network
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
k
1
FAULT
Industrial Backbone
+24V (P2)
+24V (P1)
Aufkleber MAC-Adresse
g
0V
0V
VPN
V.24
192.168.206.10
MACH 3002
192.168.208.11
192.168.208.1
Fig. 52:
Dialog
Network:Base
Network:Router
VPN:L2TP
Setting
Internal IP
Netmask
Network Mode
DHCP
External IP
Netmask
Start L2TP Server for L2TP
Local IP for L2TP connections
Assignment of IPs for L2TP remote site
VPN:Connections Active
VPN:IPsec State Gateway
Value
192.168.208.11
255.255.255.0
Router
No
192.168.206.11
255.255.255.0
Yes
10.106.106.2
10.106.106.2
10.106.106.254
Yes
192.168.206.11
EAGLE
Release 1.02 10/04
125
Web-based management
U Connection type
Connection type
Tunnels
(Network <> Network)
annotation
This type of connection is not only suitable in every case,
but also the most secure. In this mode, the IP datagrams are
completely encrypted before they are sent with a new header
to the remote sites VPN gateway the tunnel end. There the
transferred datagrams are decypted to restore the original
datagrams. These are then passed on to the destination
system.
Transport (Host <> Host) In this type of connection, the device only encrypts the data of
the IP packets. The IP header information remains in the clear
(unencrypted).
Transport
If this type of connection is activated on the remote system, the
(L2TP Microsoft Windows) EAGLE will also take this setting - Transport (L2TP
Microsoft Windows) - and will function accordingly.
In other words, the L2TP/PPP protocol will create a tunnel
within the IPsec transport connection. The locally connected
L2TP system will be assigned its IP address dynamically.
If you select the connection type Transport (L2TP
Microsoft Windows), set Perfect Forward
Secrecy (PFS) to No (see below). As soon as the IPsec/
L2TP connection is started under Windows, a dialog will appear
to prompt you to enter your user name and password. You can
make any entry that you want in this dialog, since the X.509
certificate has already provided your authentication, the EAGLE
will ignore these entries.
Transport
If this type of connection is activated on the locally connected
(L2TP SSH Sentinel)
system, the EAGLE will also take this setting - Transport
(L2TP SSH Sentinel) - and will function accordingly. In other
words, the L2TP/PPP protocol will create a tunnel within the
IPsec transport connection. The locally connected L2TP system
will be assigned its IP address dynamically.
126
EAGLE
Release 1.02 10/04
Web-based management
U Initiating a connection
There are 2 options:
Start a connection to the remote side
Wait for the remote side [to setup a connection]
D Start a connection to the remote side
In this case, the local EAGLE sets up the connection to the remote
side. The fixed IP address or domain name of the remote side must
be entered in Address of the remote site's VPN gateway
(see above) field.
D Wait for the remote side [to setup a connection]
In this case, the local EAGLE is ready to accept a connection, which
a remote site actively initiates and sets up to the local EAGLE.
The entry in the Address of the remote site's VPN gateway
(see above) field may be: %any.
If the EAGLE should only accept a connection initiated by a specific
remote site (which has a fixed IP address), enter its IP address or
hostname to be on the safe side.
Note: If the EAGLE operates in single-client transparent mode, this
setting has no effect, i.e. it is ignored and the connection is initiated
automatically if the EAGLE notices that the connection is to be used.
In multi-client transparent mode, no VPN is possible.
EAGLE
Release 1.02 10/04
127
Web-based management
U Authentication method
There are 2 options:
X.509 Certifikate and
Pre-Shared Key
D X.509 Certificate
This method is supported by most of the newer IPsec implementations
and is currently considered the most secure. In this case, the EAGLE
uses the public key of the remote site (filename *.cer or *.pem) to
encrypt the authentication datagram before it sends to the remote site,
the tunnel end. (You must have received this *.cer or *.pem file
from the operator at the remote site - perhaps on a diskette or attached
to an e-mail).
To make this public key available to the EAGLE, proceed as follows:
Requirement: You have saved the *.cer- or *.pem file on the
computer.
Click Configure.
Result: The screen VPN:connections:connection xyz:X.509 certificate
appears. (xyz represents the name of the connection.)
Search... click and select the file.
Click Import.
After the import, the contents of the new certificate is displayed see the following figure. For an explanation of the information
displayed, see the Chapter VPN:Machine Certificate on page 135.
Fig. 53:
128
Public key
EAGLE
Release 1.02 10/04
Web-based management
Fig. 54:
EAGLE
Release 1.02 10/04
129
Web-based management
130
EAGLE
Release 1.02 10/04
Web-based management
U Tunnel settings
D The address of the local network
D The related network mask
These entries specify the address of the client (network or computer),
that is directly connected to the secure port of the EAGLE which the
EAGLE is protecting. The address designates the local endpoint of
the connection.
MACH 3002
MACH 3002
Industrial Backbone
Industrial Backbone
FAULT
STATUS
2 V.24
R
IP-ADDRESS
k
1
unsecure
network
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
k
1
2
Aufkleber MAC-Adresse
V.24
g
+24V (P1)
+24V (P2)
Aufkleber MAC-Adresse
+24V (P1)
0V
0V
FAULT
+24V (P2)
FAULT
IP-ADDRESS
EAGLE
P
LS/DA
0V
0V
V.24
to the remote
terminal
EAGLE
Release 1.02 10/04
131
Web-based management
Example:
If the computer connected to the EAGLE is the one you are using to
configure the device, the entries could then be:
Address of the local network: 192.168.1.1
The related network mask: 255.255.255.0
See also Example of a network on page 185.
D The virtual IP which will be used by the client SCT mode
A VPN tunnel can only connect two local networks over a public
network. If the EAGLE is operating in single-client transparent
mode, there is only one single computer connected to it - see
Network:Transparent mode on page 100. Hence, to set up
a VPN tunnel, a connected local network must be simulated.
The computer connected to the EAGLE is assigned a virtual
IP address in this network.
For the remote terminal, this virtual IP address is the address of the
(simulated) local network, at which the computer that is physically
connected to the EAGLE can be reached in the VPN. For the remote
terminal this means that this simulated IP address there is to be
specified as the address of the network on the other end when the
VPN connection is configured.
The system locally connected to the EAGLE knows nothing of this
virtual IP under which it is accessed by the remote site. In other
words, it need not be specially configured.
What this means is that:
You can enter any IP address desired in the syntax 192.xxx.xxx.xxx
(x = any digit) as long as it is not already assigned at the remote site.
To avoid conflicts with IP addresses at the remote site, speak with the
responsible administrator.
This virtual IP address must be entered at the remote site in the
configuration of this VPN connection as the Remote network address.
D Tunnel: Remote network address
D Tunnel: The appropriate remote netmask
With these two entries, you specify the address of the network in
which the remote communication partner can be found. This address
can also be that of a computer, which is connected directly to the
VPN gateway.
132
EAGLE
Release 1.02 10/04
Web-based management
MACH 3002
MACH 3002
Industrial Backbone
Industrial Backbone
FAULT
STATUS
2 V.24
R
IP-ADDRESS
k
1
unsecure
network
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
k
1
Aufkleber MAC-Adresse
g
+24V (P1)
FAULT
+24V (P2)
+24V (P1)
0V
0V
Aufkleber MAC-Adresse
V.24
+24V (P2)
IP-ADDRESS
FAULT
P
LS/DA
0V
0V
EAGLE
V.24
133
Web-based management
134
EAGLE
Release 1.02 10/04
Web-based management
Fig. 57:
Machine Certificate
EAGLE
Release 1.02 10/04
135
Web-based management
U Certificate
Display the currently imported X.509 certificate with which the EAGLE
identifies itself to other VPN gateways. The following information is
displayed:
Info
subject
issuer
notBefore, notAfter
Meaning
The owner to whom the certificate is issued.
The point of authentication that signed the certificate.
C : Country
ST: State
L : City
O : Organization
OU: Department (organization unit)
CN: Hostname, common name
Fingerprint of the certificate so that it, for example,
can be compared with others on the phone. Here,
Windows displays the fingerprint in the SHA1 format.
Validity period of the certificate. Is ignored by the
EAGLE since it does not have a built-in clock.
136
EAGLE
Release 1.02 10/04
Web-based management
U New certificate
Requirement:
The certificate file (filename = *.p12 or *.pfx) is generated and stored on
the connected computer.
V Click Search... to select the file.
V Enter the password with which the private key of the PKCS#12 file is
protected into the field.
V Click Import.
V Afterwards, click OK.
V After the import a system message will appear:
Fig. 58:
System message
EAGLE
Release 1.02 10/04
137
Web-based management
6.7.3 VPN:L2TP
Fig. 59:
VPN:L2TP
138
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
139
Web-based management
140
EAGLE
Release 1.02 10/04
Web-based management
Fig. 60:
Services:DNS
EAGLE
Release 1.02 10/04
141
Web-based management
U Hostname mode
With hostname mode and hostname you can assign the EAGLE
a name. It will be displayed when someone logs in with SSH. A name
environment simplifies the administration of several EAGLEs.
D User defined (see below)
(Standard) The name entered in the field hostname is set as the
name for the EAGLE.
Note: If the EAGLE is operating in transparent mode, the option User
defined must be selected as the hostname mode.
D Provider defined (e. g. via DHCP)
If the network mode permits the hostname to be set externally,
such as with DHCP, the name transmitted by the provider will then
be set for the EAGLE.
U Hostname
If the option User defined is selected under hostname mode, then enter
the name here that is to be given to the EAGLE.
If the option Provider (e. g. via DHCP) is selected under Hostname
mode, an entry in this field will be ignored.
U Used nameserver
Options:
Root Nameserver
Provider defined
User defined
142
EAGLE
Release 1.02 10/04
Web-based management
D Root Nameserver
Requests are sent to the root nameserver in the Internet whose
IP addresses are stored in the EAGLE. These addresses seldom
change. This setting should only be selected if the alternative settings
do not function.
D Provider defined
With this setting, the device will use the Domain nameserver of
the Internet Service Provider, which is used to access the Internet.
You can select this setting, when the EAGLE will be operated in
PPPoE or Router mode with DHCP active (see Services:DHCP on
page 147).
D User defined
If this setting is selected, the EAGLE sets up a connections with the
domain nameservers that are listed in User-defined nameserver.
In transparent mode only the first two entries are evaluated in this list.
EAGLE
Release 1.02 10/04
143
Web-based management
Fig. 61:
DynDNS monitoring
144
EAGLE
Release 1.02 10/04
Web-based management
U Polling interval
Standard: 300 (seconds)
Fig. 62:
DynDNS registration
EAGLE
Release 1.02 10/04
145
Web-based management
U Refresh Interval
Standard: 420 (seconds)
Whenever the IP address of its own Internet access is changed, the EAGLE
will inform the DynDNS Service of its new IP address. For additional
reliability, the device will also report its IP address at the interval set here.
U DynDNS provider
The providers made available for selection support the same protocol
that the EAGLE supports.
Enter the name of the provider where you are registered, for example
DynDNS.org.
U DynDNS server
Name of the server of the DynDNS providers selected above,
for example: dyndns.org.
U DynDNS Login
Enter the user name that you have been assigned here.
U DynDNS Password
Enter the password that you have been assigned here.
U DynDNS Hostname
The hostname selected at DynDNS service for this EAGLE- provided that
you use a DynDNS service and have made the proper settings above.
146
EAGLE
Release 1.02 10/04
Web-based management
6.8.4 Services:DHCP
The DHCP server (Dynamic Host Configuration Protocol) of the EAGLE
assigns the clients connected to the EAGLE automatically
D the IP addressed defined in the DHCP range and subnet masks or
D the statically entered IP addresses.
Note: It is possible to configure the EAGLE as a DHCP client in router mode
(see External interface on page 102).
Statically entered
MAC/IP address pairs
Fig. 63:
Services:DHCP
EAGLE
Release 1.02 10/04
147
Web-based management
Parameter
DHCP start of range:
DHCP end of range:
Local network mask:
Default gateway:
DNS Server:
Meaning
Beginning and end of the address range from which the DHCP
server of the EAGLE is to assign IP addresses to the locally
connected clients.
The default setting is: 255.255.255.0
Determines which IP address for the client is to be used as the
standard gateway.
Determines from where the clients are to obtain the IP addresses
resolved from hostnames. If the DNS service of the EAGLE is
activated, this can be the local IP address of the EAGLE.
148
EAGLE
Release 1.02 10/04
Web-based management
6.8.5 Services:NTP
The network time protocol (NTP) allows you to synchronize the system time
within your network. NTP has a hierarchical structure. The NTP server
makes the UTC (Universal Time Coordinated) available. The NTP client
obtains the UTC from the SNTP server.
EAGLE
Release 1.02 10/04
149
Web-based management
Fig. 64:
U NTP State
Displays the current NTP state.
150
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
151
Web-based management
152
EAGLE
Release 1.02 10/04
Web-based management
Fig. 65:
Remote Logging
EAGLE
Release 1.02 10/04
153
Web-based management
Fig. 66:
SNMP traps
154
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
155
Web-based management
156
EAGLE
Release 1.02 10/04
Web-based management
Fig. 67:
Access:Password
EAGLE
Release 1.02 10/04
157
Web-based management
158
EAGLE
Release 1.02 10/04
Web-based management
6.9.2 Access:Language
If you select (Automatic) from the list of languages, the device will use the
language setting of the system's browser.
Fig. 68:
EAGLE
Release 1.02 10/04
159
Web-based management
6.9.3 Access:HTTPS
If HTTPS remote access is activated, the EAGLE can be configured via
its Web-based administrator interface from a computer connected to the
insecure port. This means that a browser is used on the remote computer
to configure the local EAGLE.
This option is disabled by default.
Fig. 69:
Access:HTTPS
IMPORTANT: If you enable remote access, make sure that a secure root and
administrator password have been defined.
To enable HTTPS remote access, make the following settings:
160
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
161
Web-based management
D Interface
external (fixed)
D Action
Options: Accept / Reject / Drop
Action
Accept
Reject
Drop
Meaning
the data packets are permitted to pass through.
the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
the data packets are not permitted to pass through. They are swallowed,
and the sender is not notified about what happened to the data.
162
EAGLE
Release 1.02 10/04
Web-based management
6.9.4 Access:SSH
If SSH remote access is activated, the EAGLE can be configured by the
computer connected to the insecure port by making an entry on the
command line.
This option is disabled by default.
Fig. 70:
Access:SSH
IMPORTANT: If you enable remote access, make sure that a secure root and
administrator password have been defined.
To enable SSH remote access, make the following settings:
EAGLE
Release 1.02 10/04
163
Web-based management
164
EAGLE
Release 1.02 10/04
Web-based management
D Action
Options: Accept / Reject / Drop
Action
Accept
Reject
Drop
Meaning
the data packets are permitted to pass through.
the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
the data packets are not permitted to pass through. They are swallowed,
and the sender is not notified about what happened to the data.
EAGLE
Release 1.02 10/04
165
Web-based management
6.9.5 Access:SNMP
SNMP (Simple Network Management Protocol) is mainly used in more
complex networks to monitor the status and operation of devices.
SNMP is available in several releases: SNMPv1/SNMPv2 and SNMPv3.
The older versions SNMPv1/SNMPv2 do not use encryption and are not
considered to be secure. We therefore recommend that you do not use
SNMPv1/SNMPv2.
As far as security is concerned, SNMPv3 is considerably better, but not all
management consoles support it.
Note: When you use SNMPv1, set up a VPN connection between the
management station and the EAGLE. The SNMPv1 passwords will then
be transmitted invisibly.
Fig. 71:
166
Access:SNMP
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
167
Web-based management
D From IP
Enter the address(s) of the computer(s) on which SNMP monitoring
is permitted.
The following options are available:
IP address: 0.0.0.0/0 means all addresses. To indicate a range,
use the CIDR notation - see CIDR (Classless InterDomain Routing)
on page 183.
D Interface
external (fixed)
D Action
Options: Accept / Reject / Drop
Action
Accept
Reject
Drop
Meaning
the data packets are permitted to pass through.
the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
the data packets are not permitted to pass through. They are swallowed,
and the sender is not notified about what happened to the data.
168
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
169
Web-based management
Fig. 72:
Serial line
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
171
Web-based management
Action
Accept
Reject
Drop
Meaning
the data packets are permitted to pass through.
the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
the data packets are not permitted to pass through. They are swallowed,
and the sender is not notified about what happened to the data.
172
EAGLE
Release 1.02 10/04
Web-based management
Fig. 73:
Install Update
173
Web-based management
174
EAGLE
Release 1.02 10/04
Web-based management
Fig. 74:
Update Servers
EAGLE
Release 1.02 10/04
175
Web-based management
Fig. 75:
176
Software information
EAGLE
Release 1.02 10/04
Web-based management
Fig. 76:
Hardware information
EAGLE
Release 1.02 10/04
177
Web-based management
178
EAGLE
Release 1.02 10/04
Web-based management
Fig. 77:
Snapshot
EAGLE
Release 1.02 10/04
179
Web-based management
Fig. 78:
Support:Status
U Network mode
The EAGLE's mode of operation
D Transparent (SCT/MCT)
D Router
D PPPoE
D PPTP
U Externe IP
The IP address of the EAGLE at its connection for the network
(WAN or Internet) connected to the insecure port.
In transport mode, the EAGLE takes on the local IP address
(see Network:Transparent mode on page 100).
180
EAGLE
Release 1.02 10/04
Web-based management
U Default gateway
The default gateway address is shown here that is entered in the
EAGLE.
U VPN
Supports:
D Total: Total number of VPN connections setup
D Used: Number of VPN connections used
D Up: Number of VPN connections currently active
U DynDNS registration
Supports:
D none: no DynDNS server specified
D DynDNS Server: Address of the DynDNS server, at which the EAGLE
should register.
D failure: The EAGLE has unsuccessfully attempted to setup a
connection to the DynDNS server.
D trying: The EAGLE is currently attempting to setup a connection to the
DynDNS server.
EAGLE
Release 1.02 10/04
181
Web-based management
U NTP Status
Options:
D synchronized: The EAGLE receives the current time from a time
server (Greenwich time) via the Network Time Protocol.
D not synchronized: The EAGLE is not connected to a time server
and can thus not provide the current time.
U Software version
Shows the version of the software installed in the EAGLE
U System Uptime
This shows how much time has elapsed since the last time that the
EAGLE was started.
U Language
This field shows the currently selected language.
182
EAGLE
Release 1.02 10/04
Web-based management
EAGLE
Release 1.02 10/04
183
Web-based management
IP
binary
CIDR
255.255.255.255
255.255.255.254
255.255.255.252
255.255.255.248
255.255.255.240
255.255.255.224
255.255.255.192
255.255.255.128
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
32
31
30
29
28
27
26
25
255.255.255.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.224.0
255.255.192.0
255.255.128.0
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
24
23
22
21
20
19
18
17
255.255.0.0
255.254.0.0
255.252.0.0
255.248.0.0
255.240.0.0
255.224.0.0
255.192.0.0
255.128.0.0
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
16
15
14
13
12
11
10
9
255.0.0.0
254.0.0.0
252.0.0.0
248.0.0.0
240.0.0.0
224.0.0.0
192.0.0.0
128.0.0.0
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
8
7
6
5
4
3
2
1
0.0.0.0
184
EAGLE
Release 1.02 10/04
Web-based management
Internet
Internet
External addresses e.g.: 80.81.192.37
(assigned by the Internet service provider)
EAGLE in the network mode router
Internal address of the EAGLE: 192.168.11.1
EAGLE
FAULT
STATUS
LS/DA
1
2 V.24
R
IP-ADDRESS
k
1
A1
A2
A3
A4
Router
IP external:
192.168.15.1
IP internal:
192.168.27.254
Network mask:
255.255.255.0
+24V (P2)
+24V (P1)
V.24
MACH 3002
MACH 3002
Fig. 79:
0V
0V
Aufkleber MAC-Adresse
Router
IP external:
192.168.11.2
IP internal:
192.168.15.254
Network mask:
255.255.255.0
FAULT
additional
internal route
B1
C1
B2
C2
B3
C3
B4
C4
A5
Network A
Network
address:
192.168.11.0/24
Network mask:
255.255.255.0
Network B
Network
address:
192.168.15.0/24
Network mask:
255.255.255.0
Network C
Network
address:
192.168.27.0/24
Network mask:
255.255.255.0
Network example
EAGLE
Release 1.02 10/04
185
Web-based management
Computer
A1
A2
A3
A4
A5
IP address
192.168.11.3 192.168.11.4 192.168.11.5 192.168.11.6 192.168.11.7
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Computer
B1
B2
B3
B4
IP address
192.168.15.2 192.168.15.3 192.168.15.4 192.168.15.5
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Computer
C1
C2
C3
C4
IP address
192.168.27.1 192.168.27.2 192.168.27.3 192.168.27.4
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Network
192.168.15.0/24
192.168.27.0/24
Gateway
192.168.11.2
192.168.11.2
Table 16: Additional internal routes for EAGLE (see Network:Base on page 95)
186
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
187
188
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
189
190
EAGLE
Release 1.02 10/04
Note: The configured settings for VPN connections and firewall remain
unchanged, as do the passwords.
Possible reasons for executing the recovery procedure:
D The EAGLE is in router or PPPoE mode,
D The device address of the EAGLE has been configured differently than
the default setting.
D You do not know the current IP address of the device,
D You have no way of making this setting from a V.24 terminal.
7.2.2 Action
V Perform a restart - see Performing a restart on page 189.
V Wait until the STATUS-LED is continuously green-lit. This lasts about
30 seconds.
EAGLE
Release 1.02 10/04
191
192
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
193
Result:
The EAGLE starts the recovery system. It searches for the DHCP server
via the computer connected to the secure port or via the connected
network in order to obtain an IP address from it.
Status display: The STATUS LED blinks.
The file install.p7s is loaded from the tftp server. It contains the
electronically signed control procedure for the installation procedure.
Only files that have been signed by Hirschmann are loaded.
The control procedure then deletes the flash memory and prepares the
reinstallation of the software.
Status display: Die 3 port LEDs form a sequential light.
The software jffs2.img.p7s is then downloaded from the tftp server
and stored in the flash memory. This file contains the actual EAGLEoperating system and is electronically signed. Only files that have been
signed by Hirschmann are accepted.
Status display: Die 3 port LEDs form a sequential light.
It takes about 3 to 5 minutes to delete and store the file.
The EAGLE is the then restarted automatically.
The new software is then unpacked and configured.
This takes about 5 minutes.
Status display: The STATUS LED blinks.
Once the procedure has ended, all port LEDs blink green simultaneously.
194
EAGLE
Release 1.02 10/04
EAGLE
Release 1.02 10/04
195
Fig. 80:
196
EAGLE
Release 1.02 10/04
V Click on the tftp Server or DHCP Server tab and then click on
the Settings button to open the dialog shown below. Then set the
parameters as shown:
Fig. 81:
Settings
EAGLE
Release 1.02 10/04
197
198
EAGLE
Release 1.02 10/04
HiConfig
8 HiConfig
HiConfig is a command-line oriented program for configuring the EAGLE.
The HiConfig interface can be reached via
D the secure port,
D the insecure port or
D the V.24 port.
Host name or
IP address of
the EAGLE
Connection
protocol
Fig. 82:
Connection setup
199
HiConfig
V Click Open.
PuTTY establishes a connection to the EAGLE and
opens the login window.
V Press the Enter key.
The EAGLE operating system will prompt you to enter the username
(admin or root).
V Enter the username.
The EAGLE operating system will prompt you to enter the password
(private or root).
V Enter the password.
The EAGLE operating system responds with the $ prompt
(for admin) or # (for root).
V Enter hiconfig (please note that entries are case-sensitive)
and press the Enter key.
HiConfig responds by displaying a list of valid commands.
Fig. 83:
200
EAGLE
Release 1.02 10/04
HiConfig
Enter a name of
your choice for
this connection.
Fig. 84:
Click OK.
Fig. 85:
EAGLE
Release 1.02 10/04
201
HiConfig
Fig. 86:
202
EAGLE
Release 1.02 10/04
HiConfig
Fig. 87:
EAGLE
Release 1.02 10/04
203
HiConfig
U Port Configuration
To set the port configuration you will need the following parameters:
Designation
Secure port
Insecure port
Enable port
Disable port
Autonegotiation on
Autonegotiation off
10 Mbit/s, halfduplex
10 Mbit/s, fullduplex
100 Mbit/s, halfduplex
100 Mbit/s, fullduplex
Value
ETH1
ETH0
ENABLE
DISABLE
AUTONEG yes
AUTONEG no
FIXEDSETTING
FIXEDSETTING
FIXEDSETTING
FIXEDSETTING
10hd
10fd
100hd
100fd
The command hiconfig --set and the proper parameters allow you
to configure the ports.
The command hiconfig --get-all | more displays all the
configured parameters one page at a time.
Example:
Set the secure port to 10 Mbit/s halfduplex:
hiconfig --set ENABLE_ETH1_AUTONEG no
hiconfig --set ETH1_FIXEDSETTING 10hd
Set the secure port to Autonegotiation on:
hiconfig -- set ENABLE_ETH1_AUTONEG yes
204
EAGLE
Release 1.02 10/04
HiConfig
EAGLE
Release 1.02 10/04
205
HiConfig
206
EAGLE
Release 1.02 10/04
Appendix
A Appendix
EAGLE
Release 1.02 10/04
207
Appendix
208
EAGLE
Release 1.02 10/04
Appendix
FAQ
FAQ
Answers to frequently asked questions can be found at the Hirschmann
Website:
www.hirschmann.com
Under Products/Support inside Automation and Network
Solutions is located on the pages Products the area FAQ.
For detailed information on all services offered by the Hirschmann
Competence Center, please visit the Web site http://www.hicomcenter.com/.
EAGLE
Release 1.02 10/04
209
Appendix
210
FAQ
EAGLE
Release 1.02 10/04
Appendix
U IEEE standards
IEEE 802.1 D
Switching, GARP, GMRP, Spanning Tree
IEEE 802.1 Q
Tagging
IEEE 802.3
Ethernet
EAGLE
Release 1.02 10/04
211
Appendix
U Supported MIBs
Private MIBs:
D hmprivate
D hmSecurityGateway-MIB
Standard MIBs:
D IF-MIB
D MAU-MIB
D RFC1155-SMI
D RFC1213-MIB
D SNMPv2-MIB
D SNMPv2-SMI
D SNMPv2-TC
The private MIBs are located on the enclosed EAGLE CD-ROM.
212
EAGLE
Release 1.02 10/04
Appendix
SNMP traps
SNMP traps
U Private MIB:
hmSecHTTPSLoginTrap
is sent, if a login attempt was made via HTTPS.
hmSecShellLoginTrap
is sent if a login was made via the security shell or the V.24 terminal.
hmSecDHCPNewClientTrap
is sent if the DHCP server receives a request from an unknown client.
hmTemperatureTrap
is sent if the temperature exceeds / falls below the set threshold values.
hmPowerSupply
is sent if the status of the voltage supply changes.
hmSignallingRelay
is sent if the status of the signal contact changes.
hmAutoconfigAdapterTrap
is sent if the AutoConfiguration adapter ACA 11 is removed or plugged
in again.
U Standard traps:
coldStart
is sent during the boot process after successful management
initialization following a cold or warm start.
linkUp
is sent if the link to a port is re-established.
linkDown
is sent if the link to a port is interrupted.
EAGLE
Release 1.02 10/04
213
Appendix
SNMP traps
authenticationFailure
is sent if a station attempts to access an agent without permission.
214
EAGLE
Release 1.02 10/04
Appendix
Certifications
Certifications
The following table lists the certification status of the
EAGLE product family.
Certified devices are marked with a certification identifier.
Standard
EN 61131-2
CE
FCC 47 CFR Part 15
cUL 508 / CSA C22.2 No.142
cUL 1604 / CSA C22.2 No.213
Germanischer Lloyd
EAGLE
In preparation
In preparation
In preparation
In preparation
In preparation
fulfilled
EAGLE
Release 1.02 10/04
215
Appendix
216
Certifications
EAGLE
Release 1.02 10/04
Appendix
Technical data
Technical data
EAGLE
Dimensions W x H x D
Weight
Top-hat rail fastener
Power supply
Operating voltage
Power consumption
with 2 TX ports
with 1 TX port and 1 FX port
with 2 FX ports
Overload current protection at input
Environment
Ambient temperature
Storage temperature
Air humidity
Atmospheric pressure
Pollution Degree
Protection classes
Laser protection
Protection class
EAGLE
Release 1.02 10/04
46 x 131 x 111 mm
1.8 in x 5.2 in x 4.4 in
340 g, 0.75 lb
in line with IEC 60715:1981 + A1:1995
Surrouding air:
0 C to 60 C (32 F to 140 F)
Surrouding air:
-20 C to +70 C (-4 F to 158 F)
10 % to 95 % (non-condensing)
Suitable for operation up to 2000 m
(6561 ft), 795 hPa
2
217
Appendix
EN 61000-4-3
EN 61000-4-4
EN 61000-4-5
EN 61000-4-6
EMC emitted immunity
EN 55022
FCC 47 CFR Part 15
Germanischer Lloyd
Stability
Vibration
Shock
218
Technical data
electrostatic discharge
contact discharge:
test level 3 (6 kV)
air discharge:
test level 3 (8 kV)
electromagnetic field
test level 3
(10 V/m; 80 - 2000 MHz)
fast transients (burst)
test level 3
(2 kV power line, 1 kV data line)
surge voltage
power line
symmetric: test level 2 (1kV)
asymmetric: test level 3 (2kV);
data Line: test level 2 (1kV)
cable-based RF faults: test level 3
10 V (150 kHz - 80 MHz)
Class A
Class A
Rules for Classification and
Construction VI - 7 - 3 Part 1, Ed. 2003
IEC 60068-2-6 Test FC, testing level
in line with IEC 61131-2 E2 CDV and
Germanischer Lloyd Guidelines for
the Performance of Type Tests Part 1
IEC 60068-2-27 Test Ea, testing level
in line with IEC 61131-2 E2 CDV
EAGLE
Release 1.02 10/04
Appendix
Interfaces
Signal contact
V.24 port
2 type depending ports
Technical data
1 A maximum, 24 V
external management, modem
TX ports with RJ-45 socket,
FX ports with DSC socket
EAGLE
Release 1.02 10/04
5 km/16,400 ft max.
data of fiber: 1 dB/km, 800 MHz*km
4 km/13,120 ft max.
1 dB/km, 500 MHz*km
30 km/98,420 ft max.
data of fiber at 1300 nm, 0.4 dB/km
3.5 ps/(nm*km)
24-86.6 km/78,740-284,121 ft
data of fiber at 1550 nm, 0.3 dB/km
19 ps/(nm*km)
219
Appendix
Scope of delivery
EAGLE Firewall/VPN System incl.
Order number
EAGLE TX/TX
EAGLE TX/MM SC
EAGLE TX/SM SC
EAGLE TX/LH SC
EAGLE MM SC/TX
EAGLE MM SC/MM SC
EAGLE MM SC/SM SC
EAGLE MM SC/LH SC
EAGLE FW TX/TX
EAGLE FW TX/MM SC
EAGLE FW TX/SM SC
EAGLE FW TX/LH SC
EAGLE FW MM SC/TX
EAGLE FW MM SC/MM SC
EAGLE FW MM SC/SM SC
EAGLE FW MM SC/LH SC
Technical data
943 011-001
943 011-002
943 011-003
943 011-004
943 011-005
943 011-006
943 011-007
943 011-008
943 011-011
943 011-012
943 011-013
943 011-014
943 011-015
943 011-016
943 011-017
943 011-018
Accessories
Manual: Basics of
Industrial ETHERNET and TCP/IP280720-834
ACA Auto Configuration Adapter
943 751-001
Terminal cable
943 301-001
6-pin terminal block (50 pieces)
943 845-002
Rail Power Supply RPS 30
943 662-003
Rail Power Supply RPS 60
943 662-001
Rail Power Supply RPS 120
943 662-011
Network Management Software
HiVision
943 471-100
220
EAGLE
Release 1.02 10/04
Appendix
Literature references
Literature references
[1]
Optische bertragungstechnik
in der Praxis
Christoph Wrobel
Hthig Buch Verlag Heidelberg
ISBN 3-8266-5040-9
[2]
[3]
Hirschmann Manual
Basics of Industrial ETHERNET and TCP/IP
280 720-834
[4]
Hirschmann Manual
MultiLAN Switch
943 309-001
[5]
Hirschmann Manual
ETHERNET
943 320-001
[6]
Hirschmann Manual
Network Managent F
039 584-620
EAGLE
Release 1.02 10/04
221
Appendix
222
Literature references
EAGLE
Release 1.02 10/04
Appendix
Reader's comments
Reader's comments
What is your opinion of this manual? We are always striving to provide as
comprehensive a description of our product as possible, as well as important
information that will ensure trouble-free operation. Your comments and
suggestions help us to further improve the quality of our documentation.
Your assessment of this manual:
excellent
good
satisfactory
mediocre
poor
Accuracy
Readability
Comprehensibility
Examples
Structure/Layout
Completeness
Graphics
Drawings
Tables
EAGLE
Release 1.02 10/04
223
Appendix
Reader's comments
Company / Department
..........................................................................................................
..........................................................................................................
..........................................................................................................
Date / Signature
..........................................................................................................
Dear User,
Please fill out and return this page
by fax to the number +49 (0)7127/14-1798 or
by mail to
Hirschmann Electronics GmbH & Co. KG
Department AMM
Stuttgarter Str. 45- 51
72654 Neckartenzlingen
Germany
224
EAGLE
Release 1.02 10/04
Appendix
EAGLE
Release 1.02 10/04
225
Appendix
226
EAGLE
Release 1.02 10/04
Glossar
B Glossar
D 3DES / DES
This symmetrical encryption algorithm was developed by IBM and chekked by the NSA. DES (Symmetrical encryption on page 233) was set in
1977 by the American National Bureau of Standards, which was the predecessor of the National Institute of Standards and Technology (NIST), as
the standard for American governmental institutions. Since this was the
very first standardized encryption algorithm, it quickly won acceptance by
industry even outside of America.
DES uses a 56 bit long key, which is no longer considered secure as the
processing power available has greatly increased since 1977.
3DES is a variant of DES. It uses keys that are three times as long, i.e.
168 bits long. 3DES is still considered to be secure and is also included
in the IPsec standard
D Asymmetrical encryption
In the case of asymmetrical encryption, data is encrypted with one key
and decrypted with a second key. Either key may be used for encryption
or decryption. One of the keys is kept secret by its owner (Private Key),
the other is made available to the public (Public Key), i.e. possible communication partners.
A message encrypted with the public key can only be decrypted and
read by the receiver who has the associated private key. A message
encrypted with the private key can only be decrypted and read by a
receiver who has the associated public key. The fact that the message
was encrypted with the private key proves that the owner of the associated public key actually sent the message. Therefore, the expression
"digital signature" is also often used.
However, asymmetrical encryption techniques such as RSA are both
slow and susceptible to certain types of attack and are therefore frequently combined with some form of symmetrical encryption (Symmetrical encryption on page 233). On the other hand, there are concepts
which avoid the additional work of administering symmetrical keys.
D AES
Advanced Encryption Standard. This encryption standard was developed
by NIST (National Institute of Standards and Technology) in cooperation
with the industry. This Symmetrical encryption on page 233 was developed to replace the earlier DES standard. AES specifies three different
key sizes (128, 192 and 256 bits).
EAGLE
Release 1.02 10/04
227
Glossar
In 1997, NIST started the AES initiative and announced its conditions for
the algorithm. From the many proposed encryption algorithms, NIST
selected a total of five algorithms for closer examination - the MARS,
RC6, Rijndael, Serpent and Twofish algorithms. In October 2000, the
Rijndael algorithm was adopted as the standard's encryption algorithm.
D Certificate (X.509)
A type of "Seal", which certifies the authenticity of a public key (Asymmetrical encryption on page 227) and the associated data.
To enable the user of the public key, which will be used to encrypt the data, to be sure that the public key that he/she has received is really from its
issuer and thus from the instance, which should later receive the data, it
is possible to use certification. A Certification Authority CA certifies the
authenticity of the public key and the associated link between the identity
of the issuer and his/her key. The certification authority will verify authenticity in accordance with its rules, which may, for example, require that the
issuer of the public key appear before it in person. Once authenticity has
be successfully certified, the certification authority will add its digital signature to the issuers public key. The result is a Certificate.
An X.509(v3) Certificate thus includes a public key, information about the
key owner (given as it Distinguished Name (DN)), the authorized usage
etc. and the signature of the certification authority.
The signature is created as follows: The certification authority creates an
individual bit sequence, which is known as the HASH value, from the bit
sequence of the public key, the information about its owner and other data. This sequence may be up to 160 bits long. The certification authority
encrypts this with its own private key and then adds it to the certificate.
The encryption with the certification authority's private key proves the authenticity of the certificate, i.e. the encrypted HASH string is the certification authority's digital signature. If the certificate's data is altered, this
HASH value will no longer be correct with the consequence that the certificate will be worthless.
The HASH value is also known as the fingerprint. Since it is encrypted
with the certification authority's private key, anyone who has the public
key can decrypt the bit sequence and thus verify the authenticity of this
fingerprint or signature.
The usage of a certification authority means it is not necessary for each
owner of a key to know every other owner. It is enough for them to know
the certification authority. The additional information about the key further
simplifies the administration of the key.
X.509 certificates are used, e.g. for e-mail encryption, in S/MIME or IPsec.
228
EAGLE
Release 1.02 10/04
Glossar
D Client / Server
In a client-server environment, a server is a program or computer, which
accepts and answers queries from client programs or computers.
In data communication, a computer which establishes a connection to a
server (or host) is also called a client. In other words, the client is the
calling computer and the server (or host) is the computer called.
D Datagram
In the TCP/IP protocol, data is sent in the form of data packets, which are
know as IP datagrams. An IP datagram has the following structure:
IP-Header
229
Glossar
Each host [or workstation] in a network has the same network address,
but a different host address. Depending on the size of the respective network - networks are categorized as Class A, B or C networks, which are
each different in size - the two parts of the address differ in length:
1. Byte
Class A
Class B
Class C
230
2. Byte
Netz-Adr.
3. Byte
4. Byte
Host-Adr.
Netz-Adr.
Netz-Adr.
Host-Adr.
Host-Adr.
EAGLE
Release 1.02 10/04
Glossar
Bytes f r die
Netz-Adresse
Bytes f r die
Host-Adresse
Class A
1-126
Class B
128-191
Class C
191-223
As you can see, there can be a worldwide total of 126 Class A networks
and each of these networks can have a maximum of 256 x 256 x 256
hosts (3 bytes of address space). There can be 64 x 256 Class B networks and each of these networks can have up to 65,536 hosts (2 bytes
address space: 256 x 256). There can be 32 x 256 x 256 Class C networks and each of these networks can have up to 256 hosts (1 bytes
address space).
Subnet Mask see Subnet Mask on page 233.
D IPsec
IP Security (IPsec) is a standard, which uses encryption to verify the
authenticity of the sender and ensure the confidentiality and integrity of
the data in IP datagrams (> Datagram, page 229). The components of
IPsec are the Authentication Header (AH), the Encapsulating Security
Payload (ESP), the Security Association (SA) and the Internet Key Exchange (IKE).
To begin communication, the computers at both ends negotiate the mode
to be used: Transport Mode or Tunnel Mode.
In Transport Mode, an IPsec header will be inserted between the
IP header and the TCP or UDP header in each IP datagram. Since the
IP header remains unchanged, this mode is only suitable for a host- tohost connection.
In Tunnel Mode, an IPsec header and a new IP header will be added in
front of the entire IP datagram. As a consequence, the original datagram
will be encrypted in its entirety and sent as the payload of the new
datagram.
The Tunnel Mode is used in VPN applications: The devices at the tunnel
ends ensure that the datagrams are encrypted before they pass through
the tunnel so the actual datagrams are completely protected while being
transferred over the public network.
EAGLE
Release 1.02 10/04
231
Glossar
232
EAGLE
Release 1.02 10/04
Glossar
EAGLE
Release 1.02 10/04
233
Glossar
234
EAGLE
Release 1.02 10/04
Stichwortverzeichnis
C Stichwortverzeichnis
Numerics
3DES
3DES-168
129, 227
130
ACA
53, 155
Administration
142
Administrator interface
158
Administrator password
47
Administrators
177
ADSL
229
AES
121, 227
AES-256
130
Agent alarm
155
AH
231
Air humidity
12
Air temperature
12
Alarm
154
American National Bureau of Standard 227
Anti-Spoofing
233
Assigned Numbers
232
Asymmetrical encryption
227
Authentication
128, 167
Authentication Header
231
Authenticity
228, 231, 234
Authorization level
157
Auto Configuration Adapter
53, 155
Automatic Configuration
91
Autonegotiation
52
Browser
77, 159
CA
228
Cache
70
CE
14
Certification Authority
228
Chassis alarm
155
Checksum
229
Checksum algorithm
130
CIDR 111, 113, 118, 161, 164, 168, 171, 183
Class A
230
Client
33, 34, 36, 37, 131, 147, 229
Climatic
12
Communication protocol
233
Configuration
65, 91
Configuration setting
179
Cryptographic protocol
234
EAGLE
Release 1.02 10/04
Datagram
128
DES
167, 227
Destination IP address
229, 232
Destination NA
114
Destination port
229
DHCP
97, 102, 106, 142, 147, 155, 198
DHCP client
147
DHCP server
155, 193, 195, 197, 198
Digital signature
227, 228
Distinguished Name
228
DN
228
DNS
141, 229, 230, 234
Domain address
141
Domain name
144, 229
Domain nameserver
141
Domain suffix
142
DSL
232
Dual Homing
93
Dynamic DNS provider
229
Dynamic IP address
229
DynamicDNS
229
DynDNS Login
146
DynDNS Password
146
DynDNS server
144, 146, 181
DynDNS Service
124
Electromagnetic compatibility
EMC
Encapsulating Security Payload
Encryption
ESP
ESP-Header
EU conformity declaration
Factory setting
FAQ
FCC
Fingerprint
Firewall
Firmware
Flat rate
Forward
Gateway
Ground
Ground cable
14
14
231
227, 231
231, 234
229
14
67, 110, 117
209
15
228
68, 109
187
229
115
124, 139, 181
12, 51
54
235
Stichwortverzeichnis
Ground screw
Hardware
Hash
Hash algorithms
HCP server
Header
HiDiscovery
Host address
Hostname
Hostname mode
HTTP
HTTPS
HTTPS login
HTTPS Remote Access
54
177
130, 228
121
148
114
59, 86
230, 233
142
142
158
67, 71, 234
155
160, 181
IANA
111
ICMP
111, 113, 234
IKE
231, 234
Indicator contact
42
Internet Key Exchange
231
Internet Protocol
62
Internet Service Provider 104, 105, 124, 144
IP
111, 113, 234
IP address
63, 124, 230
IP datagram
229
IP header
231
IP masquerading
116
IP Security
231
IP-Header
229
IP-Masquerading
232
IPsec
121, 129, 138, 227, 228, 231
IPsec connection
121
IPsec header
231
IPsec Status
139
ISAKMP
130, 139
ISDN
229
ISP
104, 105, 144, 229
Key exchange
L2TP
L2TP status
LAN adapter
Language
Language setting
Linux
Local configuration
Login
236
130
126, 131
140
62
159, 182
159
198
65
69, 104, 105, 142
MAC address
Main Mode
MARS
MD5
Modem
Modem cable
Monitoring proper functioning
MS Internet Explorer
101
121
228
121, 130, 167
72, 229
54
88
68
NAT
116, 121, 232
NAT router
121, 232
National Institute of Standards and Technology
227
NAT-T
121
Netmask
132
Network address
230, 233
Network Address Translation
116, 232
Network coupling
93
Network mask
97, 131
Network Time Protocol
149
Network traffic
101
NIST
227
Norms
211
NSA
227
NTP
149
Online service
Operating mode
Operating system
233
91
194
Password
69, 104, 105, 167
PELV
11
Perfect Forward Secrecy
131
PFS
126, 131
Phone line
229
Phone number
73
Point-to-Point Protocol
232
Point-to-Point Tunneling Protocol
232
Pollution Degree
12
POP3
111, 113, 234
Port number
71, 111, 161, 232
Power Supply
155
PPP
126, 232
PPP connection
138
PPPoE
180, 232
PPPoE Login
104, 105
PPPoE mode
97, 117
PPPoE Password
104, 105
PPTP
180, 232
Pre-Shared Key
128, 129
EAGLE
Release 1.02 10/04
Stichwortverzeichnis
Private Key
Private network
Profile
Protocol
Provider
Provider defined
Proxy server
PSK
Public Key
Public network
Quick Mode
RC6
Reboot
Recovery
Recovery button
Recovery procedure
Recovery status
Recovery switch
Recycling
Redundant coupling
Redundant power supply
Refresh Interval
Relay contact
Remote configuration
Remove
Restart
RFC 1518
Rijndael
Ring coupling
Root
Root password
Router
Router mode
RSA
S/MIME
SA
SA Lifetime
Safety certificates
Safety regulations
Security
Security Association
Security notice
SELV
Serpent
Server
Service names
Service Provider
SHA-1
EAGLE
Release 1.02 10/04
227
234
82
233
97, 142
142
68
129
128, 227, 228
234
121
228
174
45
193
187
193
187
15
93
88
146
88
65
54
189, 192
183
228
93
157
47, 157
180, 230
97
227
228
231
121
121
13
155
231
69
11
228
229
111
233
121, 130
Shell login
155
Shielding ground
11
Signal contact
49, 88
Signature
228
Simple Network Management Protocol 166
SMTP
234
Snap-in guide
50
Snapshot.tar.gz
179
SNMP
166
Software module
176
Software version
182
Source IP address
229
Source port
229
Spoofing
233
SSH
142, 157
SSH remote access
163, 181
SSL
67, 71
Standard gateway
62, 68, 97
Standards
211
State on delivery
96, 157, 194
Stateful Packet Inspection
109
Stealth mode
124
Subnet
233, 234
Subnet mask
147, 233
Subnetwork
148
Subnetwork mask
63
Supply voltage
11, 41, 42, 49
Support
177, 209
Surrounding air temperature
12
Symmetrical encryption
227
System time
149
System update
174
System Uptime
182
TCP
111, 113, 234
TCP header
231, 232
TCP/IP
33, 77, 149, 229
TCP-Header
229
Telephone network
72
Temperature
12, 155
Terminal block
50
Terminal cable
54
TFTP
198
TFTP server
193, 195, 197, 198
TFTP service
198
Traffic
139
Transparent 33, 111, 113, 134, 162, 165, 168,
172, 180
Transparent mode
96, 111, 113, 192
Transport Mode
231
Trap
154
Tunnel Mode
231
Tunnels
129
237
Stichwortverzeichnis
Twofish
UDP
UDP header
Update
URL
User defined
User name
User password
228
111, 113, 232, 234
229, 231
174
229
142
69, 104, 105
158
V.24 interface
53
V.24 port
72
Virtual Private Network
234
VPN
232, 234
VPN application
231
VPN client
33
VPN connection
109, 117, 121, 144, 181
VT100
53
WAN
Web browser
Windows system
Wireless
X.509
238
EAGLE
Release 1.02 10/04