EAGLE Management Manual: Industrial ETHERNET Firewall/VPN-System
EAGLE Management Manual: Industrial ETHERNET Firewall/VPN-System
EAGLE Management Manual: Industrial ETHERNET Firewall/VPN-System
Aufkleber MAC-Adresse
LS/DA
P
1
1
2
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
0V
FAULT
STATUS
EAGLE
+24V (P2)
g
IP-ADDRESS
IP-ADDRESS
Aufkleber
Aufkleber MAC-Adresse
MAC-Adresse
x
h
LS/DA
PP
1
2
0 1
R
V.24
V.24
RM
V.24
1 2 RING
4
3
2
LS
LS
LS
LS
DA
DA
DA
DA
+24V (P1) +24V (P1)
2
1
0V 0V
RM
FAULT FAULT
0V 0V
FAULT
STATUS
RS2-4R
EAGLE
+24V (P2) +24V (P2)
g
IP-ADDRESS
Aufkleber MAC-Adresse
x
LS/DA
P
1
1
EAGLE Management Manual
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
Industrial ETHERNET Firewall/VPN-System
0V
FAULT
STATUS
EAGLE
+24V (P2) k
g
IP-ADDRESS
Aufkleber MAC-Adresse
x
LS/DA
P
1
1
2
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
0V
FAULT
STATUS
EAGLE
+24V (P2)
k
g
IP-ADDRESS
Aufkleber MAC-Adresse
LS/DA
P
1
1
2
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
0V
FAULT
STATUS
EAGLE
+24V (P2)
g
IP-ADDRESS
IP-ADDRESS
Aufkleber
Aufkleber MAC-Adresse
MAC-Adresse
x
h
LS/DA
PP
1
2
0 1
R
V.24
V.24
RM
V.24
1 2 RING
4
3
2
LS
LS
LS
LS
DA
DA
DA
DA
+24V (P1) +24V (P1)
2
1
0V 0V
RM
FAULT FAULT
0V 0V
FAULT
STATUS
RS2-4R
EAGLE
+24V (P2) +24V (P2)
g
IP-ADDRESS
Aufkleber MAC-Adresse
x
LS/DA
P
1
1
EAGLE Management Manual
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
Industrial ETHERNET Firewall/VPN-System
0V
FAULT
STATUS
EAGLE
+24V (P2) k
g
IP-ADDRESS
Aufkleber MAC-Adresse
x
LS/DA
P
1
1
2
V.24
2 V.24
+24V (P1)
2
1
0V
FAULT
0V
FAULT
STATUS
EAGLE
+24V (P2)
k
g
The naming of copyrighted trademarks in this manual, even when not specially indicated, should
not be taken to mean that these names may be considered as free in the sense of the trademark
and tradename protection law and hence that they may be freely used by anyone.
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for
your own use.
The performance features described here are binding only if they have been expressly guaran-
teed in the contract. This publication has been created by Hirschmann Electronics GmbH & Co.
KG according to the best of our knowledge. Hirschmann reserves the right to change the con-
tents of this manual without prior notice. Hirschmann can give no guarantee in respect of the
correctness or accuracy of the details in this publication.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
Printed in Germany
Hirschmann worldwide:
U Germany
Hirschmann Electronics GmbH & Co. KG
Automation and Network Solutions
Stuttgarter Straße 45-51
D-72654 Neckartenzlingen
Tel. ++49-7127-14-1480
Fax ++49-7127-14-1502
email: ans-hi-line@nt.hirschmann.de
Internet: www.hirschmann.de
U Switzerland
Hirschmann Electronics GmbH & Co. KG, Neckartenzlingen
Niederlassung Uster
Seestr. 16
CH-8610 Uster
Tel. ++41-44905-8282
Fax ++41-44905-8289
email: ans_ch@hirschmann.ch
U France
Hirschmann Electronics S.A.S.
2, rue des Charpentiers
F-95330 Domont
Tel. ++33-1-39350100
Fax ++33-1-39350102
email: ans@hirschmann.fr
EAGLE
Release 1.02 10/04 5
Hirschmann worldwide:
U Great Britain
Hirschmann Electronics Ltd.
4303 Waterside Centre
Solihull Parkway
Birmingham Business Park
Birmingham
West Midlands B37 7YN
Tel. ++44-121 329 5000
Fax ++44-121 329 5001
email: enquiry@hirschmann.co.uk
U Netherlands
Hirschmann Electronics B.V.
Pampuslaan 170
NL-1382 JS Weesp
Tel. ++31-294-462591
Fax ++31-294-462554
email: ans@hirschmann.nl
U Spain
Hirschmann Electronics S.A.
Calle Traspaderne, 29
Barrio del Aeropuerto
Edificio Barajas I, 2a Planta
E-28042 Madrid
Tel. ++34-1-7461730
Fax ++34-1-7461735
email: hes@hirschmann.es
U Hungary
Hirschmann Electronics Kft.
Rokolya u. 1-13
H-1131 Budapest
Tel. ++36-1-3494199
Fax ++36-1-3298453
email: hirschmann.budapest@axelero.hu
EAGLE
6 Release 1.02 10/04
Hirschmann worldwide:
U USA
Hirschmann Electronics Inc.
20440 Century Boulevard, Suite 150
Germantown, MD 20874
Tel. ++1-240-686 2300
Fax ++1-240-686 3589
email: ans@hirschmann-usa.com
U Singapore
Hirschmann Electronics Pte. Ltd.
2 International Business Park #11-02/03 Tower One
The Strategy Singapore 609930
Tel: ++65 6316 7797
Fax:++65 6316 7977
email: hirschmann.svi@pacific.net.sg
U China
Hirschmann Electronics Pte Ltd Shanghai Office
Room 828, Summit Centre,
1088 West Yan An Road
Shanghai 200052
P.R. China
Tel: ++86-21 6207 6637
Fax: ++86-21 6207 6837
Mobile: ++86-1370 185 7382
E-Mail: hirschmann@sh163.net
EAGLE
Release 1.02 10/04 7
Hirschmann worldwide:
EAGLE
8 Release 1.02 10/04
Hirschmann Competence
Hirschmann Competence
With the Competence Center, you firmly rule out any compromise: the client-
specific package leaves you free to choose the service components that you
will use.
Internet:
http://www.hicomcenter.com
EAGLE
Release 1.02 10/04 9
Hirschmann Competence
EAGLE
10 Release 1.02 10/04
Safety instructions
Safety instructions
U Supply voltage
The devices are designed for operation with a safety extra-low voltage.
They may only be connected to the supply voltage connections and to
the signal contact with PELV circuits or alternatively SELV circuits with
the voltage restrictions in accordance with IEC/EN 60950.
The supply voltage is electrically isolated from the housing.
V Never start operation with damaged components!
V Relevant for North America:
The subject unit is to be suppplied by a Class 2 power source
complying with the requirements of the National Electrical Code, table
11(b). If power is redundant supplied (two individual power sources)
the power sources together should comply with the requirements of
the National Electrical Code, table 11 (b).
V Relevant for North America:
Use 60/75°C or 75°C copper(CU)wire only.
V Relevant für Nordamerika:
Power, input and output (I/O) wiring must be in accordance with
Class I, Division 2 wiring methods [Article 501-4(b) of the National
Electrical Code, NFPA 70] and in accordance with the authority having
jurisdiction.
U Shielding ground
The shielding ground of the connectable twisted pair lines is connected
to the front panel as a conductor.
V Beware of possible short circuits when connecting a cable section with
conductive shielding braiding.
EAGLE
Release 1.02 10/04 11
Safety instructions
U Housing
Only technicians authorized by Hirschmann are permitted to open the
housing.
The device is grounded via the separated ground screw. It is located on
the bottom of the front panel.
V Make sure that the electrical installation meets local or nationally
applicable safety regulations.
V The ventilation slits must not be covered to ensure free air circulation.
V The distance to the ventilation slots of the housing has to be a
minimum of 10 cm.
V Never insert pointed objects (thin screwdrivers, wires, etc.) into the
inside of the subrack! Failure to observe this point may result in injuries
caused by electric shocks.
V The housing has to be mounted in upright position.
V If installed in a living area or office environment, the device must be
operated exclusively in switch cabinets with fire protection
characteristics according to EN 60950.
U Environment
The device may only be operated in the listed maximum surrounding air
temperature range at the listed relative air humidity range (non-
condensing).
V The installation location is to be selected so as to ensure compliance
with the climatic limits listed in the Technical Data.
V To be used in a Pollution Degree 2 environment only.
EAGLE
12 Release 1.02 10/04
Safety instructions
Warning!
LED- or LASER components according to IEC 60825-1 (2001):
CLASS 1 LASER PRODUCT.
LIGHT EMITTING DIODE - CLASS 1 LED PRODUCT.
EAGLE
Release 1.02 10/04 13
Safety instructions
89/336/EEC
Directive of the council for standardizing the regulations of member
states on electromagnetic compatibility (changed by RL 91/263/EEC, 92/
31/EEC and 93/68/EEC).
In accordance with the above-named EU directives, the EU conformity
declaration will be at the disposal of the relevant authorities at the
following address:
The product can be used in living areas (living area, place of business,
small business) and in industrial areas.
D Interference immunity: EN 61000-6-2:2001
D Emitted interference: EN 55022:1998 + A1 2000 Class A
Warning!
This is a class A device. This device can cause interference in living
areas, and in this case the operator may be required to take appropriate
measures.
The assembly guidelines provided in these instructions must be strictly
adhered to in order to observe the EMC value limits.
EAGLE
14 Release 1.02 10/04
Safety instructions
U FCC note:
Appropriate testing has established that this device fulfills the
requirements of a class A digital device in line with part 15 of the FCC
regulations.
These requirements are designed to provide sufficient protection against
interference where the device is being used in a business environment.
The device creates and uses high frequencies and can radiate same,
and if it is not installed and used in accordance with this operating
manual, it can cause radio transmission interference. The use of this
device in a living area can also cause interference, and in this case the
user is obliged to cover the costs of removing the interference.
U Recycling note:
After usage, this product must be disposed of properly as electronic
waste in accordance with the current disposal regulations of your county
/ state / country.
EAGLE
Release 1.02 10/04 15
Safety instructions
EAGLE
16 Release 1.02 10/04
Content
Content
Hirschmann worldwide: 5
Hirschmann Competence 9
Safety instructions 11
1 Introduction 25
2 Typical
application scenarios 33
EAGLE
Release 1.02 10/04 17
Content
3 Hardware 39
3.1 Display 41
3.1.1 Device status 41
3.1.2 Port status 43
3.1.3 Function state 43
4 Installation and
startup procedure 47
EAGLE
18 Release 1.02 10/04
Content
5 Configuration 65
6 Web-based management 77
6.1 Overview 79
6.4 Redundancy 93
6.4.1 Redundancy:Layer 2 Redundancy 93
EAGLE
Release 1.02 10/04 19
Content
EAGLE
20 Release 1.02 10/04
Content
EAGLE
Release 1.02 10/04 21
Content
8 HiConfig 199
EAGLE
22 Release 1.02 10/04
Content
A Appendix 207
FAQ 209
Certifications 215
B Glossar 227
C Stichwortverzeichnis 235
EAGLE
Release 1.02 10/04 23
Content
EAGLE
24 Release 1.02 10/04
Introduction
1 Introduction
EAGLE
Release 1.02 10/04 25
Introduction
EAGLE
26 Release 1.02 10/04
Introduction 1.1 Requirement and solution
The integrated DHCP server makes it easy and safe to set up service ports
for employees in the field.
By providing a login procedure (internal and external), it is possible to
analyze and thus optimize the data traffic.
Using redundant ring coupling and Dual Homing, the system supports the
Hirschmann redundancy procedure.
EAGLE
Release 1.02 10/04 27
Introduction 1.1 Requirement and solution
RS2-…
x EAGLE
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
IP-ADDRESS
1
Aufkleber MAC-Adresse
g
MICE
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
RS2-…
RS2-…
MICE
EAGLE
28 Release 1.02 10/04
Introduction 1.2 Product features
EAGLE
Release 1.02 10/04 29
Introduction 1.2 Product features
EAGLE
30 Release 1.02 10/04
Introduction 1.3 Device models
EAGLE Medium/Medium
Insecure port
Secure port
Firewall with VPN function
Device name
EAGLE
Release 1.02 10/04 31
Introduction 1.3 Device models
EAGLE
32 Release 1.02 10/04
Typical application scenarios
The most common applications used in industry require the operation of the
EAGLE in one of the following modes:
D Single-client transparent mode,
D Multi-client transparent mode and
D Router mode.
MACH 3002
x EAGLE
unsecure LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
network
k
IP-ADDRESS
VPN g
Industrial Backbone
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
MACH 3002
EAGLE
Release 1.02 10/04 33
Typical application scenarios
EAGLE
34 Release 1.02 10/04
Typical application scenarios
MICE MICE
MICE
MICE
x EAGLE
x EAGLE
P
1 2
FAULT
LS/DA STATUS
1 2 V.24
1 2
P FAULT R
LS/DA STATUS
k
1 2 V.24
R
IP-ADDRESS
k 1
IP-ADDRESS
Aufkleber MAC-Adresse
2
g
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
FAULT
+24V (P1)
+24V (P2)
V.24
0V
0V
V.24
MICE
Industrial Backbone /
RS2-… Subnet 1 RS2-…
MACH 3002
EAGLE
Release 1.02 10/04 35
Typical application scenarios
RS2-…
x EAGLE
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
k
IP-ADDRESS
g
MICE
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
RS2-…
RS2-…
MICE
EAGLE
36 Release 1.02 10/04
Typical application scenarios
MACH 3002
MACH 3002
LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
unsecure LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
network
k k
IP-ADDRESS
IP-ADDRESS
1 1
2 2
g g
Aufkleber MAC-Adresse
Aufkleber MAC-Adresse
FAULT
FAULT
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
0V
0V
0V
0V
V.24 V.24
EAGLE
Release 1.02 10/04 37
Typical application scenarios
EAGLE
38 Release 1.02 10/04
Hardware
3 Hardware
P
1 2
FAULT PP
1 2
FAULT P
1 2
FAULT P
1 2
FAULT
LED display
LS/DA STATUS LS/DA 0 1 RM
STATUS LS/DA STATUS LS/DA STATUS elements
RM
1 2 V.24 V.24
1 2 RING 1 2 V.24 1 2 V.24 Recovery button
FAULT
R R
V.24 R R
+24V (P1)
+24V (P2)
Port 1 and 2
k k k k
IP-ADDRESS
0V
0V
IP-ADDRESS
IP-ADDRESS
IP-ADDRESS
+ autopolarity + autocrossing)
1 DA 1 or FX (SC connector; multimode,
1 singlemode, longhaul)
1 1
LS
2
DA
2
2
2
2 Port 1
(trusted)
k Port 2
(untrusted)
g
MAC-Adresse
MM
MM
g g g g
SM
SM
LS
TX
TX
LH
LH
Aufkleber MAC-Adresse
MAC-Adresse
Aufkleber MAC-Adresse
Aufkleber MAC-Adresse
DA
EAGLE TX/TX x x
Aufkleber
3
EAGLE TX/MM SC x x
Aufkleber
LS
EAGLE TX/SM SC x x
FAULT
FAULT
FAULT
FAULT
DA
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
4
EAGLE TX/LH SC x x
0V
0V
0V
0V
0V
0V
0V
0V
EAGLE MM SC/TX x x
LS
EAGLE MM SC/MM SC x x
V.24 V.24 V.24 V.24
EAGLE MM SC/SM SC x x
EAGLE MM SC/LH SC x x
EAGLE
Release 1.02 10/04 39
Hardware
EAGLE
40 Release 1.02 10/04
Hardware 3.1 Display
3.1 Display
x EAGLE
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
Fig. 8: Display
Display Meaning
lit Supply voltage 1 is present.
not lit Supply voltage 1 is less than 9.6 V.
EAGLE
Release 1.02 10/04 41
Hardware 3.1 Display
Display Meaning
lit Supply voltage 2 is present.
not lit Supply voltage 2 is less than 9.6 V.
Display Meaning
lit The indicator contact is open, i.e. it indicates an error.
not lit The indicator contact is closed, i.e. it does not indicate an error.
Display Meaning
flashes green Initialization of the device.
lit green Device is operational.
Display Meaning
flashing alternatively: Error in memory operation.
LEDs flash simultaneously; twice a second Loading the configuration from the ACA.
LEDs flash simultaneously; once a second Saving the configuration to the ACA.
EAGLE
42 Release 1.02 10/04
Hardware 3.1 Display
Display Meaning
not lit No valid link.
lit green Valid link.
flashes yellow Receiving data.
running light Initialization phase after a reset.
EAGLE
Release 1.02 10/04 43
Hardware 3.1 Display
EAGLE
44 Release 1.02 10/04
Hardware 3.2 Recovery button
The Recovery button is used to set the device into the following states:
D Restart (refer to “Performing a restart” on page 189),
D Recovery procedure (refer to “Executing the recovery procedure” on page
191),
D Flashing the firmware (refer to “Flashing the firmware” on page 193)
EAGLE
Release 1.02 10/04 45
Hardware 3.2 Recovery button
EAGLE
46 Release 1.02 10/04
Installation and startup procedure
4 Installation and
startup procedure
The EAGLE industrial firewall/VPN system has been developed for practical
applications in a harsh industrial environment. Accordingly, the installation
process has been kept simple. The few configuration settings required for
operation are described in this chapter.
Note: For security reasons, change the root and the administrator passwords
when you initially change the configuration.
EAGLE
Release 1.02 10/04 47
Installation and startup procedure
RS2-… Before
MICE
RS2-…
RS2-…
MICE
After RS2-…
x EAGLE
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
k
IP-ADDRESS
g
MICE
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
RS2-…
RS2-…
MICE
EAGLE
48 Release 1.02 10/04
Installation and startup procedure 4.1 Device installation
Warning!
The devices are designed for operation with safety extra-low voltage.
Thus, they may only be connected to the supply voltage connections and to
the signal contact with PELV circuits or alternatively SELV circuits with the
voltage restrictions in accordance with IEC/EN 60950.
U Supply voltage
The supply voltage can be connected redundantly. Both inputs are
uncoupled. There is no distributed load. With redundant supply, the
transformer supplies the device alone with the higher output voltage.
The supply voltage is electrically isolated from the housing.
U Signal contact
The signal contact monitors proper functioning of the device,
thus enabling remote diagnostics.
A break in contact is reported via the potential-free signal contact
(relay contact, closed circuit):
D The failure of at least one of the two supply voltages (supply voltage 1
or 2 < 9,6 V).
D A continuous malfunction in the device (internal 3.3 VDC voltage).
D The defective link status of at least one port. With the device the
indication of link status can be masked by the management for each
port. Link status is not monitored in the delivery condition.
D Error during self-test.
EAGLE
Release 1.02 10/04 49
Installation and startup procedure 4.1 Device installation
Fault
V Pull the terminal block off the device and connect the power supply and
signal lines.
4.1.2 Assembly
On delivery, the device is ready for operation.
V Attach the upper snap-in guide of the device into the top-hat rail and press
it down against the top-hat rail until it snaps into place.
EAGLE
50 Release 1.02 10/04
Installation and startup procedure 4.1 Device installation
Note: The front panel of the housing is grounded via a ground connection.
Note: The shielding ground of the industrial connectable twisted pair lines is
connected to the front panel as a conductor.
EAGLE
Release 1.02 10/04 51
Installation and startup procedure 4.1 Device installation
4.1.3 Interfaces
n.c. Pin 8
n.c. Pin 7
TD- Pin 6
n.c. Pin 5
n.c. Pin 4
TD+ Pin 3
RD- Pin 2
RD+ Pin 1
Fig. 12: Pin assignment of a TP/TX interface in MDI-X mode, RJ45 socket
EAGLE
52 Release 1.02 10/04
Installation and startup procedure 4.1 Device installation
Note: Make sure, that you conncet LH ports only to LH ports, SM ports
only to SM ports and MM ports only to MM ports.
RJ11 DB9
Pin 5
Pin 6 Pin 8
Pin 1
Pin 1
CTS 1
n.c. 2 2
TX 3 3
GND 4
RX 5 5
RTS 6
EAGLE
Release 1.02 10/04 53
Installation and startup procedure 4.1 Device installation
RJ11 DB9
Pin 1
Pin 6 Pin 7
Pin 1
Pin 5
1
CTS 1 2
n.c. 2 3
TX 3 4
GND 4 5
RX 5 6
RTS 6 7
8
9
4.1.4 Disassembly
V In order to remove the device from the top-hat rail, move the screwdriver
horizontally under the chassis in the locking gate, pull this down — without
tilting the screwdriver — and fold the device up.
EAGLE
54 Release 1.02 10/04
Installation and startup procedure 4.1 Device installation
EAGLE
Release 1.02 10/04 55
Installation and startup procedure 4.1 Device installation
EAGLE
56 Release 1.02 10/04
Installation and startup procedure 4.2 Startup operation
When the supply voltage is connected via the terminal, start up the device.
EAGLE
Release 1.02 10/04 57
Installation and startup procedure 4.2 Startup operation
EAGLE
58 Release 1.02 10/04
Installation and startup procedure 4.3 Basic settings
EAGLE
Release 1.02 10/04 59
Installation and startup procedure 4.3 Basic settings
EAGLE
60 Release 1.02 10/04
Installation and startup procedure 4.3 Basic settings
By double-clicking a line, you open a window in which you can enter the
device name and the IP parameter.
Note: For security reasons, switch off the HiDiscovery function for the device
in the Web-based management, after you have assigned the IP parameters
to the device.
EAGLE
Release 1.02 10/04 61
Installation and startup procedure 4.3 Basic settings
If the system, which will be used to configure the device, was not
previously connected to a network, e.g. because the computer is new,
its network interface will generally not be configured yet. This means that
the system has not yet "been informed" that network traffic should be
handled by this interface.
In this case, you must initialize the standard gateway by assigning it a
dummy value. To accomplish this, proceed as follows:
EAGLE
62 Release 1.02 10/04
Installation and startup procedure 4.3 Basic settings
If no IP address has been entered for the standard gateway in this dialog
box, e.g. because Obtain an IP address automatically has been
activated, enter an IP addresses manually. To do so, first activate Use
the following IP address and then enter, as an example, the following
addresses:
IP address:192.168.1.2
Subnet mask:255.255.255.0
Standard gateway:192.168.1.1
EAGLE
Release 1.02 10/04 63
Installation and startup procedure 4.3 Basic settings
Example:
You have determined that the address of the standard gateway is:
192.168.1.1
Then the command should be:
arp -s 192.168.1.1 aa-aa-aa-aa-aa-aa
After setting the configuration, restore the original setting for the standard
gateway address. To do so, either restart the configuration computer or
enter the following command at the DOS level [in the Command Prompt
window]:
arp -d
EAGLE
64 Release 1.02 10/04
Configuration
5 Configuration
Requirements
D When you make the initial configuration, there must be a valid connection
at both network ports (secure and insecure). If this not be possible, enter
a standard gateway on the configuration computer (see the example on
page 63).
D For local configuration:
The computer with which you make the configuration must be either
– directly connected to the device,
– or it must be connected to it via the local network.
D For remote configuration on the insecure port:
The EAGLE must be configured in such a way that it allows remote
configuration.
D The EAGLE must be switched on, i.e. must be connected to a power
supply unit so that it is supplied with current.
D The EAGLE must be connected, i.e. the required connections must
function properly.
EAGLE
Release 1.02 10/04 65
Configuration
EAGLE
66 Release 1.02 10/04
Configuration 5.1 Setting up a local configuration connection
Depending on the network mode (operating mode) in which the EAGLE is in,
it can be reached at the one of the following addresses according to the
factory setting:
Mode Address
Transparent https://1.1.1.1/
Router or PPPoE https://192.168.1.1/
Proceed as follows:
EAGLE
Release 1.02 10/04 67
Configuration 5.1 Setting up a local configuration connection
V Make certain that the browser does not automatically setup a connection
when it starts, because otherwise the connection startup to the EAGLE
could be impaired.
In MS Internet Explorer, you can prevent this with the following setting:
In the Extras menu, select Internet Options... and click on
the Connections tab. Make certain that "Never dial a connection" is
selected under Dial-up and Virtual Private Network settings.
V Enter the complete address of the EAGLE into the browser's address
field.
Afterwards:
The EAGLE's Administrator Web page will be displayed. The security
notice shown on the next page will displayed.
EAGLE
68 Release 1.02 10/04
Configuration 5.1 Setting up a local configuration connection
After the connection has been successfully setup, the following security
notice will be displayed (MS Internet Explorer):
Name Entry
Login admin
Passwort private
EAGLE
Release 1.02 10/04 69
Configuration 5.1 Setting up a local configuration connection
V Once you have confirmed the changes by clicking on OK, the new settings
will be activated on the device.
You may receive a message from the system (confirmation).
If the changes are not shown when you open the page again, because the
browser has loaded the page from a cache, reload the page to refresh the
display. To do so, click on the appropriate icon in the browser toolbar.
Note: Depending on how you configure the EAGLE, you may also need to
modify the network interface settings of the locally connected system or
network accordingly.
EAGLE
70 Release 1.02 10/04
Configuration 5.2 Remote configuration
Prerequisites:
The EAGLE must be configured via the unsecure port. For reasons of
security, remote configuration is disabled by default.
For information on how to enable remote configuration, see “Access:HTTPS”
on page 160.
V As the URL, enter: the IP address under which the remote site can be
reached via the Internet or WAN, plus the port number.
Example:
If this EAGLE can be found in the Internet at the address 192.144.112.5 and
the Port Number 443 has been set as the port for remote access, you must
enter the following address in the Web browser's address field on the remote
system: 192.144.112.5
(If a different Port Number is used, this must be appended to the IP address,
e.g.: 192.144.112.5:442)
Note: For reasons of security, we recommend that you change the default
Root and Administrator passwords during the first configuration - see
“Access:passwords” on page 157.
EAGLE
Release 1.02 10/04 71
Configuration 5.2 Remote configuration
U Local installation:
V Connect your modem on the one end to the telephone network and
on the other end to the V.24 port of the EAGLE via the mode cable
(see “Accessories” on page 220).
U Remote installation:
V Connect your PC to the telephone network via the built-in or external
modem.
RS2-…
x EAGLE
INSYS
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
k
IP-ADDRESS
Telephone line
1
g
MICE
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
Modem
RS2-…
unsecure
network
RS2-…
MICE
EAGLE
72 Release 1.02 10/04
Configuration 5.2 Remote configuration
Select "Properties" to
check the settings for
the connection (see the
following two figures).
EAGLE
Release 1.02 10/04 73
Configuration 5.2 Remote configuration
EAGLE
74 Release 1.02 10/04
Configuration 5.2 Remote configuration
After a connection has been set up, the connection symbol will appear in
the task bar tray at the bottom right.
V Left-click the connection symbol and select Status.
V In the status window click the register card "Details".
This register card contains the
IP address of the EAGLE (= server IP address).
V Enter htpps:// followed by this IP address in the address bar of your
browser to establish the connection to the EAGLE's Web-based
administrator user interface.
Requirement: Configuration of the serial interface (see the following
figure).
EAGLE
Release 1.02 10/04 75
Configuration 5.2 Remote configuration
EAGLE
76 Release 1.02 10/04
Web-based management
6 Web-based management
The user-friendly Web-based interface gives you the option of managing the
MICE from any location in the network via a standard browser such as the
Netscape Navigator/Communicator or the Microsoft Internet Explorer.
The Web-based interface allows you to graphically configure the EAGLE.
EAGLE
Release 1.02 10/04 77
Web-based management
EAGLE
78 Release 1.02 10/04
Web-based management 6.1 Overview
6.1 Overview
The Overview dialog shows you a graphic display of the EAGLE and the
system data:
D Name: any name you wish to assign to the EAGLE for easier
identification.
D Location: Location of this EAGLE.
D Power supply 1/2: Status of the power supply units.
D Uptime: Time that has elapsed since the EAGLE was last restarted.
D Temperature, displays the temperature inside the EAGLE. Enter the
lower and upper temperatures as alarm thresholds.
EAGLE
Release 1.02 10/04 79
Web-based management 6.1 Overview
EAGLE
80 Release 1.02 10/04
Web-based management 6.2 System menu
6.2.1 System:Configurations-Profiles
You can save the configuration settings as a configuration profile under any
name in the EAGLE. You can create and save multiple configuration profiles.
You can then select and activate the configuration profile appropriate at the
time, if you use the EAGLE in different operating environments.
Furthermore, you can also save configuration profiles as files on the
configuration system. Naturally, these configuration files can then be read
back into the EAGLE and activated.
Furthermore, you can restore the EAGLE to the factory settings at any time.
Note: Passwords and user names are not saved in the configuration profiles.
EAGLE
Release 1.02 10/04 81
Web-based management 6.2 System menu
Stored
configuration
profile
EAGLE
82 Release 1.02 10/04
Web-based management 6.2 System menu
EAGLE
Release 1.02 10/04 83
Web-based management 6.2 System menu
6.2.2 System:Reboot
At the end of restart, the text appears “Restarted.”
A reboot can be initiated by switching the device off and then back again or
by pressing the Recovery button (see “Performing a restart” on page 189).
EAGLE
84 Release 1.02 10/04
Web-based management 6.2 System menu
EAGLE
Release 1.02 10/04 85
Web-based management 6.2 System menu
6.2.4 System:HiDiscovery
The HiDiscovery protocol allows you to assign the EAGLE an IP address
based on its MAC address. Activate the HiDiscovery protocol if you want
to assign an IP address to the EAGLE from your PC with the enclosed
HiDiscovery software (setting on delivery: active).
Note: For security reasons, the EAGLE HiDiscovery function supports only
the secure port
EAGLE
86 Release 1.02 10/04
Web-based management 6.2 System menu
MACH 3002
x EAGLE
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
MICE k
IP-ADDRESS
g
Industrial Backbone
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
MACH 3002
Subnet 1
RS2-… RS2-…
MICE
Network Management F
EAGLE
Release 1.02 10/04 87
Web-based management 6.2 System menu
U Signal contact
Setting the function of the signal contact:
D Operational supervision
D Manual setting
U Operational supervision
A break in contact is reported via the zero-potential signal contact
(relay contact, closed circuit):
D the failure of at least one of the two supply voltages (power supply
voltage 1 or 2 < 9,6 V).
Note: With a non-redundant supply of the supply voltage, the EAGLE will
report a supply power failure. You can prevent this by
– feeding the supply voltage over both inputs or
– by selecting “Ignore redundant power supply”.
D the defective link status of at least one port. The link status message
can be masked for
– Ignore: no link monitor
– Supervise only internal port (trusted)
– Supervise only external port (untrusted)
– Supervise both ports
Link status is not monitored in the delivery condition.
U Manual settings
This mode gives you the option of remote switching the signal contact.
V Select Open (Alarm) to open the contact.
V Select Closed to close the contact.
EAGLE
88 Release 1.02 10/04
Web-based management 6.2 System menu
Application options:
D Simulation of an error during SPS error monitoring.
D Remote control of a device via SNMP, such as switching on a camera.
EAGLE
Release 1.02 10/04 89
Web-based management 6.2 System menu
EAGLE
90 Release 1.02 10/04
Web-based management 6.3 Ports menu
U Automatic Configuration
In the “Automatic Configuration” (Autonegotiation) column, you can
activate the automatic selection of a port's operating mode by marking
the appropriate field. After the au-tonegotiation has been switched on,
it takes a few seconds for the oper-ating mode to be set.
EAGLE
Release 1.02 10/04 91
Web-based management 6.3 Ports menu
U Manual Configuration
In the “Manual Configuration” column, you set the operating mode for
this port. The choice of operating modes depends on the media module.
The possible operating modes are:
D 10 Mbit/s half duplex (HDX),
D 10 Mbit/s full duplex (FDX),
D 100 Mbit/s HDX and
D 100 Mbit/s FDX.
Note: The active automatic configuration has priority over the manual
configuration.
EAGLE
92 Release 1.02 10/04
Web-based management 6.4 Redundancy
6.4 Redundancy
EAGLE
Release 1.02 10/04 93
Web-based management 6.4 Redundancy
U Redundancy port
Select the port that leads directly to the coupling switch (see Fig. 37).
MICE
RS2-…
MICE Coupling switch
x EAGLE x EAGLE
1 2
P FAULT
1 2
P FAULT STATUS
LS/DA
LS/DA STATUS
1 2 V.24
1 2 V.24 R
R
k k
IP-ADDRESS
IP-ADDRESS
1
1
2
2
g Aufkleber MAC-Adresse
g
Aufkleber MAC-Adresse
FAULT
FAULT
+24V (P1)
+24V (P2)
Redundancy port
+24V (P1)
+24V (P2)
0V
0V
0V
0V
V.24
V.24
MACH 3002
MACH 3002
Industrial Backbone
MACH 3002
EAGLE
94 Release 1.02 10/04
Web-based management 6.5 Network menu
6.5.1 Network:Base
The EAGLE must naturally be set to the Network Mode (= operating mode)
that matches its connection to the local computer or network (see “Typical
application scenarios” on page 33).
Variable IP address
in transparent mode 1.1.1.1
in router mode 192.168.1.1
in PPPoE mode 192.168.1.1
Local netmask 255.255.255.0
EAGLE
Release 1.02 10/04 95
Web-based management 6.5 Network menu
Note: When the Network Mode has been changed, the device will reboot
automatically.
Note: If you change the address of the EAGLE (e.g. by changing the Network
Mode from Stealth to Router), the device will be immediately, after a restart,
only accessible at the new address. See “System configuration via Web-
based management” on page 62.
Note: If you set the Network Mode to Router, PPPoE or PPTP and then
change the internal IP address and/or the local netmask, make very certain
that you enter the correct values. Otherwise, the EAGLE will no longer be
accessible.
U Network mode
D Transparent mode
The Transparent mode is used to connect an individual (single client,
SCT) or several devices (multi-client, MCT) to secure port (state on
delivery: Multi-client transparent mode).
Integrate the EAGLE into the existing network. The IP parameters of
the existing network do not need to be reconfigured (see Fig. 9).
The EAGLE analyzes the flowing network traffic and configures its
network connection automatically and operates transparently, i. e.
without the client having to be reconfigured.
Here you can enter the local IP parameters of the EAGLE. These
parameters allow you access to the management of the EAGLE.
The firewall security function is available in the SCT and MCT mode.
The VPN security function is available in SCT.
EAGLE
96 Release 1.02 10/04
Web-based management 6.5 Network menu
D Router mode
If the EAGLE is not in transparent mode, it functions as a normal
router and consequently has an external and internal IP address.
The security functions firewall and VPN are available.
EAGLE
Release 1.02 10/04 97
Web-based management 6.5 Network menu
Note: If the EAGLE is operated in PPTP mode, you must set it as the
standard gateway in the locally connected client computers. In other
words, the address entered for the standard gateway must be the internal
IP address of the EAGLE (see “IP configuration for the Windows clients”
on page 149).
U Internal IPs
Router / PPPoE / PPTP mode
Default setting:
IP address: 192.168.1.1
Lokal Netmask: 255.255.255.0
You can also specify other addresses, under which the EAGLE can be
accessed by devices on the locally connected network. This can be
useful, for example, if the locally connected network is divided into
subnetworks. In this case, multiple units on different subnetworks can
access the EAGLE under different addresses
V If you wish to define another internal IP, click on New.
V If you wish to delete an internal IP, click on Delete.
The first IP address in the list cannot be deleted.
EAGLE
98 Release 1.02 10/04
Web-based management 6.5 Network menu
EAGLE
Release 1.02 10/04 99
Web-based management 6.5 Network menu
EAGLE
100 Release 1.02 10/04
Web-based management 6.5 Network menu
U Multiple-Client:
Several devices to be protected are connected to the EAGLE
(default settings). The EAGLE does not support VPN in MCT mode.
Enter the IP parameters under “IP local configuration”.
EAGLE
Release 1.02 10/04 101
Web-based management 6.5 Network menu
6.5.3 Network:Router
Requirement: The EAGLE has been set to the network mode Router.
U External interface
Obtain external configuration via DHCP: Yes / No.
V If the EAGLE obtains the configuration data per DHCP (Dynamic Host
Configuration Protocol) from the DHCP server, set Yes. No other
information is necessary.
V If the EAGLE does not obtain the data via DHCP (Dynamic Host
Configuration Protocol) from the DHCP server, set No.
The EAGLE must then operate in the network mode Router
(see “Router mode” on page 97). You must then make provide
further information:
EAGLE
102 Release 1.02 10/04
Web-based management 6.5 Network menu
U Default Route
Default Route via IP
Is determined by the Internet service provider (ISP), when the EAGLE
sets up the gateway to the Internet. If the EAGLE is used within the LAN,
the route from the network administrator is specified.
Note: If the local network is not known to the external router, e.g. in the
case of configuration by DHCP, enter the address of your local network
under Firewall:NAT, in other words 0.0.0.0/0
(see “Firewall:NAT” on page 116).
EAGLE
Release 1.02 10/04 103
Web-based management 6.5 Network menu
6.5.4 Network:PPPoE
Requirement: The EAGLE has been set to the network mode PPPoE.
(see “PPPoE mode” on page 97).
User name (login) and password are requested by the Internet Service
Provider (ISP), when you wish to establish a connection with the Internet.
U PPPoE Login
In this field, enter the user name (Login), which is expected by your
Internet Service Provider when you setup a connection to the Internet.
U PPPoE Password
In this field, enter the password, which is expected by your Internet
Service Provider when you setup a connection to the Internet.
EAGLE
104 Release 1.02 10/04
Web-based management 6.5 Network menu
6.5.5 Network:PPTP
Requirement: The EAGLE has been set to the network mode PPTP
(see “PPTP Mode” on page 97).
User name (Login) and password are requested by the Internet service
provider (ISP), when you wish to establish a connection with the Internet.
U PPPoE Login
In this field, enter the user name (Login), which is expected by your
Internet Service Provider when you setup a connection to the Internet.
U PPPoE Password
In this field, enter the password, which is expected by your Internet
Service Provider when you setup a connection to the Internet.
EAGLE
Release 1.02 10/04 105
Web-based management 6.5 Network menu
U Set local IP
Via DHCP
If the address data for access to the PPTP server is supplied by the
Internet service provider per DHCP, select via DHCP.
You do not have to make an entry under Local IP.
Modem IP. This is the address of the PPTP server of the Internet Service
Provider.
EAGLE
106 Release 1.02 10/04
Web-based management 6.5 Network menu
6.5.6 Network:Status
U Network mode
Displays the current operating mode of the EAGLE: Transparent (SCT/
MCT), router, PPPoE or PPTP (see “Network:Base” on page 95).
U External IP
The IP address of the EAGLE at its connection for the insecure network
(WAN or Internet).
If the EAGLE is assigned an IP address dynamically, you can look up the
currently valid IP address here.
In transport mode, the EAGLE takes on the local IP address
(see “Network:Transparent mode” on page 100).
U Default gateway
The default gateway address is shown here that is entered in the
EAGLE.
EAGLE
Release 1.02 10/04 107
Web-based management 6.5 Network menu
EAGLE
108 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
Note: VPN connections are not subject to the firewall rules defined under
this menu item. You can define firewall rules for each each individual VPN
connection in the menu “VPN:Connections” on page 122.
Note: If multiple firewall rules are set, they will be searched in the order
in which they are listed (from top to bottom) until a suitable rule is found.
This rule will then be applied. If further down in the list there are other rules,
which would also fit, they will be ignored.
EAGLE
Release 1.02 10/04 109
Web-based management 6.6 Configuring the firewall
6.6.1 Firewall:Incoming
Lists the firewall rules that have been set. They apply to incoming data
packets that are initiated externally.
Note: If no rule has been set, all incoming connections (except for VPN)
are rejected (= factory setting).
U Deleting a rule
V Click on the “Delete” button next to the entry. Then click on “OK”.
EAGLE
110 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
Note: If you select All, the EAGLE ignores the port settings (from port,
to port).
EAGLE
Release 1.02 10/04 111
Web-based management 6.6 Configuring the firewall
6.6.2 Firewall:Outgoing
Lists the firewall rules that have been established. They apply to outgoing
data connections that are initiated internally. The default setting allows all
packets to pass through.
With the default rule, all outgoing connections are permitted to pass through.
U Deleting a rule
V Click on the “Delete” button next to the entry. Then click on “OK”.
EAGLE
112 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
Note: If you select All, the EAGLE ignores the port settings (from port,
to port).
EAGLE
Release 1.02 10/04 113
Web-based management 6.6 Configuring the firewall
Note: The rules established here have priority over the settings under
“Firewall:Incoming” on page 110.
U Deleting a rule
V Click on the “Delete” button next to the entry. Then click on “OK”.
EAGLE
114 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
EAGLE
Release 1.02 10/04 115
Web-based management 6.6 Configuring the firewall
6.6.4 Firewall:NAT
For outgoing addresses the EAGLE can translate the specified sender IP
addresses from its internal network (in the example below: 192.168.x.x)
into its own external address (in the example below: 148.218.112.7 or
149.218.112.8). The EAGLE can break down the assignment of the
incoming data packets using the logical ports.
This method is used if the internal addresses cannot or should not be
routed externally, for example, because a private address range such
as 192.168.x.x is being used or the internal network structure is to be
concealed.
This procedure is also referred to as IP masquerading.
The dialog lists the defined rules for NAT (Network Address Translation).
U Principle of IP masquerading
For addressing purposes, TCP/IP uses so-called port numbers
(UDP, TCP) for the source and destination in addition to the IP
addresses.
Masquerading makes use of this feature.
If the EAGLE receives a data packet in router mode at a secure port,
it will then enter the IP address of the sender (source) and the port in
an internal table. The EAGLE assigns this table entry its own IP port
address and a random port number as new source information.
The EAGLE then forwards the data packet with this new information
at the insecure port.
This is how the receiver sends its reply to this data packet to the EAGLE.
The EAGLE in turn forwards the reply back to the original address using
its internal address.
This method permits a communication request from the the secure to the
insecure network, for example, for one computer located in cell 3 to a
computer in the industrial backbone (see the figure below).
EAGLE
116 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
192.168.0.3 192.168.0.3
MICE MICE
Cell 3 Cell 2
192.168.0.1 192.168.0.2
192.168.04 192.168.04
RS2-… RS2-… RS2-… RS2-…
192.168.0.1
MICE
192.168.0.1 MICE
x EAGLE
x EAGLE
148.218.112.7
1 2
P FAULT
LS/DA STATUS
1 2 V.24
1 2
P FAULT R
LS/DA STATUS
k
1 2 V.24
R
IP-ADDRESS
k 1
IP-ADDRESS
148.218.112.6
2
Aufkleber MAC-Adresse
2
g
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
FAULT
+24V (P1)
+24V (P2)
V.24
0V
0V
V.24
148.218.112.9
148.218.112.8 MICE
Industrial Backbone
RS2-…
EAGLE
Release 1.02 10/04 117
Web-based management 6.6 Configuring the firewall
U Deleting a rule
V Click on the “Delete” button next to the entry. Then click on “OK”.
EAGLE
118 Release 1.02 10/04
Web-based management 6.6 Configuring the firewall
EAGLE
Release 1.02 10/04 119
Web-based management 6.6 Configuring the firewall
Special analysis programs are available which can be used to present the
information from the log in a more readable format.
EAGLE
120 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
Note: VPN is not supported in MCT mode and not by the device models
EAGLE (FW).
EAGLE
Release 1.02 10/04 121
Web-based management 6.7 Setting up a VPN connection
6.7.1 VPN:Connections
Lists the VPN connections that have been setup.
All of the listed connections may be active at the same time.
EAGLE
122 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
U Deleting a connection
V Click “Delete” next to the respective entry. Then “OK”.
U Active
Determine if the connection is to be active (=Yes) or not (= No).
EAGLE
Release 1.02 10/04 123
Web-based management 6.7 Setting up a VPN connection
EAGLE
124 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
192.168.208.2
MACH 3002
x EAGLE
unsecure LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
network
k
IP-ADDRESS
1
VPN g
Industrial Backbone
Aufkleber MAC-Adresse
FAULT
+24V (P1)
+24V (P2)
0V
0V
V.24
192.168.208.11
192.168.208.1
EAGLE
Release 1.02 10/04 125
Web-based management 6.7 Setting up a VPN connection
U Connection type
EAGLE
126 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
U Initiating a connection
There are 2 options:
– Start a connection to the remote side
– Wait for the remote side [to setup a connection]
D Start a connection to the remote side
In this case, the local EAGLE sets up the connection to the remote
side. The fixed IP address or domain name of the remote side must
be entered in Address of the remote site's VPN gateway
(see above) field.
D Wait for the remote side [to setup a connection]
In this case, the local EAGLE is ready to accept a connection, which
a remote site actively initiates and sets up to the local EAGLE.
The entry in the Address of the remote site's VPN gateway
(see above) field may be: %any.
If the EAGLE should only accept a connection initiated by a specific
remote site (which has a fixed IP address), enter its IP address or
hostname to be on the safe side.
EAGLE
Release 1.02 10/04 127
Web-based management 6.7 Setting up a VPN connection
U Authentication method
There are 2 options:
– X.509 Certifikate and
– Pre-Shared Key
D X.509 Certificate
This method is supported by most of the newer IPsec implementations
and is currently considered the most secure. In this case, the EAGLE
uses the public key of the remote site (filename *.cer or *.pem) to
encrypt the authentication datagram before it sends to the remote site,
the “tunnel end”. (You must have received this *.cer or *.pem file
from the operator at the remote site - perhaps on a diskette or attached
to an e-mail).
EAGLE
128 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
EAGLE
Release 1.02 10/04 129
Web-based management 6.7 Setting up a VPN connection
EAGLE
130 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
U Tunnel settings
D The address of the local network
D The related network mask
These entries specify the address of the client (network or computer),
that is directly connected to the secure port of the EAGLE which the
EAGLE is protecting. The address designates the local endpoint of
the connection.
MACH 3002
MACH 3002
LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
unsecure LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
network
k k
IP-ADDRESS
IP-ADDRESS
1 1
2 2
g g
Aufkleber MAC-Adresse
Aufkleber MAC-Adresse
FAULT
FAULT
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
0V
0V
0V
0V
V.24 V.24
to the remote
Tunnel: The address of the terminal
local network. (can also be
an individual computer)
EAGLE
Release 1.02 10/04 131
Web-based management 6.7 Setting up a VPN connection
Example:
If the computer connected to the EAGLE is the one you are using to
configure the device, the entries could then be:
Address of the local network: 192.168.1.1
The related network mask: 255.255.255.0
See also “Example of a network” on page 185.
D The virtual IP which will be used by the client SCT mode
A VPN tunnel can only connect two local networks over a public
network. If the EAGLE is operating in single-client transparent
mode, there is only one single computer connected to it - see
“Network:Transparent mode” on page 100. Hence, to set up
a VPN tunnel, a connected local network must be simulated.
The computer connected to the EAGLE is assigned a virtual
IP address in this network.
For the remote terminal, this virtual IP address is the address of the
(simulated) local network, at which the computer that is physically
connected to the EAGLE can be reached in the VPN. For the remote
terminal this means that this simulated IP address there is to be
specified as the address of the network on the other end when the
VPN connection is configured.
The system locally connected to the EAGLE “knows” nothing of this
virtual IP under which it is accessed by the remote site. In other
words, it need not be specially configured.
What this means is that:
– You can enter any IP address desired in the syntax 192.xxx.xxx.xxx
(x = any digit) as long as it is not already assigned at the remote site.
To avoid conflicts with IP addresses at the remote site, speak with the
responsible administrator.
This virtual IP address must be entered at the remote site in the
configuration of this VPN connection as the Remote network address.
D Tunnel: Remote network address
D Tunnel: The appropriate remote netmask
With these two entries, you specify the address of the network in
which the remote communication partner can be found. This address
can also be that of a computer, which is connected directly to the
VPN gateway.
EAGLE
132 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
MACH 3002
MACH 3002
LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
unsecure LS/DA
P
1
1
2
2 V.24
R
FAULT
STATUS
network
k k
IP-ADDRESS
IP-ADDRESS
1 1
2 2
Aufkleber MAC-Adresse g g
Aufkleber MAC-Adresse
FAULT
FAULT
+24V (P1)
+24V (P2)
+24V (P1)
+24V (P2)
0V
0V
0V
0V
V.24 V.24
Note: According to the factory setting, the VPN firewall is set up in such
a way that everything is permitted for the VPN connection.
The extended firewall settings, which are defined and explained at the top
(see “Firewall:Extended Settings” on page 119), apply nonetheless for
each individual VPN connection independent of each other.
Note: If multiple firewall rules are set, they will be searched in the order
in which they are listed (from top to bottom) until a suitable rule is found.
This rule will then be applied. If further down in the list there are other
rules, which would also fit, they will be ignored.
V To set or delete a firewall rule, proceed as described in the earlier
sections (see “Firewall:Incoming” on page 110 and
“Firewall:Outgoing” on page 112).
EAGLE
Release 1.02 10/04 133
Web-based management 6.7 Setting up a VPN connection
Log
For each individual firewall rule you can decide if, when the rule is
applied,
– the event should be logged – set Log to Yes
– or not – set Log to No (factory default setting).
Note: If multiple firewall rules have been set, these will be processed in
the order that they were entered.
EAGLE
134 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
EAGLE
Release 1.02 10/04 135
Web-based management 6.7 Setting up a VPN connection
U Certificate
Display the currently imported X.509 certificate with which the EAGLE
identifies itself to other VPN gateways. The following information is
displayed:
Info Meaning
subject The owner to whom the certificate is issued.
issuer The point of authentication that signed the certificate.
C : Country
ST: State
L : City
O : Organization
OU: Department (organization unit)
CN: Hostname, common name
MD5, SHA1 Fingerprint Fingerprint of the certificate so that it, for example,
can be compared with others on the phone. Here,
Windows displays the fingerprint in the SHA1 format.
notBefore, notAfter Validity period of the certificate. Is ignored by the
EAGLE since it does not have a built-in clock.
EAGLE
136 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
U New certificate
Requirement:
The certificate file (filename = *.p12 or *.pfx) is generated and stored on
the connected computer.
V Click Search... to select the file.
V Enter the password with which the private key of the PKCS#12 file is
protected into the field.
V Click Import.
V Afterwards, click OK.
V After the import a system message will appear:
EAGLE
Release 1.02 10/04 137
Web-based management 6.7 Setting up a VPN connection
6.7.3 VPN:L2TP
EAGLE
138 Release 1.02 10/04
Web-based management 6.7 Setting up a VPN connection
Should you encounter problems, we recommend that you take a look at the
VPN logs of the computer to which the connection was set up. For security
reasons, the initiating computer will not be sent any detailed error messages.
EAGLE
Release 1.02 10/04 139
Web-based management 6.7 Setting up a VPN connection
EAGLE
140 Release 1.02 10/04
Web-based management 6.8 Services menu
6.8.1 Services:DNS
If the EAGLE is to set up a connection to a remote terminal (for example
VPN gateway or NTP server), it must know the IP address of the remote
terminal. If the address is provided as a domain address (i. e. in the
format www.abc.xyz.de), the device must first look up which IP address
this resolves to on the domain nameserver.
If the EAGLE is not in transparent mode, you can configure the locally
connected clients, so that they can use the EAGLE to resolve the
hostnames into IP addresses (see “IP configuration for the Windows clients”
on page 149).
EAGLE
Release 1.02 10/04 141
Web-based management 6.8 Services menu
U Hostname mode
With hostname mode and hostname you can assign the EAGLE
a name. It will be displayed when someone logs in with SSH. A name
environment simplifies the administration of several EAGLEs.
D User defined (see below)
(Standard) The name entered in the field hostname is set as the
name for the EAGLE.
U Hostname
If the option User defined is selected under hostname mode, then enter
the name here that is to be given to the EAGLE.
If the option Provider (e. g. via DHCP) is selected under Hostname
mode, an entry in this field will be ignored.
U Used nameserver
Options:
– Root Nameserver
– Provider defined
– User defined
EAGLE
142 Release 1.02 10/04
Web-based management 6.8 Services menu
D Root Nameserver
Requests are sent to the root nameserver in the Internet whose
IP addresses are stored in the EAGLE. These addresses seldom
change. This setting should only be selected if the alternative settings
do not function.
D Provider defined
With this setting, the device will use the Domain nameserver of
the Internet Service Provider, which is used to access the Internet.
You can select this setting, when the EAGLE will be operated in
PPPoE or Router mode with DHCP active (see “Services:DHCP” on
page 147).
D User defined
If this setting is selected, the EAGLE sets up a connections with the
domain nameservers that are listed in User-defined nameserver.
In transparent mode only the first two entries are evaluated in this list.
Note: If you have selected User defined, you must configure the locally
connected clients to use the address of the EAGLE to retrieve the
IP address associated with a hostname (see “IP configuration for the
Windows clients” on page 149).
EAGLE
Release 1.02 10/04 143
Web-based management 6.8 Services menu
EAGLE
144 Release 1.02 10/04
Web-based management 6.8 Services menu
U Polling interval
Standard: 300 (seconds)
EAGLE
Release 1.02 10/04 145
Web-based management 6.8 Services menu
U Refresh Interval
Standard: 420 (seconds)
Whenever the IP address of its own Internet access is changed, the EAGLE
will inform the DynDNS Service of its new IP address. For additional
reliability, the device will also report its IP address at the interval set here.
U DynDNS provider
The providers made available for selection support the same protocol
that the EAGLE supports.
Enter the name of the provider where you are registered, for example
DynDNS.org.
U DynDNS server
Name of the server of the DynDNS providers selected above,
for example: dyndns.org.
U DynDNS Login
Enter the user name that you have been assigned here.
U DynDNS Password
Enter the password that you have been assigned here.
U DynDNS Hostname
The hostname selected at DynDNS service for this EAGLE- provided that
you use a DynDNS service and have made the proper settings above.
EAGLE
146 Release 1.02 10/04
Web-based management 6.8 Services menu
6.8.4 Services:DHCP
The DHCP server (Dynamic Host Configuration Protocol) of the EAGLE
assigns the clients connected to the EAGLE automatically
D the IP addressed defined in the DHCP range and subnet masks or
D the statically entered IP addresses.
Statically entered
MAC/IP address pairs
EAGLE
Release 1.02 10/04 147
Web-based management 6.8 Services menu
Option:
If the DHCP server is activated, you can enter the network parameters to
be used by the clients:
Parameter Meaning
DHCP start of range: Beginning and end of the address range from which the DHCP
DHCP end of range: server of the EAGLE is to assign IP addresses to the locally
connected clients.
Local network mask: The default setting is: 255.255.255.0
Default gateway: Determines which IP address for the client is to be used as the
standard gateway.
DNS Server: Determines from where the clients are to obtain the IP addresses
resolved from hostnames. If the DNS service of the EAGLE is
activated, this can be the local IP address of the EAGLE.
Note: When you start the DHCP server of the EAGLE, you must configure
the locally connected clients in such a way that they automatically obtain their
IP addresses.
EAGLE
148 Release 1.02 10/04
Web-based management 6.8 Services menu
6.8.5 Services:NTP
The network time protocol (NTP) allows you to synchronize the system time
within your network. NTP has a hierarchical structure. The NTP server
makes the UTC (Universal Time Coordinated) available. The NTP client
obtains the UTC from the SNTP server.
EAGLE
Release 1.02 10/04 149
Web-based management 6.8 Services menu
U NTP State
Displays the current NTP state.
EAGLE
150 Release 1.02 10/04
Web-based management 6.8 Services menu
EAGLE
Release 1.02 10/04 151
Web-based management 6.8 Services menu
Examples:
In Berlin, the time is one hour earlier than in Greenwich. Therefore,
enter: CET-1.
In the entry, the characters preceding the -1, -2 or +1 etc. are not
considered. Only the numerical difference is important. The characters
preceding the numerical difference may be “CET” or any other acronym
that you find useful.
If you wish to display Central European Time (for example for Germany)
and have it automatically switch to/from daylight saving time, enter:
CET-1CEST,M3.5.0,M10.5.0/3
EAGLE
152 Release 1.02 10/04
Web-based management 6.8 Services menu
EAGLE
Release 1.02 10/04 153
Web-based management 6.8 Services menu
EAGLE
154 Release 1.02 10/04
Web-based management 6.8 Services menu
EAGLE
Release 1.02 10/04 155
Web-based management 6.8 Services menu
EAGLE
156 Release 1.02 10/04
Web-based management 6.9 Access menu
6.9.1 Access:passwords
The EAGLE supports 3 levels of user authorization. To login at a specific
level of authorization, the user must enter the corresponding password for
the level.
Note: Only this authorization level allows you to connect to the device via
SSH so that you can render the entire system useless by making faulty
configurations. The system can then only be returned to its delivery state
by flashing the firmware (see “Flashing the firmware” on page 193).
Default root password: root
EAGLE
Release 1.02 10/04 157
Web-based management 6.9 Access menu
EAGLE
158 Release 1.02 10/04
Web-based management 6.9 Access menu
6.9.2 Access:Language
If you select “(Automatic)” from the list of languages, the device will use the
language setting of the system's browser.
EAGLE
Release 1.02 10/04 159
Web-based management 6.9 Access menu
6.9.3 Access:HTTPS
If HTTPS remote access is activated, the EAGLE can be configured via
its Web-based administrator interface from a computer connected to the
insecure port. This means that a browser is used on the remote computer
to configure the local EAGLE.
This option is disabled by default.
IMPORTANT: If you enable remote access, make sure that a secure root and
administrator password have been defined.
EAGLE
160 Release 1.02 10/04
Web-based management 6.9 Access menu
Note: Ensure that in this case the firewall rules on this end have been set
so that it possible to access the EAGLE from an external terminal.
EAGLE
Release 1.02 10/04 161
Web-based management 6.9 Access menu
D Interface
external (fixed)
D Action
Options: Accept / Reject / Drop
Action Meaning
Accept the data packets are permitted to pass through.
Reject the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
Drop the data packets are not permitted to pass through. They are “swallowed”,
and the sender is not notified about what happened to the data.
EAGLE
162 Release 1.02 10/04
Web-based management 6.9 Access menu
6.9.4 Access:SSH
If SSH remote access is activated, the EAGLE can be configured by the
computer connected to the insecure port by making an entry on the
command line.
This option is disabled by default.
IMPORTANT: If you enable remote access, make sure that a secure root and
administrator password have been defined.
Note: Ensure that in this case the firewall rules on this end have been set
so that it is possible to access the EAGLE from an external terminal.
EAGLE
Release 1.02 10/04 163
Web-based management 6.9 Access menu
EAGLE
164 Release 1.02 10/04
Web-based management 6.9 Access menu
D Action
Options: Accept / Reject / Drop
Action Meaning
Accept the data packets are permitted to pass through.
Reject the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
Drop the data packets are not permitted to pass through. They are “swallowed”,
and the sender is not notified about what happened to the data.
EAGLE
Release 1.02 10/04 165
Web-based management 6.9 Access menu
6.9.5 Access:SNMP
SNMP (Simple Network Management Protocol) is mainly used in more
complex networks to monitor the status and operation of devices.
SNMP is available in several releases: SNMPv1/SNMPv2 and SNMPv3.
The older versions SNMPv1/SNMPv2 do not use encryption and are not
considered to be secure. We therefore recommend that you do not use
SNMPv1/SNMPv2.
As far as security is concerned, SNMPv3 is considerably better, but not all
management consoles support it.
Note: When you use SNMPv1, set up a VPN connection between the
management station and the EAGLE. The SNMPv1 passwords will then
be transmitted invisibly.
EAGLE
166 Release 1.02 10/04
Web-based management 6.9 Access menu
EAGLE
Release 1.02 10/04 167
Web-based management 6.9 Access menu
D From IP
Enter the address(s) of the computer(s) on which SNMP monitoring
is permitted.
The following options are available:
– IP address: 0.0.0.0/0 means all addresses. To indicate a range,
use the CIDR notation - see “CIDR (Classless InterDomain Routing)”
on page 183.
D Interface
external (fixed)
D Action
Options: Accept / Reject / Drop
Action Meaning
Accept the data packets are permitted to pass through.
Reject the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
Drop the data packets are not permitted to pass through. They are “swallowed”,
and the sender is not notified about what happened to the data.
EAGLE
168 Release 1.02 10/04
Web-based management 6.9 Access menu
The socket housing is electrically connected to the front panel of the device.
The signal lines are electrically isolated from the supply voltage (60 V insulation
voltage) and the front panel.
State on delivery:
- Speed:9600 Baud
- Data:8 bit
- Stopbit:1 bit
- Handshake:off
- Parity:none
EAGLE
Release 1.02 10/04 169
Web-based management 6.9 Access menu
EAGLE
170 Release 1.02 10/04
Web-based management 6.9 Access menu
EAGLE
Release 1.02 10/04 171
Web-based management 6.9 Access menu
Action Meaning
Accept the data packets are permitted to pass through.
Reject the data packets are rejected, and the sender is notified that the data was
rejected.
In transparent mode, Reject has the same effect as Discard, see above.
Drop the data packets are not permitted to pass through. They are “swallowed”,
and the sender is not notified about what happened to the data.
EAGLE
172 Release 1.02 10/04
Web-based management 6.10 Features menu
Note: For information as to whether or not and, if so, in which manner you
can obtain a software update, please contact Hirschmann.
EAGLE
Release 1.02 10/04 173
Web-based management 6.10 Features menu
EAGLE
174 Release 1.02 10/04
Web-based management 6.10 Features menu
EAGLE
Release 1.02 10/04 175
Web-based management 6.10 Features menu
EAGLE
176 Release 1.02 10/04
Web-based management 6.10 Features menu
EAGLE
Release 1.02 10/04 177
Web-based management 6.10 Features menu
EAGLE
178 Release 1.02 10/04
Web-based management 6.11 Support menu
6.11.1 Support:Snapshot
This function creates a compressed file (in the tar format), which contains
all current configuration settings and log entries, that are relevant for error
diagnostics. This file does not contain any private information such as the
private machine certificate or passwords. However, any pre-shared keys
used for VPN connections are included in the snapshots. If requested,
please provide this file to Hirschmann-Support.
V Click Download.
V Save the file under the name snapshot.tar.gz
V Please make the file available to Hirschmann Support, if so requested.
EAGLE
Release 1.02 10/04 179
Web-based management 6.11 Support menu
U Network mode
The EAGLE's mode of operation
D Transparent (SCT/MCT)
D Router
D PPPoE
D PPTP
U Externe IP
The IP address of the EAGLE at its connection for the network
(WAN or Internet) connected to the insecure port.
In transport mode, the EAGLE takes on the local IP address
(see “Network:Transparent mode” on page 100).
EAGLE
180 Release 1.02 10/04
Web-based management 6.11 Support menu
U Default gateway
The default gateway address is shown here that is entered in the
EAGLE.
U VPN
Supports:
D Total: Total number of VPN connections setup
D Used: Number of VPN connections used
D Up: Number of VPN connections currently active
U DynDNS registration
Supports:
D none: no DynDNS server specified
D DynDNS Server: Address of the DynDNS server, at which the EAGLE
should register.
D failure: The EAGLE has unsuccessfully attempted to setup a
connection to the DynDNS server.
D trying: The EAGLE is currently attempting to setup a connection to the
DynDNS server.
EAGLE
Release 1.02 10/04 181
Web-based management 6.11 Support menu
U NTP Status
Options:
D synchronized: The EAGLE receives the current time from a time
server (Greenwich time) via the Network Time Protocol.
D not synchronized: The EAGLE is not connected to a time server
and can thus not provide the current time.
U Software version
Shows the version of the software installed in the EAGLE
U System Uptime
This shows how much time has elapsed since the last time that the
EAGLE was started.
U Language
This field shows the currently selected language.
EAGLE
182 Release 1.02 10/04
Web-based management 6.12 CIDR (Classless InterDomain Routing)
EAGLE
Release 1.02 10/04 183
Web-based management 6.12 CIDR (Classless InterDomain Routing)
IP binary CIDR
255.255.255.255 11111111 11111111 11111111 11111111 32
255.255.255.254 11111111 11111111 11111111 11111110 31
255.255.255.252 11111111 11111111 11111111 11111100 30
255.255.255.248 11111111 11111111 11111111 11111000 29
255.255.255.240 11111111 11111111 11111111 11110000 28
255.255.255.224 11111111 11111111 11111111 11100000 27
255.255.255.192 11111111 11111111 11111111 11000000 26
255.255.255.128 11111111 11111111 11111111 10000000 25
EAGLE
184 Release 1.02 10/04
Web-based management 6.13 Example of a network
The diagram below illustrates how in a local network with subnetworks the
IP address could be distributed, what the resulting network addresses would
be, and how an additional internal router would be specified.
Internet
External addresses e.g.: 80.81.192.37
Internet (assigned by the Internet service provider)
1 2
P FAULT
LS/DA STATUS
1 2 V.24
R
A1 A2 A3 A4 A5
k
Network A
IP-ADDRESS
Network
2
g
Aufkleber MAC-Adresse
FAULT
address:
+24V (P1)
+24V (P2)
0V
0V
Router
V.24
192.168.11.0/24
IP external: Network mask:
192.168.11.2 MACH 3002 255.255.255.0
IP internal:
192.168.15.254
Network mask:
255.255.255.0
Network B
Network
Router address:
IP external: 192.168.15.0/24
192.168.15.1 MACH 3002 Network mask:
B1 B2 B3 B4
IP internal: 255.255.255.0
192.168.27.254
Network mask:
255.255.255.0
Network C
Network
address:
= additional 192.168.27.0/24
internal route C1 C2 C3 C4 Network mask:
255.255.255.0
EAGLE
Release 1.02 10/04 185
Web-based management 6.13 Example of a network
Computer A1 A2 A3 A4 A5
IP address 192.168.11.3 192.168.11.4 192.168.11.5 192.168.11.6 192.168.11.7
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Computer B1 B2 B3 B4
IP address 192.168.15.2 192.168.15.3 192.168.15.4 192.168.15.5
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Computer C1 C2 C3 C4
IP address 192.168.27.1 192.168.27.2 192.168.27.3 192.168.27.4
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Network Gateway
192.168.15.0/24 192.168.11.2
192.168.27.0/24 192.168.11.2
Table 16: Additional internal routes for EAGLE (see “Network:Base” on page 95)
EAGLE
186 Release 1.02 10/04
The Recovery button
EAGLE
Release 1.02 10/04 187
The Recovery button
EAGLE
188 Release 1.02 10/04
The Recovery button 7.1 Performing a restart
EAGLE
Release 1.02 10/04 189
The Recovery button 7.1 Performing a restart
EAGLE
190 Release 1.02 10/04
The Recovery button 7.2 Executing the recovery procedure
7.2.1 Aim
The recovery procedure allows you to reset selected parameters to their
default values. These parameters are:
D local IP address (0.0.0.0),
D netmask (0.0.0.0),
D operating mode (MCT mode),
D modem access (off) and
D baud rate (9600).
Note: The configured settings for VPN connections and firewall remain
unchanged, as do the passwords.
7.2.2 Action
V Perform a restart - see “Performing a restart” on page 189.
EAGLE
Release 1.02 10/04 191
The Recovery button 7.2 Executing the recovery procedure
V Press the Recovery button 6 times again within the next 60 seconds.
Result:
The device performs a restart, switches to transparent mode (MCT),
and deletes the local IP address. It can then be reached again at the
following address:
https://1.1.1.1/
EAGLE
192 Release 1.02 10/04
The Recovery button 7.3 Flashing the firmware
Aim
The entire EAGLE software is to be loaded into the device.
Note: All configured settings will be deleted. The EAGLE is reset to its default
values (state on delivery).
Action
Prerequisites:
D You have copied the software of the EAGLE from the EAGLE CD or
obtained it from Hirschmann support and have saved it on the
configurations computer.
D The DHCP and tftp server are installed on the same computer
(see “Requirements for flashing the firmware” on page 195).
Proceed as follows:
V Keep the Recovery button pressed until the recovery status starts as
follows:
The EAGLE is restarted (after 1.5 seconds). After approx. 7 seconds
the EAGLE switches to recovery status.
Status display of the recovery status: All ports and STATUS LEDs are
green-lit.
V Release the Recovery switch no more than 1 second after the device has
entered its recovery state.
Note: If you do not release the Recovery quickly enough, the EAGLE will
restart again.
EAGLE
Release 1.02 10/04 193
The Recovery button 7.3 Flashing the firmware
Result:
The EAGLE starts the recovery system. It searches for the DHCP server
via the computer connected to the secure port or via the connected
network in order to obtain an IP address from it.
D Status display: The STATUS LED blinks.
The file install.p7s is loaded from the tftp server. It contains the
electronically signed control procedure for the installation procedure.
Only files that have been signed by Hirschmann are loaded.
The control procedure then deletes the flash memory and prepares the
reinstallation of the software.
D Status display: Die 3 port LEDs form a sequential light.
The software jffs2.img.p7s is then downloaded from the tftp server
and stored in the flash memory. This file contains the actual EAGLE-
operating system and is electronically signed. Only files that have been
signed by Hirschmann are accepted.
D Status display: Die 3 port LEDs form a sequential light.
It takes about 3 to 5 minutes to delete and store the file.
The EAGLE is the then restarted automatically.
The new software is then unpacked and configured.
This takes about 5 minutes.
D Status display: The STATUS LED blinks.
Once the procedure has ended, all port LEDs blink green simultaneously.
Result:
The EAGLE is in the delivery state. Reconfigure it (see “Setting up a
local configuration connection” on page 67).
EAGLE
194 Release 1.02 10/04
The Recovery button 7.3 Flashing the firmware
Note: If you install a second DHCP server in a network, this can affect the
configuration of the entire network!
EAGLE
Release 1.02 10/04 195
The Recovery button 7.3 Flashing the firmware
V Copy the software into any empty folder on the Windows system.
Start the program TFTPD32.EXE.
The image files are also found on the CD-ROM, which was included in
the package.
EAGLE
196 Release 1.02 10/04
The Recovery button 7.3 Flashing the firmware
V Click on the tftp Server or DHCP Server tab and then click on
the Settings button to open the dialog shown below. Then set the
parameters as shown:
EAGLE
Release 1.02 10/04 197
The Recovery button 7.3 Flashing the firmware
V In this file, insert the appropriate lines or set the necessary parameter for
the TFTP service (the directory for data is: /tftpboot)
tftp dgram udp wait root /usr/sbin/in.tftpd -s /tftpboot/
EAGLE
198 Release 1.02 10/04
HiConfig
8 HiConfig
V Copy the putty.exe file from the enclosed CD to your PC's hard disk.
V Start PuTTY by doubleclicking this file.
Host name or
IP address of
the EAGLE
Connection
protocol
EAGLE
Release 1.02 10/04 199
HiConfig
V Click Open.
PuTTY establishes a connection to the EAGLE and
opens the login window.
V Press the Enter key.
The EAGLE operating system will prompt you to enter the username
(admin or root).
V Enter the username.
The EAGLE operating system will prompt you to enter the password
(private or root).
V Enter the password.
The EAGLE operating system responds with the “$” prompt
(for admin) or “#” (for root).
V Enter hiconfig (please note that entries are case-sensitive)
and press the Enter key.
HiConfig responds by displaying a list of valid commands.
--get-all
dump all configuration data to stdout
--set-all
read all configuration data from stdin
--cache <file>
alternative location for the cache file
--socket <file>
use an alternative unix domain socket
Examples:
hiconfig --set ROUTERMODE router
hiconfig --set VPN.1.GATEWAY 192.168.1.1
hiconfig --goto VPN.0 --set .GATEWAY %any --set .ENABLED no
hiconfig --goto VPN --add-row --set .NAME tokyo --set .GATEWAY
146.215.5.34
hiconfig --goto VPN.2 --delete-row
#
EAGLE
200 Release 1.02 10/04
HiConfig
Enter a name of
your choice for
this connection.
Click OK.
EAGLE
Release 1.02 10/04 201
HiConfig
EAGLE
202 Release 1.02 10/04
HiConfig
--get-all
dump all configuration data to stdout
--set-all
read all configuration data from stdin
--cache <file>
alternative location for the cache file
--socket <file>
use an alternative unix domain socket
Examples:
hiconfig --set ROUTERMODE router
hiconfig --set VPN.1.GATEWAY 192.168.1.1
hiconfig --goto VPN.0 --set .GATEWAY %any --set .ENABLED no
hiconfig --goto VPN --add-row --set .NAME tokyo --set .GATEWAY
146.215.5.34
hiconfig --goto VPN.2 --delete-row
#
EAGLE
Release 1.02 10/04 203
HiConfig
U Port Configuration
To set the port configuration you will need the following parameters:
Designation Value
Secure port ETH1
Insecure port ETH0
Enable port ENABLE
Disable port DISABLE
Autonegotiation on AUTONEG yes
Autonegotiation off AUTONEG no
10 Mbit/s, halfduplex FIXEDSETTING 10hd
10 Mbit/s, fullduplex FIXEDSETTING 10fd
100 Mbit/s, halfduplex FIXEDSETTING 100hd
100 Mbit/s, fullduplex FIXEDSETTING 100fd
The command hiconfig --set and the proper parameters allow you
to configure the ports.
Example:
Set the secure port to 10 Mbit/s halfduplex:
hiconfig --set ENABLE_ETH1_AUTONEG no
hiconfig --set ETH1_FIXEDSETTING 10hd
EAGLE
204 Release 1.02 10/04
HiConfig
The IP addresses and the network mask refer to the entries in the
HiDiscovery example (see Fig. 17).
EAGLE
Release 1.02 10/04 205
HiConfig
EAGLE
206 Release 1.02 10/04
Appendix
A Appendix
EAGLE
Release 1.02 10/04 207
Appendix
EAGLE
208 Release 1.02 10/04
Appendix FAQ
FAQ
www.hirschmann.com
EAGLE
Release 1.02 10/04 209
Appendix FAQ
EAGLE
210 Release 1.02 10/04
Appendix Based specifications and standards
U IEEE standards
IEEE 802.1 D Switching, GARP, GMRP, Spanning Tree
IEEE 802.1 Q Tagging
IEEE 802.3 Ethernet
EAGLE
Release 1.02 10/04 211
Appendix Based specifications and standards
U Supported MIBs
Private MIBs:
D hmprivate
D hmSecurityGateway-MIB
Standard MIBs:
D IF-MIB
D MAU-MIB
D RFC1155-SMI
D RFC1213-MIB
D SNMPv2-MIB
D SNMPv2-SMI
D SNMPv2-TC
EAGLE
212 Release 1.02 10/04
Appendix SNMP traps
SNMP traps
U Private MIB:
hmSecHTTPSLoginTrap
is sent, if a login attempt was made via HTTPS.
hmSecShellLoginTrap
is sent if a login was made via the security shell or the V.24 terminal.
hmSecDHCPNewClientTrap
is sent if the DHCP server receives a request from an unknown client.
hmTemperatureTrap
is sent if the temperature exceeds / falls below the set threshold values.
hmPowerSupply
is sent if the status of the voltage supply changes.
hmSignallingRelay
is sent if the status of the signal contact changes.
hmAutoconfigAdapterTrap
is sent if the AutoConfiguration adapter ACA 11 is removed or plugged
in again.
U Standard traps:
coldStart
is sent during the boot process after successful management
initialization following a cold or warm start.
linkUp
is sent if the link to a port is re-established.
linkDown
is sent if the link to a port is interrupted.
EAGLE
Release 1.02 10/04 213
Appendix SNMP traps
authenticationFailure
is sent if a station attempts to access an agent without permission.
EAGLE
214 Release 1.02 10/04
Appendix Certifications
Certifications
Standard EAGLE
EN 61131-2 In preparation
CE In preparation
FCC 47 CFR Part 15 In preparation
cUL 508 / CSA C22.2 No.142 In preparation
cUL 1604 / CSA C22.2 No.213 In preparation
Germanischer Lloyd fulfilled
EAGLE
Release 1.02 10/04 215
Appendix Certifications
EAGLE
216 Release 1.02 10/04
Appendix Technical data
Technical data
EAGLE
Dimensions W x H x D 46 x 131 x 111 mm
1.8 in x 5.2 in x 4.4 in
Weight 340 g, 0.75 lb
Top-hat rail fastener in line with IEC 60715:1981 + A1:1995
Power supply
Operating voltage 24 V DC, -25 % +33 %
Nec Class 2 power source,
safety extra-low voltage (SELV/PELV)
redundant inputs uncoupled
Power consumption
with 2 TX ports 7.2 W maximum at 24 V DC
24.6 BTU/h
with 1 TX port and 1 FX port 8.4 W maximum at 24 V DC
28.7 BTU/h
with 2 FX ports 9.6 W maximum at 24 V DC
32.8BTU/h
Overload current protection at input non-changeable thermal fuse
Environment
Ambient temperature Surrouding air:
0 °C to 60 °C (32 °F to 140 °F)
Storage temperature Surrouding air:
-20 °C to +70 °C (-4 °F to 158 °F)
Air humidity 10 % to 95 % (non-condensing)
Atmospheric pressure Suitable for operation up to 2000 m
(6561 ft), 795 hPa
Pollution Degree 2
Protection classes
Laser protection Class 1 conforming to EN 60825-1
(2001)
Protection class IP 20
EAGLE
Release 1.02 10/04 217
Appendix Technical data
Stability
Vibration IEC 60068-2-6 Test FC, testing level
in line with IEC 61131-2 E2 CDV and
Germanischer Lloyd Guidelines for
the Performance of Type Tests Part 1
Shock IEC 60068-2-27 Test Ea, testing level
in line with IEC 61131-2 E2 CDV
EAGLE
218 Release 1.02 10/04
Appendix Technical data
Interfaces
Signal contact 1 A maximum, 24 V
V.24 port external management, modem
2 type depending ports TX ports with RJ-45 socket,
FX ports with DSC socket
EAGLE
Release 1.02 10/04 219
Appendix Technical data
Scope of delivery
EAGLE Firewall/VPN System incl. terminal block for power supply
EAGLE manual on CDROM
Description and operating instructions
Order number
EAGLE TX/TX 943 011-001
EAGLE TX/MM SC 943 011-002
EAGLE TX/SM SC 943 011-003
EAGLE TX/LH SC 943 011-004
EAGLE MM SC/TX 943 011-005
EAGLE MM SC/MM SC 943 011-006
EAGLE MM SC/SM SC 943 011-007
EAGLE MM SC/LH SC 943 011-008
EAGLE FW TX/TX 943 011-011
EAGLE FW TX/MM SC 943 011-012
EAGLE FW TX/SM SC 943 011-013
EAGLE FW TX/LH SC 943 011-014
EAGLE FW MM SC/TX 943 011-015
EAGLE FW MM SC/MM SC 943 011-016
EAGLE FW MM SC/SM SC 943 011-017
EAGLE FW MM SC/LH SC 943 011-018
Accessories
Manual: “Basics of
Industrial ETHERNET and TCP/IP”280720-834
ACA Auto Configuration Adapter 943 751-001
Terminal cable 943 301-001
6-pin terminal block (50 pieces) 943 845-002
Rail Power Supply RPS 30 943 662-003
Rail Power Supply RPS 60 943 662-001
Rail Power Supply RPS 120 943 662-011
Network Management Software
HiVision 943 471-100
EAGLE
220 Release 1.02 10/04
Appendix Literature references
Literature references
EAGLE
Release 1.02 10/04 221
Appendix Literature references
EAGLE
222 Release 1.02 10/04
Appendix Reader's comments
Reader's comments
EAGLE
Release 1.02 10/04 223
Appendix Reader's comments
General comments:
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
Street ..........................................................................................................
Dear User,
72654 Neckartenzlingen
Germany
EAGLE
224 Release 1.02 10/04
Appendix Copyright of integrated software
The EAGLE incorporates certain free and open software. The license terms
associated with this software require that we give copyright and license
information. These informations can be found on the enclosed CD-ROM.
For free software under the terms of the GPL/LGPL we also provide source
code according to Subsection 3b of the GPL or Subsection 6b of the
LGPL,respectively.
Please contact your Hirschmann contract partner.
EAGLE
Release 1.02 10/04 225
Appendix Copyright of integrated software
EAGLE
226 Release 1.02 10/04
Glossar
B Glossar
D 3DES / DES
This symmetrical encryption algorithm was developed by IBM and chek-
ked by the NSA. DES (“Symmetrical encryption” on page 233) was set in
1977 by the American National Bureau of Standards, which was the pre-
decessor of the National Institute of Standards and Technology (NIST), as
the standard for American governmental institutions. Since this was the
very first standardized encryption algorithm, it quickly won acceptance by
industry even outside of America.
DES uses a 56 bit long key, which is no longer considered secure as the
processing power available has greatly increased since 1977.
3DES is a variant of DES. It uses keys that are three times as long, i.e.
168 bits long. 3DES is still considered to be secure and is also included
in the IPsec standard
D Asymmetrical encryption
In the case of asymmetrical encryption, data is encrypted with one key
and decrypted with a second key. Either key may be used for encryption
or decryption. One of the keys is kept secret by its owner (Private Key),
the other is made available to the public (Public Key), i.e. possible com-
munication partners.
A message encrypted with the public key can only be decrypted and
read by the receiver who has the associated private key. A message
encrypted with the private key can only be decrypted and read by a
receiver who has the associated public key. The fact that the message
was encrypted with the private key proves that the owner of the associa-
ted public key actually sent the message. Therefore, the expression
"digital signature" is also often used.
However, asymmetrical encryption techniques such as RSA are both
slow and susceptible to certain types of attack and are therefore fre-
quently combined with some form of symmetrical encryption (“Symmetri-
cal encryption” on page 233). On the other hand, there are concepts
which avoid the additional work of administering symmetrical keys.
D AES
Advanced Encryption Standard. This encryption standard was developed
by NIST (National Institute of Standards and Technology) in cooperation
with the industry. This “Symmetrical encryption” on page 233 was de-
veloped to replace the earlier DES standard. AES specifies three different
key sizes (128, 192 and 256 bits).
EAGLE
Release 1.02 10/04 227
Glossar
In 1997, NIST started the AES initiative and announced its conditions for
the algorithm. From the many proposed encryption algorithms, NIST
selected a total of five algorithms for closer examination - the MARS,
RC6, Rijndael, Serpent and Twofish algorithms. In October 2000, the
Rijndael algorithm was adopted as the standard's encryption algorithm.
D Certificate (X.509)
A type of "Seal", which certifies the authenticity of a public key (“Asymme-
trical encryption” on page 227) and the associated data.
To enable the user of the public key, which will be used to encrypt the da-
ta, to be sure that the public key that he/she has received is really from its
issuer and thus from the instance, which should later receive the data, it
is possible to use certification. A Certification Authority – CA certifies the
authenticity of the public key and the associated link between the identity
of the issuer and his/her key. The certification authority will verify authen-
ticity in accordance with its rules, which may, for example, require that the
issuer of the public key appear before it in person. Once authenticity has
be successfully certified, the certification authority will add its digital signa-
ture to the issuer’s public key. The result is a Certificate.
An X.509(v3) Certificate thus includes a public key, information about the
key owner (given as it Distinguished Name (DN)), the authorized usage
etc. and the signature of the certification authority.
The signature is created as follows: The certification authority creates an
individual bit sequence, which is known as the HASH value, from the bit
sequence of the public key, the information about its owner and other da-
ta. This sequence may be up to 160 bits long. The certification authority
encrypts this with its own private key and then adds it to the certificate.
The encryption with the certification authority's private key proves the au-
thenticity of the certificate, i.e. the encrypted HASH string is the certifica-
tion authority's digital signature. If the certificate's data is altered, this
HASH value will no longer be correct with the consequence that the cer-
tificate will be worthless.
The HASH value is also known as the fingerprint. Since it is encrypted
with the certification authority's private key, anyone who has the public
key can decrypt the bit sequence and thus verify the authenticity of this
fingerprint or signature.
The usage of a certification authority means it is not necessary for each
owner of a key to know every other owner. It is enough for them to know
the certification authority. The additional information about the key further
simplifies the administration of the key.
X.509 certificates are used, e.g. for e-mail encryption, in S/MIME or IPsec.
EAGLE
228 Release 1.02 10/04
Glossar
D Client / Server
In a client-server environment, a server is a program or computer, which
accepts and answers queries from client programs or computers.
In data communication, a computer which establishes a connection to a
server (or host) is also called a client. In other words, the client is the
calling computer and the server (or host) is the computer called.
D Datagram
In the TCP/IP protocol, data is sent in the form of data packets, which are
know as IP datagrams. An IP datagram has the following structure:
IP-Header TCP, UDP, ESP etc. Daten (Payload)
Header
EAGLE
Release 1.02 10/04 229
Glossar
Each host [or workstation] in a network has the same network address,
but a different host address. Depending on the size of the respective net-
work - networks are categorized as Class A, B or C networks, which are
each different in size - the two parts of the address differ in length:
1. Byte 2. Byte 3. Byte 4. Byte
Class A Netz-Adr. Host-Adr.
Class B Netz-Adr. Host-Adr.
Class C Netz-Adr. Host-Adr.
EAGLE
230 Release 1.02 10/04
Glossar
As you can see, there can be a worldwide total of 126 Class A networks
and each of these networks can have a maximum of 256 x 256 x 256
hosts (3 bytes of address space). There can be 64 x 256 Class B net-
works and each of these networks can have up to 65,536 hosts (2 bytes
address space: 256 x 256). There can be 32 x 256 x 256 Class C net-
works and each of these networks can have up to 256 hosts (1 bytes
address space).
Subnet Mask see “Subnet Mask” on page 233.
D IPsec
IP Security (IPsec) is a standard, which uses encryption to verify the
authenticity of the sender and ensure the confidentiality and integrity of
the data in IP datagrams (–> Datagram, page 229). The components of
IPsec are the Authentication Header (AH), the Encapsulating Security
Payload (ESP), the Security Association (SA) and the Internet Key Ex-
change (IKE).
To begin communication, the computers at both ends negotiate the mode
to be used: Transport Mode or Tunnel Mode.
In Transport Mode, an IPsec header will be inserted between the
IP header and the TCP or UDP header in each IP datagram. Since the
IP header remains unchanged, this mode is only suitable for a host- to-
host connection.
In Tunnel Mode, an IPsec header and a new IP header will be added in
front of the entire IP datagram. As a consequence, the original datagram
will be encrypted in its entirety and sent as the payload of the new
datagram.
The Tunnel Mode is used in VPN applications: The devices at the tunnel
ends ensure that the datagrams are encrypted before they pass through
the tunnel so the actual datagrams are completely protected while being
transferred over the public network.
EAGLE
Release 1.02 10/04 231
Glossar
EAGLE
232 Release 1.02 10/04
Glossar
EAGLE
Release 1.02 10/04 233
Glossar
EAGLE
234 Release 1.02 10/04
Stichwortverzeichnis
C Stichwortverzeichnis
Numerics D
3DES 129, 227 Datagram 128
3DES-168 130 DES 167, 227
Destination IP address 229, 232
A Destination NA 114
ACA 53, 155 Destination port 229
Administration 142 DHCP 97, 102, 106, 142, 147, 155, 198
Administrator interface 158 DHCP client 147
Administrator password 47 DHCP server 155, 193, 195, 197, 198
Administrators 177 Digital signature 227, 228
ADSL 229 Distinguished Name 228
AES 121, 227 DN 228
AES-256 130 DNS 141, 229, 230, 234
Agent alarm 155 Domain address 141
AH 231 Domain name 144, 229
Air humidity 12 Domain nameserver 141
Air temperature 12 Domain suffix 142
Alarm 154 DSL 232
American National Bureau of Standard 227 Dual Homing 93
Anti-Spoofing 233 Dynamic DNS provider 229
Assigned Numbers 232 Dynamic IP address 229
Asymmetrical encryption 227 DynamicDNS 229
Authentication 128, 167 DynDNS Login 146
Authentication Header 231 DynDNS Password 146
Authenticity 228, 231, 234 DynDNS server 144, 146, 181
Authorization level 157 DynDNS Service 124
Auto Configuration Adapter 53, 155
Automatic Configuration 91 E
Autonegotiation 52 Electromagnetic compatibility 14
EMC 14
B Encapsulating Security Payload 231
Browser 77, 159 Encryption 227, 231
ESP 231, 234
C ESP-Header 229
CA 228 EU conformity declaration 14
Cache 70
CE 14 F
Certification Authority 228 Factory setting 67, 110, 117
Chassis alarm 155 FAQ 209
Checksum 229 FCC 15
Checksum algorithm 130 Fingerprint 228
CIDR 111, 113, 118, 161, 164, 168, 171, 183 Firewall 68, 109
Class A 230 Firmware 187
Client 33, 34, 36, 37, 131, 147, 229 Flat rate 229
Climatic 12 Forward 115
Communication protocol 233
Configuration 65, 91 G
Configuration setting 179 Gateway 124, 139, 181
Cryptographic protocol 234 Ground 12, 51
Ground cable 54
EAGLE
Release 1.02 10/04 235
Stichwortverzeichnis
Ground screw 54 M
MAC address 101
H Main Mode 121
Hardware 177 MARS 228
Hash 130, 228 MD5 121, 130, 167
Hash algorithms 121 Modem 72, 229
HCP server 148 Modem cable 54
Header 114 Monitoring proper functioning 88
HiDiscovery 59, 86 MS Internet Explorer 68
Host address 230, 233
Hostname 142 N
Hostname mode 142 NAT 116, 121, 232
HTTP 158 NAT router 121, 232
HTTPS 67, 71, 234 National Institute of Standards and Technolo-
HTTPS login 155 gy 227
HTTPS Remote Access 160, 181 NAT-T 121
Netmask 132
I Network address 230, 233
IANA 111 Network Address Translation 116, 232
ICMP 111, 113, 234 Network coupling 93
IKE 231, 234 Network mask 97, 131
Indicator contact 42 Network Time Protocol 149
Internet Key Exchange 231 Network traffic 101
Internet Protocol 62 NIST 227
Internet Service Provider 104, 105, 124, 144 Norms 211
IP 111, 113, 234 NSA 227
IP address 63, 124, 230 NTP 149
IP datagram 229
IP header 231 O
IP masquerading 116 Online service 233
IP Security 231 Operating mode 91
IP-Header 229 Operating system 194
IP-Masquerading 232
IPsec 121, 129, 138, 227, 228, 231 P
IPsec connection 121 Password 69, 104, 105, 167
IPsec header 231 PELV 11
IPsec Status 139 Perfect Forward Secrecy 131
ISAKMP 130, 139 PFS 126, 131
ISDN 229 Phone line 229
ISP 104, 105, 144, 229 Phone number 73
Point-to-Point Protocol 232
K Point-to-Point Tunneling Protocol 232
Key exchange 130 Pollution Degree 12
POP3 111, 113, 234
L Port number 71, 111, 161, 232
L2TP 126, 131 Power Supply 155
L2TP status 140 PPP 126, 232
LAN adapter 62 PPP connection 138
Language 159, 182 PPPoE 180, 232
Language setting 159 PPPoE Login 104, 105
Linux 198 PPPoE mode 97, 117
Local configuration 65 PPPoE Password 104, 105
Login 69, 104, 105, 142 PPTP 180, 232
Pre-Shared Key 128, 129
EAGLE
236 Release 1.02 10/04
Stichwortverzeichnis
EAGLE
Release 1.02 10/04 237
Stichwortverzeichnis
Twofish 228
U
UDP 111, 113, 232, 234
UDP header 229, 231
Update 174
URL 229
User defined 142
User name 69, 104, 105
User password 158
V
V.24 interface 53
V.24 port 72
Virtual Private Network 234
VPN 232, 234
VPN application 231
VPN client 33
VPN connection 109, 117, 121, 144, 181
VT100 53
W
WAN 71, 97, 180
Web browser 67, 71, 161
Windows system 196
Wireless 232
X
X.509 128, 228
EAGLE
238 Release 1.02 10/04