Patton electronic 2800 user manual Ports descriptions

Page 22

OnSite 2800 Series User Manual

1 • General information

 

 

Ports descriptions

The OnSite 2800 Series rear-panel ports are described in table 2.

 

 

 

Table 2. Rear panel ports

 

 

 

 

 

 

 

 

 

 

 

 

 

Port

Location

 

 

 

 

 

 

 

 

 

Description

 

 

 

 

 

 

 

 

 

 

 

 

 

10/100 Ethernet

Rear panel

RJ-45 connectors (see figure 2 on page 19 and figure 3 on page 20)

ETH 0/0 (WAN) &

 

that connect the router to an Ethernet device (e.g., a cable or DSL

ETH 0/1–0/4 (LAN)

 

modem, LAN hub or switch).

WAN

Rear panel

DB-25 or DB-15 receptacle provides a V.35 or X.21 serial interface for

 

 

leased-line connection to a WAN at rates up to 2 Mbps.

 

 

 

 

 

 

 

 

 

 

 

 

 

T1/E1

Rear panel

E1G.703/G.704 with HDB3 or AMI encoding. RJ-48C and dual

 

 

coaxial connectors.

 

 

T1ANSI T1.403 & AT&T TR54016 with AMI coding/D4 framing or

 

 

B8ZS coding/ESF framing. RJ-48C connector.

Power

Rear panel

The router is available in a DC or AC power input version (see figure 4

 

 

on page 21), labeled as follows:

 

 

AC version (Internal power supply): 100–240 VAC, 50/60 Hz, 1 A

 

 

DC version: +12 V, 1 A (Model 2821, 2802, 2835) or

 

 

+5 VDC 1 A (Model 2805)

 

 

 

 

 

 

 

 

 

 

 

 

 

Console

Front panel

Used for service and maintenance and available on all OnSite 2800

 

 

models except the OnSite 2805, the Console port (see figure 5), an RS-

 

 

232 RJ-45 connector, connects the router to a serial terminal such as a

 

 

PC or ASCII terminal (also called a dumb terminal).

 

 

IPLink 2805

 

 

 

 

 

 

 

 

 

 

 

IPLink VPN Router

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Power

IPLink 2835, 2821, 2802

1 2 3 4

LAN

WAN

IPLink VPN Router

Link

100M

Activity

 

0

 

Enet

 

Power Run

PowerRun

Link 100M Activity

Link 100M Activity

 

 

Enet 0

Enet 1

Console

 

 

 

Console port

Console

 

 

 

Link

100M

Activity

 

1

 

 

Enet

 

Figure 5. OnSite 2800 Series front panels

OnSite Model 2800 Series overview

22

Image 22
Contents Managed VPN Router Mailsupport@patton.com Summary Table of Contents Table of Contents Getting started with the OnSite Managed VPN Router VPN configuration LEDs status and monitoring 112 Cabling 124 OnSite 2800 Series factory configuration 132 List of Figures List of Tables Audience About this guideStructure Precautions Impaired functioningSafety when working with electricity General observations Typographical conventions used in this document General conventionsChapter contents General informationOnSite Model 2800 Series overview OnSite Managed VPN Router 2805 shownOnSite 2800 Series detailed description OnSite 2800 Series model codesDMZ OnSite 2800 Series power input connectors Model code extensionsPorts descriptions OnSite 2800 Series rear-panel ports are described in tableApplications overview Corporate multi-function virtual private network Corporate multi-function virtual private networkGeneral information Hardware installation Planning the installation Create a network diagram see section Network information onInstallation checklist Network information Power sourceSite log IP related informationInstalling the Ethernet cable Installing the VPN routerConnecting cables Location and mounting requirementsInstalling the serial WAN cable Connecting an OnSite 2800 Series device to a hubDCD Hardware installation Rear panel of 2803K/EUI Pins not listed are not used Rear panel of 2803K/UIConnecting to external power source Power connector location on rear panelUI and EUI power supplies automatically adjust to accept an Getting started with the OnSite Managed VPN Router Configure IP address IntroductionAll Ethernet interfaces are activated upon power-up Configure IP addressPower connection and default configuration Terminal emulation program settings 9600 bps No parity BitStop bit No flow control LoginSelect the context IP mode to configure an IP interface Changing the IP addressConnect the OnSite VPN Router to the network Load configurationRespectively from the host ping Load configuration Serial port configuration Serial port configuration task list Disabling an interfaceEnabling an interface Example Configuring the serial encapsulation type Configuring the encapsulation for Frame RelayPort Enter Frame Relay mode Configuring the LMI typeConfiguring the keep-alive interval Entering Frame Relay PVC configuration modeConfiguring the PVC encapsulation type Binding the Frame Relay PVC to IP interfaceMode PVC Enabling a Frame Relay PVC Disabling a Frame Relay PVCDisplaying serial port information CRCDisplaying Frame Relay information DlciIntegrated service access Configure the serial interface settings PortConfigure the introduced PVCs Check that the Frame Relay settings are correctT1/E1 port configuration T1/E1 port configuration task list Enable/Disable T1/E1 portConfiguring T1/E1 clock-mode Mode port e1t1 slot portConfiguring T1/E1 port-type Configuring T1/E1 line-codeConfiguring T1/E1 used-connector E1 only Configuring T1/E1 framingConfiguring T1/E1 line-build-out T1 only Name prt-e1t1 slot/port# framingConfiguring T1/E1 encapsulation Configuring T1/E1 application modeConfiguring T1/E1 LOS threshold Default short-haulMode channel-group group-name Be used Mode port e1t1 slot portConfiguring Channel-Group Timeslots Configuring Channel-Group EncapsulationT1/E1 Configuration Examples Configuring Hdlc CRC-TypeConfiguring Hdlc Encapsulation Default no encapsulationExample 1 Frame Relay without a channel-group Example 3 PPP without a channel-group Example 2 Framerelay with a channel-groupExample 4 PPP with a channel-group VPN configuration Authentication EncryptionTransport and tunnel modes VPN configuration task listCreating an IPsec transformation profile Procedure To create an IPsec policy profile Creating an IPsec policy profileNodecfg#profile ipsec-policy-man Creating/modifying an outgoing ACL profile for IPsec Configuration of an IP interface and the IP router for IPsec Displaying IPsec configuration informationDebugging IPsec Example Display IPsec transformation profilesExample Display IPsec policy profiles Example IPsec Debug OutputOnSite configuration Sample configurationsIPsec tunnel, DES encryption Cisco router configuration Cisco router configuration VPN configuration Access control list configuration What access lists do About access control listsWhy you should configure access lists When to configure access lists Features of access control listsAccess control list configuration task list Mapping out the goals of the access control listNodepf-acl name#permit ip src src-wildcard any Where the syntax is Src-wildcardNodepf-acl name#deny icmp src src-wildcard Nodepf-acl name#permit icmp src src-wildcard anyType type type type code code cos group Any host src dest dest-wildcard any host destWhere the syntax is as following Msg namePort lt port range from to cos group cos-rtp group Nodepf-acl name#permit tcp udp sctp src src-wildCard any host src eq port gt port lt port range Nodepf-acl name#deny tcp udp sctp src srcGroup-data Where the syntax is Displaying an access control list profile Unbind an access control list profile from an interfaceDebugging an access control list profile Control list profile shall be debugged Examples Denying a specific subnetLink scheduler configuration Configuring access control lists Using traffic classes Configuring quality of service QoSApplying scheduling at the bottleneck Introduction to Scheduling Weighted fair queuing WFQPriority Burst tolerant shaping or wfq ShapingHierarchy Quick references Setting the modem rateSome explanations Link scheduler configuration task list Command cross referenceDefining the access control list profile Packet classificationCreating an access control list Scenario with Web server regarded as a single source hostNodepf-acl name#permit ip host ip-address any traffic-class Creating a service policy profileNodecfg#profile acl name Nodepf-acl name#permit ip any anyStructure of a Service-Policy Profile Defining fair queuing weight Specifying the handling of traffic-classesDefining absolute priority Specifying the type-of-service TOS fieldDefining the bit-rate Defining the maximum queue lengthNodesrc name#set ip tos value Specifying differentiated services codepoint Dscp markingSpecifying the precedence field Nodesrc name#set ip precedence valueNodesrc name#set ip dscp value Specifying layer 2 markingNodesrc name#set layer2 cos value Discarding Excess Load Defining random early detectionNodesrc name#random-detect burst-tolerance Nodeif-ip if-name#use profile service Devoting the service policy profile to an interfacePolicy name in out Displaying link arbitration status Enable statistics gatheringDisplaying link scheduling profile information Values defining detail of the queuing statistics LEDs status and monitoring Status LEDs Contacting Patton for assistance Contact information Warranty coveragePatton Support Headquarters in the USA Return for credit policy Out-of-warranty serviceReturns for credit RMA numbersAppendix a Compliance information Radio and TV Interference FCC Part SafetyCompliance CE Declaration of ConformityFCC Part 68 Acta Statement Model 2803 only Authorized European RepresentativeIndustry Canada Notice Model 2803 only Appendix B Specifications T1/E1 interface Model 2803 only Ethernet interfacesSync serial interface PPP supportManagement IP servicesDimensions Operating environmentInternal power supply 100-240 VAC, 50/60 Hz, 200 mA Power supplyInternal AC version Appendix C Cabling Connecting a serial terminal Serial consoleEthernet 10Base-T and 100Base-T Ethernet cross-overEthernet straight-through Appendix D Port pin-outs Console port, RJ-45, EIA-561 RS-232 EIA-561 RJ-45 8-pin port RS-232 Console PortEthernet ports are auto-detect MDI-X Ethernet 10Base-T and 100Base-T portSync serial port Serial port21 Female DB-15 connector Appendix E OnSite 2800 Series factory configuration OnSite 2800 Series factory configuration Appendix F Installation checklist Installation checklist
Related manuals
Manual 8 pages 44.23 Kb