ZyXEL Communications A-6000 manual Dhcp, Dns, Dram, Dte, Emi, Fcc

Page 40

 

 

 

A-6000 High Speed, Long Range Ethernet Wireless Bridge

 

 

 

 

 

 

Crossover

A cable that wires a pin to its opposite pin, for example, RX+ is wired to TX+.

 

Ethernet cable

 

This cable connects two similar devices, for example, two data terminal

 

 

 

 

equipment (DTE) or data communications equipment (DCE) devices.

 

 

 

 

 

 

 

Cryptoanalysis

 

The act of analyzing (or breaking into) secure documents or systems that are

 

 

 

protected with encryption.

 

 

 

 

 

 

 

Decryption

 

The act of restoring an encrypted file to its original state.

 

 

 

 

 

 

Denial of Service

 

Act of preventing customers, users, clients or other machines from

 

 

 

accessing data on a computer. This is usually accomplished by interrupting or

 

 

 

 

overwhelming the computer with bad or excessive information requests.

 

 

 

 

 

 

 

DHCP

 

Dynamic Host Configuration Protocol automatically assigns IP addresses to

 

 

 

clients when they log on. DHCP centralizes IP address management on central

 

 

 

 

computers that run the DHCP server program. DHCP leases addresses for a

 

 

 

 

period of time which means that addresses are made available to assign to

 

 

 

 

other systems.

 

 

 

 

 

 

 

Digital Signature

 

Digital code that authenticates whomever signed the document or software.

 

 

 

Software, messages, Email, and other electronic documents can be signed

 

 

 

 

electronically so that they cannot be altered by anyone else. If someone alters a

 

 

 

 

signed document, the signature is no longer valid. Digital signatures are created

 

 

 

 

when someone generates a hash from a message, then encrypts and sends

 

 

 

 

both the hash and the message to the intended recipient. The recipient decrypts

 

 

 

 

the hash and original message, makes a new hash on the message itself, and

 

 

 

 

compares the new hash with the old one. If the hashes are the same, the

 

 

 

 

recipient knows that the message has not been changed. Also see Public-key

 

 

 

 

encryption.

 

 

 

 

 

 

 

DNS

 

Domain Name System. A database of domain names and their IP addresses.

 

 

 

DNS is the primary naming system for many distributed networks, including the

 

 

 

 

Internet.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Domain Name

 

The unique name that identifies an Internet site. Domain Names always have 2

 

 

 

or more parts, separated by dots. The part on the left is the most specific, and

 

 

 

 

the part on the right is the most general.

 

 

 

 

 

 

 

DRAM

 

Dynamic RAM that stores information in capacitors that must be refreshed

 

 

 

periodically.

 

 

 

 

 

 

 

DTE

 

Originally, the DTE (data terminal equipment) meant a dumb terminal or printer,

 

 

 

but today it is a computer, or a bridge or router that interconnects local area

 

 

 

 

networks.

 

 

 

 

 

 

 

EMI

 

ElectroMagnetic Interference. The interference by electromagnetic signals that

 

 

 

can cause reduced data integrity and increased error rates on transmission

 

 

 

 

channels.

 

 

 

 

 

 

 

Encryption

 

The act of substituting numbers and characters in a file so that the file is

 

 

 

unreadable until it is decrypted. Encryption is usually done using a

 

 

 

 

mathematical formula that determines how the file is decrypted.

 

 

 

 

 

 

 

Ethernet

 

A very common method of networking computers in a LAN. There are a number

 

 

 

of adaptations to the IEEE 802.3 Ethernet standard, including adaptations with

 

 

 

 

data rates of 10 Mbits/sec and 100 Mbits/sec over coaxial cable, twisted-pair

 

 

 

 

cable, and fiber-optic cable. The latest version of Ethernet, Gigabit Ethernet,

 

 

 

 

has a data rate of 1 Gbit/sec.

 

 

 

 

 

 

 

Events

 

These are network activities. Some activities are direct attacks on your system,

 

 

 

while others might be depending on the circumstances. Therefore, any activity,

 

 

 

 

regardless of severity is called an event. An event may or may not be a direct

 

 

 

 

attack on your system.

 

 

 

 

 

 

 

FCC

 

The FCC (Federal Communications Commission) is in charge of allocating the

 

 

 

electromagnetic spectrum and thus the bandwidth of various communication

 

 

 

 

systems.

 

 

 

 

 

 

 

Firewall

 

A hardware or software "wall" that restricts access in and out of a network.

 

 

 

Firewalls are most often used to separate an internal LAN or WAN from the

 

 

 

 

Internet.

 

CLI commands

5-2

Image 40
Contents 6000 Page Disclaimer CopyrightTrademarks Federal Communications Commission FCC Interference Statement Information for Canadian Users Who Should Use this GuideZyXEL Limited Warranty Customer Support Page Table of Contents 14 Physical Installation of A-6000 with flat panel antenna List of FiguresList of Tables Getting to Know Your A-6000 Introduction to the A-6000Physical Features of the A-6000 Non-physical Features of the A-6000A-6000 product types Benefits of the A-6000Specification of A-6000 Specifications of the A-6000Applications of the A-6000 CONFIG. and Management Hardware Description Connectors of bottomOutdoor unit Antenna connector of the top RF cable6HDF 400 RF cable RS-232 cable 10 The Mounting kit Network/Power Injector Mounting bracketCAT-5 Straight-through Ethernet cable Hardware Installation6000 Physical Connection 15Mounting Bracket Assembly 17Install Outdoor Unit to the Mast 19Connect Cat-5 cable to the outdoor unit Initializing the A-6000 Indoor Unit InstallationAntenna Alignment Indoor Interface Unit System LED IndicationRssi LED Indication Alignment ToolsConfigure A-6000 Default ConfigurationDefault configuration Network Topology PlanningAccess the A-6000 System WEB Server 2Login authorization3System Status window System Configuration Working with Configuration Windows System SetupWireless Configuration Description System Configuration DescriptionSsid System Configuration Windows Software Download Ethernet Configuration DescriptionDescriptions of setting parameters System Log Windows8System Log Windows Command list DetailsSecurity Key Configuration To display hardwareTo display platform hardware version To display/modify IP addressTo display/modify login user name To modify login passwordTo display/modify power Display/Modify Key Entry Method To display/modify data rate To display/modify Sntp Server To display station status To display/modify SsidTo display/modify Telnet To display/modify Time ZoneTo display elapsed time To display time and dateARP ChapDhcp DNSDram DTEFTP HdlcHttp IanaISP LANMAC NATPNS POPPots PPPRFC RIPSAP SatanSUA NAT TCPTftp UDPCLI commands
Related manuals
Manual 23 pages 23.02 Kb