Compatible Systems 2+ manual Installation and Operation, Transport Protocols and CompatiView

Page 18

ϖNote: To choose the active transport protocol on a Windows machine which has both IPX and IP installed, select “Options” from the Database menu and click the General tab. Then select the appro- priate radio button under “Transport.”

Installation and Operation

The Windows version of the CompatiView program can be found in the Network Management/CompatiView/Windows directory on the CD-ROM that was included with your IntraPort 2/2+ VPN Access Server.

Run the auto-installation program (CV5x file) by double-clicking on it. The installation program will ask you to select (or create) a directory in which it should locate CompatiView and its associated files and data- base subdirectory.

Once the installation is complete, double click on the CompatiView icon to open the program. For further information on using CompatiView, see the CompatiView Management Software Reference Guide included with your server.

ϖNote: For an up-to-date description of the changes (if any) made to Windows system files by the installation program, see the README.TXT file located in the CompatiView installation direc- tory.

Transport Protocols and CompatiView

CompatiView will be able to use the transport protocol (IP or IPX) you have selected to access Compatible Systems products anywhere on your internetwork. Depending on your security setup, you may also be able to use the IP transport option to manage devices across the Internet.

The IP protocol does not provide a method for CompatiView to auto- matically discover the IntraPort 2/2+ VPN Access Server. To initially contact the server over IP using CompatiView, you must first enter a valid IP address into the server. You can do this either on a console directly connected to the server or by setting a workstation’s IP address to 198.41.12.2 with a Class C subnet mask (255.255.255.0) so that it can communicate over Ethernet with 198.41.12.1 (the shipping default of Ethernet 0). After setting the server’s IP address, be sure to change the workstation’s configuration back to its original settings.

The IPX protocol does allow CompatiView to automatically discover the server. Compatible Systems devices are configured to autoseed the

Image 18
Contents Page Page Introduction Network InstallationGetting Help with the IntraPort 2/2+ VPN Access Server Getting StartedBasic Configuration Guide Appendix a Shipping DefaultsParameters Appendix F Terms and Conditions InformationSystems Pin Outs for DB-25 Male to DB-25 Female RS-232 DataPage Introduction About the IntraPort 2/2+ VPN Access ServerIntraPort 2/2+ VPN Access Server Installa- tion Overview IntroductionCommand Line Preparation Network InstallationCompatiView Software Installation Basic Configuration GuideIntroduction Alternate Protocols and Security Parameters AppendicesPage Getting Started Warranty and ServiceGetting Help with the IntraPort 2/2+ VPN Access Server Few NotesSupplied with the IntraPort 2/2+ VPN Access Server Needed for InstallationWhat You Will Need To Get Started Ethernet Connection Requirements VPN Client Software RequirementsPage Network Installation Connecting the Server to the EthernetPlacing the Server Connecting a Management Console Powering Up the ServerCompatiView for Windows System RequirementsInstallation and Operation Transport Protocols and CompatiViewCompatiView Software Installation Page Command Line Management Out-of-Band Command Line ManagementTemporarily Reconfiguring a Host for Command Line Management Setting Up Telnet OperationIP Ethernet 0 section Page Basic Configuration Guide Setup OptionsDiagram of Dual-Ethernet Setup Diagram of Dual-Ethernet SetupDiagram of Single-Ethernet Setup Diagram of Single Ethernet SetupConfiguration Using CompatiView VPN Client Tunnel SettingsTurn off AppleTalk and IPX optional Dual Ethernet Single Ethernet TCP/IP Routing Ethernet Dual Ethernet Set basic IP parameters for Ethernet Single Ethernet Turn IP off on EthernetIP Connection Ethernet Basic Configuration Guide Set an IP Gateway for Ethernet IP Static RoutesDual Ethernet Static Route Single Ethernet Static Route Basic Configuration Guide Basic Configuration Guide Set an IPSec Gateway IPSec GatewaySet an IKE Policy IKE PolicyBasic Configuration Guide Set up VPN Group Configurations VPN Group Configuration General TabVPN Group Configuration IKE Configuration Tab IKE Configuration Transform List Basic Configuration Guide Basic Configuration Guide VPN Group Configuration IPX Connection Tab Basic Configuration Guide Set up VPN Users VPN User ConfigurationVPN User Save the configuration to a file and download to the device Add VPN Port Set up the Tunnel PartnerAdd a VPN Port Tunnel Partner VPN #Set up Key Management IKE Key ManagementIKE Configuration Transform List Save the configuration to a file and download to the device Basic Configuration Using Command Line ExampleSingle Ethernet Setup Example Edit IP Static Append Configure general Basic Configuration Guide Set up VPN Group Configurations Configure vpn group basic vpn config Save the Configuration and download it to the device Use the configure command to add a VPN Port Configure tunnel partner vpn IPX Protocol Required for IPXSuggested for IPX AppleTalk Protocol Setting up Radius AuthenticationSetting the IntraPort for a Radius Server Required for AppleTalkRadius Server User Authentication Settings Setting up SecurID Authentication Setting the IntraPort for an ACE/Server ACE/Server SettingsSaving a Configuration File to Flash ROM Page Appendix a Shipping Defaults Ethernet InterfacesAppendix B Connector and Cable Pin Outs Appendix B Connector and Cable Pin OutsAppendix C Security Dynamics ACE/Server Information Page IntraPort 2/2+ VPN Access Servers LED Patterns Appendix D LED Patterns and Test Switch Settings IntraPort 2 Connections/Users LEDsIntraPort 2+ Connections/Users LEDs IntraPort 2/2+ VPN Access Server Switch Settings IntraPort 2 Special IndicatorsIntraPort 2+ Special Indicators Page Appendix E Downloading Software From Compatible Systems Compatible Systems WWW ServerPage Appendix F Terms Conditions Appendix F Terms and ConditionsPage Appendix F Terms and Conditions

2+, 2 specifications

Compatible Systems 2,2+ is a cutting-edge framework designed to enhance interoperability and compatibility across various technological platforms and systems. Built on a robust foundation, this system aims to simplify the integration of old and new technologies, ensuring organizations can effectively leverage their existing infrastructures while embracing innovations.

One of the primary features of Compatible Systems 2,2+ is its modular architecture. This design allows organizations to implement only the components they need, significantly reducing costs and complexities associated with full-scale system overhauls. It promotes flexibility, enabling businesses to customize solutions according to their specific operational requirements without compromising performance or security.

Another standout characteristic is its adherence to open standards. By supporting widely accepted protocols and formats, Compatible Systems 2,2+ significantly reduces the barriers to integration. This feature facilitates communication between different systems and devices, enabling seamless data exchange and promoting collaboration across varied platforms. Organizations can easily connect disparate systems, fostering a unified operational environment.

The introduction of advanced connectivity features, such as API management and microservices architecture, distinguishes Compatible Systems 2,2+ from traditional systems. This technology allows for more granular control over data flows and interactions, enhancing agility in development and deployment. Organizations can quickly adapt to changing market demands, ensuring they remain competitive in a fast-paced digital landscape.

Security is another critical concern addressed by Compatible Systems 2,2+. The framework incorporates robust security protocols to safeguard data integrity and protect against unauthorized access. With features such as encryption, authentication, and authorization mechanisms, organizations can trust that their sensitive information is well-protected.

Moreover, Compatible Systems 2,2+ includes comprehensive support for analytics and monitoring. By integrating data analytics tools, this system allows organizations to gain insights into system performance and user behavior, facilitating informed decision-making. This capability not only enhances operational efficiency but also aids in predictive maintenance, reducing downtime and improving overall productivity.

In conclusion, Compatible Systems 2,2+ presents a versatile and secure solution for organizations looking to enhance compatibility and interoperability across their technological ecosystems. With its modular architecture, support for open standards, advanced connectivity features, and robust security measures, it stands as a leading choice for businesses aiming to navigate the complexities of modern technology integration successfully. Embracing Compatible Systems 2,2+ can empower organizations to innovate while preserving their valuable technological investments.