54 en Network Communications | Conettix Communications Receiver/ | |
Gateway | ||
| ||
|
|
3.At the Port Number selection, enter a source port that is not being used by another NIM on the same network (such as 7701, 7702, 7703, and so on). Keeping a list of the network modules on a particular network along with the source ports of those modules will ensure that duplicate source ports are not used.
4.At the Datagram selection, enter 07 and press Enter.
5.At the Remote Port selection, enter the port number that is used in the D6680/D6682 for the D6600.
6.Save the settings and exit from the setup of the NIM.
Outgoing packets from a network over a single IP address go through a router or firewall that uses NAT tables to keep track of which packets come from which internal IP addresses. The NAT table ensures that the returning packets for a device are forwarded to the device that sent out the first packet. An example of this is multiple PCs on a network connecting to the Internet through a single IP address from an ISP. By using the same idea, network devices can perform the same function.
The following table shows an example of what the NAT table remembers when packets are sent to a destination. An outgoing packet is sent to an IP address with Source and Destination ports in that packet. The Destination port is the port number that the device uses when it receives data. After receiving the data, the device processes it and sends a packet back to the IP address that sent the data.
Internal IP Address | Source Port |
|
|
192.168.1.11 | 7700 |
|
|
192.168.1.12 | 7701 |
|
|
192.168.1.13 | 7702 |
|
|
When the data is returned to the router or firewall software, the NIM directs the returning packet to the correct internal IP address based on the NAT table.
12.2.4Networking and Encryption
i | Notice! |
If you are considering using or are currently using networking and encryption, read the follow- | |
| ing information carefully. |
In all cases, encryption is performed in the NIM (Network Interface Module) that is used in the D6686/D6682/D6680,
–Both NIMs using encryption – two NIMs can use different keys or the same key
–One NIM using encryption, the other not using encryption
–Neither NIM using encryption
If encryption is On in the NIM at the D6600, then it must be On in the field devices. If it is Off in the NIM at the D6600, then it must be Off in the field devices.
–If you are not currently using encryption, refer to Using Encryption for the First Time, page 55.
–If you are currently using encryption, refer to Upgrading Encryption, page 55.
2012.11 08 4998122704 | Installation and Operation Guide | Bosch Security Systems, Inc. |