Bosch Appliances D6600 12.2.4Networking and Encryption, Internal IP Address, Source Port

Models: D6600

1 88
Download 88 pages 54.03 Kb
Page 54
Image 54
Internal IP Address

54 en Network Communications

Conettix Communications Receiver/

Gateway

 

 

 

3.At the Port Number selection, enter a source port that is not being used by another NIM on the same network (such as 7701, 7702, 7703, and so on). Keeping a list of the network modules on a particular network along with the source ports of those modules will ensure that duplicate source ports are not used.

4.At the Datagram selection, enter 07 and press Enter.

5.At the Remote Port selection, enter the port number that is used in the D6680/D6682 for the D6600.

6.Save the settings and exit from the setup of the NIM.

Outgoing packets from a network over a single IP address go through a router or firewall that uses NAT tables to keep track of which packets come from which internal IP addresses. The NAT table ensures that the returning packets for a device are forwarded to the device that sent out the first packet. An example of this is multiple PCs on a network connecting to the Internet through a single IP address from an ISP. By using the same idea, network devices can perform the same function.

The following table shows an example of what the NAT table remembers when packets are sent to a destination. An outgoing packet is sent to an IP address with Source and Destination ports in that packet. The Destination port is the port number that the device uses when it receives data. After receiving the data, the device processes it and sends a packet back to the IP address that sent the data.

Internal IP Address

Source Port

 

 

192.168.1.11

7700

 

 

192.168.1.12

7701

 

 

192.168.1.13

7702

 

 

When the data is returned to the router or firewall software, the NIM directs the returning packet to the correct internal IP address based on the NAT table.

12.2.4Networking and Encryption

i

Notice!

If you are considering using or are currently using networking and encryption, read the follow-

 

ing information carefully.

In all cases, encryption is performed in the NIM (Network Interface Module) that is used in the D6686/D6682/D6680, D9133TTL-E, C900V2/C900TTL-E, and DX4020. When using a B420 or B426 on a GV4 v1.x control panel, encryption is performed in the NIM. Starting with GV4 v2.0 and the B Series control panels, encryption is done in the control panel. When encryption is used, the encryption key coming to the D6600 must be the same key used on all field devices that are reporting to that IP address. Because you can use up to two NIMs on the D6600, several combinations can be used:

Both NIMs using encryption – two NIMs can use different keys or the same key

One NIM using encryption, the other not using encryption

Neither NIM using encryption

If encryption is On in the NIM at the D6600, then it must be On in the field devices. If it is Off in the NIM at the D6600, then it must be Off in the field devices.

If you are not currently using encryption, refer to Using Encryption for the First Time, page 55.

If you are currently using encryption, refer to Upgrading Encryption, page 55.

2012.11 08 4998122704

Installation and Operation Guide

Bosch Security Systems, Inc.

Page 54
Image 54
Bosch Appliances D6600 installation and operation guide 12.2.4Networking and Encryption, Internal IP Address, Source Port