Chapter Two: Getting Started | 10. Using your DIVA LAN ISDN Modem 38 |
|
|
10. Using your DIVA LAN ISDN Modem
The DIVA LAN ISDN Modem automatically dials out and establishes the ISDN link to the Internet as required. You simply launch the applications you use to do your work, such as a web browser or
You can also establish your connections manually, dialing and hanging up as you see fit. See the Dial and Hangup buttons on page 45 for details.
How long will the line stay connected?
By default, the DIVA LAN ISDN Modem stays connected until the line has been idle for two minutes. To adjust this setting, see “Idle timer” on page 59.
Registering your DIVA LAN ISDN Modem
Once your setup is running you should visit the Eicon web site and register your DIVA LAN ISDN Modem. This ensures that you will always be kept
www.eicon.com/divalan/downld.htm
or follow the firmware upgrade procedure in the section “Upgrading the DIVA LAN ISDN Modem firmware” on page 56. Registration is part of the upgrade process.
What’s next?
The rest of this manual provides in depth information and instruction on a variety of topics relating to operating and configuring the DIVA LAN ISDN Modem.
Some of the topics that you may want to consult are:
Minimizing your ISDN charges
The DIVA LAN ISDN Modem has several
Using telephones, fax machines, and modems
If your DIVA LAN ISDN Modem has PHONE ports, you can share the ISDN line with your analog devices. Consult Chapter Seven for complete details on setting up your analog devices.
Configuring security features
The DIVA LAN ISDN Modem provides a wide range of security features. Some of the features you may want to configure include:
•System password: A system password is also available to restrict access to the configuration interface.
•Support for remote management: By default, remote access to the configuration is disabled.
•Support for incoming data calls: By default, support for incoming data calls is disabled.
•Call screening: Lets you accept incoming data calls only from specific numbers.
•Call authentication: Lets you verify incoming callers by username and password.
Consult Chapter Six for complete details.