MOTOMESH 1.0.1 Vehicle Mounted Modem Users Guide

Field Name

Field Description

Field Default

 

 

Value

 

The IP address range must

 

 

reflect the number of clients

 

 

plus one, attached to the VMM

 

 

via hub or other connection. The

 

 

first IP address will be used by

 

 

the DHCP server itself; this is

 

 

why one extra address should be

 

 

allocated in the designated IP

 

 

address range.

 

DHCP Range End

This is the last IP address to end the range of addresses begun

192.168.0.50

 

with the IP address specified in the DHCP Start IP address

 

 

field.

 

 

 

 

CIDR

Enter a CIDR value (in bits), reflecting the desired network

24

 

type.

 

 

 

 

DHCP Lease

This is the duration (in seconds) of the DHCP leases that the

300

Duration(s)

VMM offers to the attached Ethernet devices.

 

 

 

 

Security Settings Section (Authentication)

There are three security authentication settings available to the MOTOMESH VMM device: Force Authorized, Force Unauthorized, and Local. Security authentication modes are selected from within the Security Settings section of the MOTOMESH Device Administration Configuration page in the Authorization Control field

The table below describes each field within the Security Settings section.

Table 3-5 Device Web Interface - Security Settings Section (Configuration Tab)

Field Name

Field Description

Field Default

 

 

Value

Authorization

To allow for various levels of security and authentication control, there are

Force Authorized

Control

three security authentication settings available to the MOTOMESH VMM

 

 

device: Force Authorized, Force Unauthorized, and Local.

 

 

 

 

 

Force Authorized: In Force Authorized mode, there are effectively no

 

 

security and authentication controls, resulting in open authentication for all

 

 

network devices. There will be no security measures applied to links

 

 

between devices that are currently set to Force Authorized. Hardware

 

 

authentication via the HAS is still performed but password authentication

 

 

is not carried out at the user level and there is no integrity check carried out

 

 

for all packets transferred between any source and destination node

 

 

 

 

 

Force Unauthorized:

 

 

In Force Unauthorized mode, all devices seeking authorization for network

 

 

access will be denied, effectively locking down the network. The Force

 

 

Unauthorized setting will not allow any network device to establish

 

 

communication with any other node that may attempt to communicate with

 

6881011Y54-A September 2005

3-11