MOTOMESH 1.0.1 Vehicle Mounted Modem Users Guide
Field Name | Field Description | Field Default |
|
| Value |
| The IP address range must |
|
| reflect the number of clients |
|
| plus one, attached to the VMM |
|
| via hub or other connection. The |
|
| first IP address will be used by |
|
| the DHCP server itself; this is |
|
| why one extra address should be |
|
| allocated in the designated IP |
|
| address range. |
|
DHCP Range End | This is the last IP address to end the range of addresses begun | 192.168.0.50 |
| with the IP address specified in the DHCP Start IP address |
|
| field. |
|
|
|
|
CIDR | Enter a CIDR value (in bits), reflecting the desired network | 24 |
| type. |
|
|
|
|
DHCP Lease | This is the duration (in seconds) of the DHCP leases that the | 300 |
Duration(s) | VMM offers to the attached Ethernet devices. |
|
|
|
|
Security Settings Section (Authentication)
There are three security authentication settings available to the MOTOMESH VMM device: Force Authorized, Force Unauthorized, and Local. Security authentication modes are selected from within the Security Settings section of the MOTOMESH Device Administration Configuration page in the Authorization Control field
The table below describes each field within the Security Settings section.
Table
Field Name | Field Description | Field Default |
|
| Value |
Authorization | To allow for various levels of security and authentication control, there are | Force Authorized |
Control | three security authentication settings available to the MOTOMESH VMM |
|
| device: Force Authorized, Force Unauthorized, and Local. |
|
|
|
|
| Force Authorized: In Force Authorized mode, there are effectively no |
|
| security and authentication controls, resulting in open authentication for all |
|
| network devices. There will be no security measures applied to links |
|
| between devices that are currently set to Force Authorized. Hardware |
|
| authentication via the HAS is still performed but password authentication |
|
| is not carried out at the user level and there is no integrity check carried out |
|
| for all packets transferred between any source and destination node |
|
|
|
|
| Force Unauthorized: |
|
| In Force Unauthorized mode, all devices seeking authorization for network |
|
| access will be denied, effectively locking down the network. The Force |
|
| Unauthorized setting will not allow any network device to establish |
|
| communication with any other node that may attempt to communicate with |
|