UM BAT54 SW Rel754 en PDF
UM BAT54 SW Rel754 en PDF
UM BAT54 SW Rel754 en PDF
Configuration
Dualband Industrial Wireless LAN Access Point/Client
BAT54-Rail, BAT54-Rail FCC,
BAT54-F, BAT54-F FCC, BAT54-F X2
BAT54-F X2 FCC
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for
your own use. For devices with embedded software, the end-user license agreement on the en-
closed CD applies.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Tool-
kit http://www.openssl.org/.
This product includes cryptographic software written by Eric Young ([email protected]).
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
The performance features described here are binding only if they have been expressly guaran-
teed in the contract. This publication has been created by Hirschmann Automation and Control
GmbH according to the best of our knowledge. Hirschmann reserves the right to change the con-
tents of this manual without prior notice. Hirschmann can give no guarantee in respect of the
correctness or accuracy of the details in this publication.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
1 Preface 15
2 System design 19
2.1 Introduction 19
BAT54-Rail/F..
Release 7.54 06/08 3
3.6 Client mode 93
3.6.1 Basic configuration 94
3.6.2 Advanced configuration 98
3.6.3 The roaming table 100
3.7 IEEE 802.11i for point-to-point connections in the WLAN 101
3.7.1 Antenna alignment for P2P operations 102
3.7.2 Configuration 104
3.7.3 Access points in relay mode 107
3.7.4 Security for point-to-point connections 107
3.7.5 LEPS for P2P connections 108
3.7.6 Geometric dimensioning of outdoor wireless network links
109
3.8 Establishing outdoor wireless networks 112
3.8.1 Geometrical layout of the transmission path 112
3.8.2 Antenna power 114
3.8.3 Emitted power and maximum distance 117
3.8.4 Transmission power reduction 117
3.9 Bandwidth limits in the WLAN 117
3.9.1 Operating as an access point 117
3.9.2 Operating as a Client 118
3.10 WLAN according to 802.11h 119
3.10.1 Standards 119
3.10.2 Radio channels in the 5 GHz band: 122
3.10.3 Frequency ranges for indoor and outdoor use 123
BAT54-Rail/F..
4 Release 7.54 06/08
4.6 New firmware with Hirschmann FirmSafe 143
4.6.1 This is how Hirschmann FirmSafe works 143
4.6.2 How to load new software 145
4.7 How to reset the device? 148
4.8 Managing administrators rights 150
4.8.1 Rights for the administrators 150
4.8.2 Administrators' access via TFTP and SNMP 151
4.8.3 Configuration of user rights 153
4.8.4 Limitation of the configuration commands 155
4.8.5 HTTP tunnel 156
4.9 Named loopback addresses 159
4.9.1 Loopback addresses with ICMP polling 160
4.9.2 Loopback addresses for time servers 161
4.9.3 Loopback addresses for SYSLOG clients 162
BAT54-Rail/F..
Release 7.54 06/08 5
5.5 Rollout Wizard 201
5.5.1 General settings in the Rollout Wizard 201
5.5.2 Variables 202
5.5.3 Actions to be executed by the Rollout Wizard 203
5.5.4 Actions for managing the Rollout Wizard 204
5.6 Display functions in LANmonitor 205
5.7 LANmonitorknow what's going on 208
5.7.1 Extended display options 209
5.7.2 Enquiry of the CPU and Memory utilization over SNMP
210
5.7.3 Monitor Internet connection 210
5.7.4 Tracing with LANmonitor 212
5.8 Visualization of larger WLANs 214
5.8.1 Start the WLANmonitor 215
5.8.2 Search for access points 215
5.8.3 Add access points 216
5.8.4 Organize access points 216
5.8.5 Rogue AP and rogue client detection with the
WLANmonitor 217
5.9 Messaging 222
6 Diagnosis 225
6.1 Trace informationfor advanced users 225
6.1.1 How to start a trace 225
6.1.2 Overview of the keys 225
6.1.3 Overview of the parameters 226
6.1.4 Combination commands 227
6.1.5 Trace filters 227
6.1.6 Examples of traces 228
6.1.7 Recording traces 228
6.2 SYSLOG storage in the device 229
6.2.1 Activate SYSLOG module 230
6.2.2 Configuring the SYSLOG client 230
6.2.3 Read-out SYSLOG messages 231
6.3 The ping command 232
6.4 Monitoring the switch 233
6.5 Cable testing 234
BAT54-Rail/F..
6 Release 7.54 06/08
7 Security 237
7.1 Protection for the configuration 237
7.1.1 Password protection 237
7.1.2 Login barring 239
7.1.3 Restriction of the access rights on the configuration 240
7.2 The security checklist 244
8 Firewall 249
8.1 Threat analysis 249
8.1.1 The dangers 249
8.1.2 The ways of the perpetrators 250
8.1.3 The methods 250
8.1.4 The victims 251
8.2 What is a Firewall? 252
8.2.1 Tasks of a Firewall 252
8.2.2 Different types of Firewalls 253
8.3 The BAT Firewall 259
8.3.1 How the BAT Firewall inspects data packets 259
8.3.2 Special protocols 262
8.3.3 General settings of the Firewall 264
8.3.4 Parameters of Firewall rules 268
8.3.5 Alerting functions of the Firewall 274
8.3.6 Strategies for Firewall settings 279
8.3.7 Hints for setting the Firewall 281
8.3.8 Configuration of Firewall rules 285
8.3.9 Firewall diagnosis 295
8.3.10 Firewall limitations 301
8.4 Intrusion Detection 302
8.4.1 Examples for break-in attempts 302
8.4.2 Configuration of the IDS 303
8.5 Denial of Service 304
8.5.1 Examples of Denial of Service Attacks 304
8.5.2 Configuration of DoS blocking 307
8.5.3 Configuration of ping blocking and Stealth mode 309
BAT54-Rail/F..
Release 7.54 06/08 7
9.2 Which data packets to prefer? 312
9.2.1 Guaranteed minimum bandwidths 313
9.2.2 Limited maximum bandwidths 315
9.3 The queue concept 315
9.3.1 Queues in transmission direction 315
9.3.2 Queues for receiving direction 317
9.4 Reducing the packet length 318
9.5 QoS parameters for Voice over IP applications 320
9.6 QoS in sending or receiving direction 324
9.7 QoS configuration 325
9.7.1 Evaluating ToS and DiffServ fields 325
9.7.2 Defining minimum and maximum bandwidths 328
9.7.3 Adjusting transfer rates for interfaces 329
9.7.4 Sending and receiving direction 331
9.7.5 Reducing the packet length 331
9.8 QoS for WLANs (IEEE 802.11e) 333
BAT54-Rail/F..
8 Release 7.54 06/08
11 Routing and WAN connections 353
11.1 General information 353
11.1.1 Bridges for standard protocols 353
11.1.2 What happens in the case of a request from the LAN?
354
11.2 IP routing 355
11.2.1 The IP routing table 355
11.2.2 Policy-based routing 358
11.2.3 Local routing 361
11.2.4 Dynamic routing with IP RIP 362
11.2.5 SYN/ACK speedup 365
11.3 Configuration of remote stations 366
11.3.1 Peer list 366
11.3.2 Layer list 368
11.4 IP masquerading 369
11.4.1 Simple masquerading 370
11.4.2 Inverse masquerading 372
11.4.3 Free translation of TCP/IP ports on masked connections
375
11.4.4 De-Militarized Zone (DMZ) 376
11.4.5 Unmasked Internet access for server in the DMZ 377
11.5 Demilitarized Zone (DMZ) 379
11.5.1 Assigning interfaces to the DMZ 379
11.5.2 Assigning network zones to the DMZ 380
11.5.3 Address check with DMZ and intranet interfaces 381
11.6 Advanced Routing and Forwarding 382
11.6.1 Introduction 382
11.6.2 Defining networks and assigning interfaces 386
BAT54-Rail/F..
Release 7.54 06/08 9
11.7 Changes in other services 391
11.7.1 DHCP server 391
11.7.2 DHCP relay server 398
11.7.3 NetBIOS proxy 399
11.7.4 RIP 400
11.7.5 Automatic generation of VPN rules 406
11.7.6 Firewall rules for certain local networks 407
11.7.7 Virtual routers 408
11.7.8 Default routes filter 409
11.7.9 Extended port forwarding 410
11.7.10 IPX router 412
11.7.11 Assigning logical interfaces to bridge groups 413
11.7.12 Remote bridge 414
11.7.13 PPPoE Servers 415
11.8 Load balancing 415
11.8.1 DSL port mapping 417
11.8.2 Direct DSL channel bundling 420
11.8.3 Dynamic load balancing 420
11.8.4 Static load balancing 421
11.8.5 Configuration of load balancing 422
11.9 N:N mapping 425
11.9.1 Application examples 426
11.9.2 Configuration 430
11.10 Establishing connection with PPP 434
11.10.1 The protocol 434
11.10.2 Everything o.k.? Checking the line with LCP 436
11.10.3 Assignment of IP addresses via PPP 437
11.10.4 Settings in the PPP list 438
11.11 DSL Connection with PPTP 439
11.12 Extended connection for flat ratesKeep-alive 440
11.13 Callback functions 440
11.13.1 Callback for Microsoft CBCP 441
11.13.2 Fast callback 442
11.13.3 Callback with RFC 1570 (PPP LCP extensions) 443
11.13.4 Overview of configuration of callback function 443
BAT54-Rail/F..
10 Release 7.54 06/08
11.14 serial interface 444
11.14.1 Introduction 444
11.14.2 System requirements 445
11.14.3 Installation 445
11.14.4 Set the serial interface to modem operation 446
11.14.5 Configuration of modem parameters 447
11.14.6 Direct entry of AT commands 449
11.14.7 Statistics 450
11.14.8 Trace output 450
11.14.9 Configuration of remote sites for V.24 WAN interfaces
450
11.14.10 Configuration of a backup connection on the serial in-
terface 452
11.14.11 Contact assignment of BAT modem adapter kit 453
11.15 Manual definition of the MTU 453
11.15.1 Configuration 454
11.15.2 Statistics 454
11.16 WAN RIP 454
11.17 The rapid spanning tree protocol 456
11.17.1 Classic and rapid spanning tree 457
11.17.2 Improvements from rapid spanning tree 457
11.17.3 Configuring the Spanning Tree Protocol 458
11.17.4 Status reports via the Spanning Tree Protocol 461
BAT54-Rail/F..
Release 7.54 06/08 11
12.5 The SYSLOG module 484
12.5.1 Setting up the SYSLOG module 484
12.5.2 Example configuration with LANconfig 484
12.6 Time server for the local net 486
12.6.1 Configuration of the time server under LANconfig 487
12.6.2 Configuration of the time server with WEBconfig or Telnet
488
12.6.3 Configuring the NTP clients 488
12.7 Scheduled Events 491
12.7.1 Regular Execution of Commands 491
12.7.2 CRON jobs with time delay 492
12.7.3 Configuring the CRON job 493
12.8 PPPoE Servers 495
12.8.1 Introduction 495
12.8.2 Example application 495
12.8.3 Configuration 498
12.9 RADIUS 500
12.9.1 How RADIUS works 502
12.9.2 Configuration of RADIUS as authenticator or NAS 502
12.9.3 Configuring RADIUS as server 509
12.10 Extensions to the RADIUS server 511
12.10.1 New authentication method 511
12.10.2 EAP authentication 512
12.10.3 RADIUS forwarding 513
12.10.4 RADIUS server parameters 515
12.11 RADSEC 517
12.11.1 Configuring RADSEC for the client 517
12.11.2 Certificates for RADSEC 518
13 Appendix 519
13.1 Error messages in LANmonitor 519
13.1.1 General error messages 519
13.1.2 VPN error messages 519
13.2 SNMP Traps 523
13.3 Radio channels 524
13.3.1 Radio channels in the 2,4 GHz frequency band 524
13.3.2 Radio channels in the 5 GHz frequency band 524
13.3.3 Radio channels and frequency ranges for Indoor and Out-
door operating 526
BAT54-Rail/F..
12 Release 7.54 06/08
13.4 RFCs supported 528
13.5 Glossary 529
14 Index 533
BAT54-Rail/F..
Release 7.54 06/08 13
BAT54-Rail/F..
14 Release 7.54 06/08
Preface
1 Preface
The documentation of your device consists of two parts: The user manual in-
stallation and the user manual configuration.
D The hardware of the BAT devices is documented in the respective user
manual installation. Apart from a description of the specific feature set of
the different models, you find in the user manual installation information
about interfaces and display elements of the devices, as well as instruc-
tions for basic configuration by means of the wizards.
D You are now reading the user manual configuration. The user manual
configuration describes all functions and settings of the current version of
LCOS, the operating system of all BAT routers and BAT Router Access
Points. The user manual configuration refers to a certain software version,
but not to a special hardware.
It completes the users manual and describes topics in detail, which are
valid for several models simultaneously. These are for example:
D Systems design of the LCOS operating system
D Configuration
D Management
D Diagnosis
D Security
D Routing and WAN functions
D Firewall
D Quality of Service (QoS)
D Virtual Local Networks (VLAN)
D Wireless Networks
D Further server services (DHCP, DNS, charge management)
BAT54-Rail/F..
Release 7.54 06/08 15
Preface
All BAT routers and BAT Router Access Points use the same operating sys-
tem: LCOS. The operating system is not attackable from the outside, and
thus offers high security. The consistent use of LCOS ensures a comfortable
and constant operation of all BAT products. The extensive feature set is
available throughout all BAT products (provided respective support by hard-
ware), and continuously receives further enhancements by free, regular soft-
ware updates.
This user manual configuration applies to the following definitions of soft-
ware, hardware and manufacturers:
D LCOS describes the device-independent operating system
D BAT stands as generic term for all BAT routers and BAT Router Access
Points
D Hirschmann stands as shortened form for the manufacturer, Hirschmann
Automation and Control GmbH, Germany
U Validity
The present user manual configuration applies to all BAT routers and BAT
Router Access Points with firmware version 7.54 or better.
The functions and settings described in this user manual configuration are
not supported by all models and/or all firmware versions.
Illustrations of devices, as well as screenshots always represent just exam-
ples, which need not necessarily correspond to the actual firmware version.
U Security settings
For a carefree use of your device, we recommend to carry out all security set-
tings (e.g. Firewall, encryption, access protection, charge lock), which are not
already activated at the time of purchase of your device. The LANconfig wiz-
ard Check Security Settings will support you accomplishing this. Further in-
formation regarding this topic can be found in chapter Security page 237.
We ask you additionally to inform you about technical developments and ac-
tual hints to your product on our Web page www.hirschmann.com, and to
download new software versions if necessary.
... several members of our staff from a variety of departments in order to en-
sure you the best possible support when using your BAT product.
BAT54-Rail/F..
16 Release 7.54 06/08
Preface
In case you encounter any errors, or just want to issue critics enhancements,
please do not hesitate to send an email directly to:
[email protected]
BAT54-Rail/F..
Release 7.54 06/08 17
Preface
BAT54-Rail/F..
18 Release 7.54 06/08
System design 2.1 Introduction
2 System design
2.1 Introduction
The BAT operating system LCOS is a collection of different software mod-
ules, the BAT devices themselves have different interfaces to the WAN and
LAN. Depending on the particular application, data packets flow through dif-
ferent modules on their way from one interface to another.
The following block diagram illustrates in abstract the general arrangement
of BAT interfaces and LCOS modules. In the course of this user manual con-
figuration the descriptions of the individual functions will refer to this illustra-
tion to show important connections of the particular applications and to
deduce the resulting consequences.
The diagram can thus explain for which data streams the firewall comes into
play, or, in case of address translations (IP masquerading or N:N mapping),
at which place which addresses are valid.
BAT RADIUS
N:N mapping
WLAN-1-8
IP router
Load Balancing WLAN-2-1
ADSL
to
WLAN-2-8
IP-Redirect
DSL
IP masquerading
DMZ
Assignment via Switch
Assignment over Switch
ISDN Configuration &
management:
Filter
Filter
LAN
DSL
IPX router DSLoL
IPX over PPTP/VPN
DMZ
LANCAPI
BAT54-Rail/F..
Release 7.54 06/08 19
System design 2.1 Introduction
BAT54-Rail/F..
20 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
BAT54-Rail/F..
Release 7.54 06/08 21
Wireless LAN WLAN 3.1 What is a Wireless LAN?
IEEE 802.11a describes the operation of Wireless LANs in the 5 GHz fre-
quency band (5,15 GHz to 5,75 GHz), with up to 54 Mbps maximum transfer
rate. The real throughput depends however on the distance and/or on the
quality of the connection. With increasing distance and diminishing connect-
ing quality, the transmission rate lowers to 48 Mbps, afterwards to 36 Mbps
etc., up to a minimum of 6 Mbps. The distance of transmission ranges from
up to 125 m in open expanses, in buildings typically up to 25 m. The IEEE
802.11a standard uses OFDM (Orthogonal Frequency Division Multiplexing)
as modulation scheme.
OFDM
In the 5 GHz frequency band, the OFDM modulation scheme is used for IEEE
802.11a. OFDM is a modulation scheme, which utilizes multiple independent
carrier frequencies for the signal transmission, and which modulates these
multiple carriers each with a reduced data transfer rate. Thus the OFDM
modulation scheme is very insensitive in particular to echoes and other im-
pairments and enables high data transfer rates.
Turbo mode
In turbo mode, BAT Wireless Router base stations are able to use simulta-
neously two radio channels and can so increase the transfer rate up to max-
imum 108 Mbps. The turbo mode can be used in conjunction with the IEEE
802.11a standard between BAT base stations and WLAN wireless network
cards. The increase of the transfer rate must be switched on in the base sta-
tion, but can also reduce the transmitting power and the range of the radio
connection.
IIEEE 802.11b describes the operation of local Wireless LANs in the ISM fre-
quency band (Industrial, Scientific, Medical: 2.4 up to 2.483 GHz). The max-
imum transfer rate is up to 11 Mbps. The real through-put depends however
on the distance and/or on the quality of the connection. With increasing dis-
tance and diminishing connecting quality the transmission rate lowers to 5,5
Mbps, afterwards to 2 and finally to 1 Mbps. The range of the transmission
distances is between up to 150 m in open expanses and in buildings typically
up to 30 m. Due to different frequency bands in use, IEEE 802.11b is not
compatible to IEEE 802.11a.
BAT54-Rail/F..
22 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
DSSS
For shielding against interferences by other transmitters, which have possi-
bly the same frequency band, the DSSS procedure (Direct Sequence Spread
Spectrum) is used for IEEE 802.11b in the 2,4 GHz frequency band. A trans-
mitter normally uses only a very narrow range of the available frequency
band for transmission. If exactly this range is used by another transmitter, in-
terferences in transmission would be the result. With the DSSS procedure
the transmitter uses a broader spread of the possible frequencies and be-
comes more insensitive to narrow-band disturbances then. This procedure is
also used in military range for increasing tap-proof security.
The IEEE 802.11g standard works likewise with up to 54 Mbps data trans-
mission rate in the 2,4 GHz ISM-frequency band. Contrary to IEEE 802.11b,
the OFDM modulation is used for IEEE 802.11g, like already introduced for
IEEE 802.11a. IEEE 802.11g contains a special compatibility mode that en-
sures a downward compatibility to the popular IEEE 802.11b standard . How-
ever, in this compatibility mode you encounter reduced transmission speeds.
Due to the different frequency bands, IEEE 802.11g can not be compatible
to IEEE 802.11a. The transmission distances of IEEE 802.11g products are
comparable with those of IEEE 802.11b products.
Turbo mode
With the 802.11g standard in 'turbo mode' the transfer rate can be increased
to a maximum of 108 Mbps, by using two radio channels. But as a 2.4 GHz
band uses less channels than the 5 GHz band, the turbo mode limits in this
case the options of channels.
U Transfer rates
The indicated transfer rates are always to be interpreted as gross data rates,
i.e. the entire protocol overhead - as for example the complex protocols to se-
cure the radio transmission - is included in the indicated transfer rates. The
net data transfer rate can be thus lower than the indicated gross data rates,
typically over up to the half for all IEEE 802.11 standards mentioned above.
BAT54-Rail/F..
Release 7.54 06/08 23
Wireless LAN WLAN 3.1 What is a Wireless LAN?
U Ranges
The actually obtained distances for radio transfers depend strongly on the in-
dividual environment. In particular influences of noise and obstacles have an
effect on the range. Decisive is an optimal placement of the radio stations
(both network adapters and base stations). For further increase of the trans-
fer distance, we recommend the operation with additional antennas.
U IEEE standards
1. Institute of Electrical and Electronic Engineers International association, which established i.a. numerous
technology standards.
BAT54-Rail/F..
24 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
The operation of the integrated wireless card of your base station is only pos-
sible in one single frequency band, that is, either 2,4 GHz or 5 GHz. Thus a
simultaneous operation of IEEE 802.11g and IEEE 802.11a is not possible.
Since IEEE 802.11g is downward-compatible to IEEE 802.11b, an simulta-
neous operating of these two standards is possible, but with certain speed
constraints.
U Transfer rates in
compatibility mode
Note: Please notice that not all frequencies are permitted in each country!
You will find a table with the allotted frequencies and the permission reg-
ulations in the appendix.
BAT54-Rail/F..
Release 7.54 06/08 25
Wireless LAN WLAN 3.1 What is a Wireless LAN?
When two terminals are equipped with compatible wireless interfaces, they
both can communicate directly via radio. This simplest use is the so-called
ad-hoc mode.
Only in IEEE 802.11b or IEEE 802.11g standard
In ad-hoc networks you connect two or more PCs with own wireless interfac-
es directly together for building a Wireless LAN.
By use of one or more base stations (also called access point), a Wireless
LAN becomes more comfortable and more efficient. A Wireless LAN with one
or more base stations is referred to as an infrastructure network in Wireless
LAN terminology.
Note: In some devices the access point is built in, so called WLAN router.
BAT54-Rail/F..
26 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
Interesting applications arise for the Wireless LAN from the LAN connection
of base stations:
D Connecting the Wireless LAN to an existing LAN
D Extending the coverage of a Wireless LAN
Additionally, the use of a base station enables a central administration of the
Wireless LAN.
Connection to an existing LAN
An infrastructure network is ideally suitable as an extension to existing wired
LANs. For extension of a LAN in areas, where a wiring is not possible or un-
economical, the infrastructure network represents an ideal alternative.
Wireless LAN
base station
LAN
BAT54-Rail/F..
Release 7.54 06/08 27
Wireless LAN WLAN 3.1 What is a Wireless LAN?
connection via
LAN
workstation
In the example above, the roaming function of the mobile station enables the
access to the workstation in radio cell A also after changing into radio cell B.
After the radio cell change, the base station in radio cell B passes on the data
of the mobile station via LAN to the base station in radio cell A. From there,
they arrive via radio at the workstation in radio cell A. In this way, the connec-
tion between both devices remains existing at any time.
A Wireless LAN can consist of as many as desired radio cells. Thus the ex-
tension of a Wireless LAN is unlimited.
The BAT Wireless Router base station possesses a WAN connector for all
current broadband modems with cable-bound Ethernet connection (DSL or
cable modem). In this operation mode, the base station offers all functions of
a complete IP and IPX router as well. The base station serves in this connec-
tion variant as gateway to the Internet. The router checks for all received data
packets whether they need to be transferred to another network or worksta-
tion. The router itself establishes the connections as required.
The integrated Stateful Inspection Firewall prevents effectively the penetra-
tion of undesired data traffic into the own network by permitting incoming data
only as reaction to outgoing data traffic. For accessing the Internet, the IP
masquerading function of the router hides all workstations of the LAN behind
a single public IP address. The real identities (IP addresses) of the individual
workstations remain concealed. Firewall filters of the router permit specific IP
addresses, protocols and ports to be blocked. With MAC address filters it is
also possible to specifically control the access of workstations in the LAN to
the IP routing function of the device.
BAT54-Rail/F..
28 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
WLAN
firewall
LAN
Internet
WAN
U VPN pass-through
VPN client
Note: The BAT base stations support VPN pass-through function for multiple
stations within a wireless network.
With two base stations, two LANs can be connected via a radio link (point-to-
point mode). In this so-called bridge mode, all data is transferred automati-
cally to the remote network.
BAT54-Rail/F..
Release 7.54 06/08 29
Wireless LAN WLAN 3.1 What is a Wireless LAN?
By the use of narrow beam antennas, also larger distances can be bridged
securely. An additional increase of reach can be achieved by use of further
base stations, which operate in relay mode between two LAN segments.
Point-to-multipoint operation
It is possible to couple up to seven remote network segments to an united
network by wireless bridges in the so-called P2MP operation (point-to-multi-
point) mode.
Point-to-station operation
The so-called P2Station operation (point-to-station) connects a single station
is to a remote LAN.
BAT54-Rail/F..
30 Release 7.54 06/08
Wireless LAN WLAN 3.1 What is a Wireless LAN?
For binding single devices with Ethernet interfaces to a Wireless LAN, BAT
Wireless base stations can be put into the so-called client mode, in which
they behave like a conventional Wireless LAN adapter and not like a base
station. Due to the client mode, it is also possible to integrate devices like
PCs or printers having only one Ethernet interface into a Wireless LAN.
base stations in
client mode
base stations in
standard mode
Note: An Access Point in normal mode further clients can log on, but not in
client mode.
BAT54-Rail/F..
Release 7.54 06/08 31
Wireless LAN WLAN 3.1 What is a Wireless LAN?
SSID='WLAN'
LAN
SSID='PUBLIC'
SSID='CLOSED'
LAN
BAT54-Rail/F..
32 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
U Authentication
BAT54-Rail/F..
Release 7.54 06/08 33
Wireless LAN WLAN 3.2 Development of WLAN security
U Authenticity
Authenticity: Proof of the authorship of the data and the originality of the data
content; the process of establishing this proof is known as authentication.
U Integrity
Once access is provided, one would like to ensure that data packets reach
the receiver without any falsification, that is, that no-one can change the
packets or insert other data into the communication path. The manipulation
of data packets themselves cannot be prevented, but changed packets can
indeed be identified using suitable checksum processes, and then discarded.
U Confidentiality
BAT54-Rail/F..
34 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
D The receiver selects any symmetrical key. This symmetrical key that is
used both for encryption and for decryption, must now be securely trans-
mitted to the sender. It is encrypted with the sender's public key and re-
turned to the sender. The only way that the symmetrical key can be
decrypted again is with the sender's private key. Potential eavesdroppers
observing the key exchange cannot decrypt this information, and conse-
quently the transmission of the symmetrical key is secure.
This method can be used for the safe transmission of symmetrical keys via
the Internet. In the following sections, we will see these methods again,
sometimes in modified form.
3.2.2 WEP
WEP is an abbreviation for Wired Equivalent Privacy. The primary goal of
WEP is the confidentiality of data. In contrast to signals which are transmitted
over cables, radio waves spread out in all directionseven into the street in
front of the house and other places where they really aren't desired. The
problem of undesired interception is particularly obvious in wireless data
transmission, even though it can also arise in larger installations with wired
networkshowever, access to cables is far more easily restricted than is the
case with radio waves.
During the development of the WLAN security standard, the IEEE Committee
did not intend to develop a "perfect" encryption method. Such high-security
encryption methods are, for instance, required and also used in electronic
bankingin this case, however, the applications themselves use high-quality
encryption methods, and it would be unnecessary to repeat this effort at the
radio transmission level. With the new security standards, only those appli-
cations which normally work without encryption in wired LANs should be pro-
vided with sufficient security against eavesdropping by unauthorized third
parties.
WEP is a symmetrical method of encryption and uses RC4 algorithm as its
basic encryption technology, a process already well-known in other areas
and considered highly secure. RC4 uses a key between 8 and 2048 bits in
length, which is used to generate a pseudo-random series of bytes using a
predetermined process. The data packet for encryption is then XOR'd byte
by byte with this byte stream. The receiver simply repeats this procedure with
the same key and in the same order to produce the original data packet
again.
BAT54-Rail/F..
Release 7.54 06/08 35
Wireless LAN WLAN 3.2 Development of WLAN security
However, RC4 has one serious disadvantage: one may only use a particular
RC4 key once for a single packet, as two different packets that have been
coded with the same RC4 key potentially provide the basis to reproduce the
original data. As it would be impracticable for the user to enter a new code
key for every data packet, WEP combines this key with an additional internal
key, the initial vector (IV). This is automatically changed from packet to pack-
et.
The IEEE standard originally foresaw a relatively short key length of 40 bits,
which was probably oriented towards the then-existing US export restrictions
on strong cryptography; this variant in combination with the 24 bits of the IV
is usually referred to as WEP64. Most WLAN cards today support a variant
in which the user can configure a 104-bit key, which results in a 128 bit long
RC4 keycorrespondingly, this is often called WEP128. More seldom are
key lengths of 128 bits (WEP152) or 232 bits (WEP 256). In principle RC4
can work with key lengths of up to 2048 bits (WEP keys of up to 2024 bits),
although in practice key lengths reach a simple limit at which the user can
manage to enter the columns of digits without making a mistake.
The IEEE standard specifies that up to four different WEP keys can exist in
one WLAN. The sender encodes the number of the WEP key used in the en-
crypted packet along with the initial vector, so that the receiver can use the
appropriate key. The idea behind this was that old keys in a WLAN could
gradually be exchanged for new keys, in that stations which had not yet re-
ceived the new key could still use an old key during a transition period.
One of the chief weakness of WEP is the length of the initial vector, which is
far too short. As mentioned previously, the repetition of a key with RC4 pre-
sents a significant security loophole which, with a length of just 24 bits, can
occur within just a few hours depending on the data rate. Since particular por-
tions of the encrypted data packets can quickly offer conclusive information
about the key, an eavesdropper only needs to process a small amount of the
data traffic with specialized sniffer tools in order to crack the key. These
weaknesses unfortunately degraded WEP to an encryption scheme which at
best could be used to protect a home network against 'accidental eavesdrop-
pers.'
BAT54-Rail/F..
36 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
3.2.3 WEPplus
As explained in the previous section, the use of 'weak' IV values was the
problem which weakened the WEP process most. A first 'quick shot' to se-
cure WLANs against this kind of program was the simple notion that the weak
IV values are known, and that they could simply be skipped during encryp-
tionsince the IV used is after all transmitted in the packet, this procedure
would be completely compatible with WLAN cards which didn't understand
this extension, dubbed WEPplus. A true improvement in security would nat-
urally only result once all partners in the WLAN were using this method.
In a network equipped with WEPplus, a potential attacker again has the
chore of listening to the entire data traffic, waiting for IV repetitionssimply
waiting for the few packets with weak IVs is no longer an option. This raises
the bar for an attacker once again. Objectively speaking, WEPplus is a slight
improvement--it is suitable for home use, provided that the key of reconfig-
ured often enough. For use in a professional environment, however, this is
not sufficient.
BAT54-Rail/F..
Release 7.54 06/08 37
Wireless LAN WLAN 3.2 Development of WLAN security
WLAN registration
EAP/802.1x negotiation
session key
In the first phase, the client registers with the access point as usual, and en-
ters the state in which it can now send and receive over the access point in
normal WEP or WEPplusbut not with EAP, because in this state the client
still doesn't have a key to secure its data traffic from eavesdropping. Instead,
the client is in an 'intermediate state' from the point of view of the access
point, in which only particular packets from the client are forwarded, and
these are only directed to an authentication server. These packets are the
EA/802.1x mentioned previously. The access point packs these packets in
RADIUS queries and sends them on to the authentication server. The access
point converts the replies coming from the RADIUS server back into EAP
packets, and sends them back to the client.
BAT54-Rail/F..
38 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
The access point is thus a sort of middle man between client and server. it
doesn't have to check the contents of these packets, it just has to check that
no other data traffic to or from the client can occur. Over this "tunnel" through
the access point, the client and server authenticate one another, that is, the
server checks the client's access privilege to the network, and the client
checks that it is talking to the right network. "Wild" access points set up by
hackers can be recognized in this way.
A whole series of authentication processes exist which can be used in this
tunnel. A current process (and one supported by Windows XP) is for instance
TLS, in which server and client exchange certificates; another is TTLS, in
which only the server supplies a certificatethe client is authenticated using
only a username and password.
After the authentication phase, a secure tunnel even without WEP encryption
has been set up, in which the access point is connected in the next step. For
this, the RADIUS server sends the so-called 'Master Secret', a session key
calculated during the negotiation, to the access point. The LAN behind the
access point is considered secure in this scenario, so that this transmission
can be performed in clear text.
With this session key, the access point now takes over the tunnel and can
use it to provide the actual WEP key to the client. Depending on the capabil-
ities of the access point hardware, this can be a true session key (that is, a
WEP key which will only be used for data packets between the access point
and precisely this client), or a so-called group key, which the access point will
use for communication with multiple clients. Classical WEP hardware can
usually handle only group keys, these being the four mentioned in the chap-
ter on WEP.
The particular advantage of this procedure is that the access point can regu-
larly change the WEP key over the EAP tunnel, that is, it can perform a so-
called rekeying. In this way, WEP keys can be replaced by new ones long
before they run the risk of being cracked due to IV collisions. A common 'use
time' for such WEP keys might be 5 minutes.
The disadvantage of the procedure is its complexity. The maintenance of the
central RADIUS server and the certificates stored there is generally only pos-
sible in large installations with a separate IT departmentit is less suitable
for use in the home or in smaller companies. These practical hurdles have
thus limited EAP/802.1x to professional use so farthe home user must sim-
ply make do with WEPplus, or address security problems on the applications
level.
BAT54-Rail/F..
Release 7.54 06/08 39
Wireless LAN WLAN 3.2 Development of WLAN security
U TKIP
TKIP stands for Temporal Key Integrity Protocol. As the name suggests, it
involves an intermediate solution for temporary use until a truly strong en-
cryption procedure is introduced, but which deals with the problems of WEP,
never the less. A requirement of this method was compatibility with existing
WEP/RC4 hardware.
Encryption makes use of components familiar from WEP but benefits from
decisive improvements with the "Michael hash" from improved encryption
and the TKIP method for calculation of the RC4 key. Furthermore, the inter-
nally incremented IV transmitted in clear text in the packet is 48 bits long in-
stead of 24--thus the problem with the repeating IV value is practically
excluded.
As a further detail, TKIP also mixes the MAC address of the sender into the
calculation of the key. This ensures that the use of identical IVs by different
senders cannot lead to identical RC4 keys and thus again to attack possibil-
ities.
The Michael hash does not, however, represent a particularly tough crypto-
graphic hurdle: if the attacker can break the TKIP key or get encrypted pack-
ets past the CRC check via modifications similar to those for WEP, then not
many barriers remain. For this reason, WPA defines countermeasures if a
WLAN card detects more than two Michael errors per minute: both the client
and the access point break data transfer off for one minute, afterwards rene-
gotiating TKIP and Michael keys.
BAT54-Rail/F..
40 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
The handshake described in the previous section runs strictly under WPA,
i.e. the user will never have to define any TKIP or Michael keys. In environ-
ments in which no RADIUS server is available to provide master secrets (for
instance in smaller companies or home networks), WPA therefore provides
the PSK method besides authentication using a RADIUS server; here, the
user must enter a passphrase of 8 to 32 characters on the access point and
on all stations, from which the master secret is calculated along with the SSID
used using a hash procedure. The master secret is therefore constant in such
a PSK network, although different TKIP keys still result.
In a PSK networksimilar to classical WEPboth access security and con-
fidentiality depend on the passphrase not being divulged to unauthorized
people. As long as this is the case, WPA-PSK provides significantly improved
security against break-ins and eavesdropping over any WEP variant. For
larger installations in which such a passphrase would have to be made
known to too large a user community for it to be kept secret, EAP/802.11i is
used in combination with the key handshake described here.
BAT54-Rail/F..
Release 7.54 06/08 41
Wireless LAN WLAN 3.2 Development of WLAN security
Since the original WEP definition specified a fixed key length of 40 bits,
the registration of a client at an access point only had to communicate wheth-
er encryption should be used or not. Key lengths exceeding 40 bits require
that the key length is announced. WPA provides a mechanism with which cli-
ent and access point can agree on the encryption and authentication proce-
dures to be used. The following information is made available:
D The encryption method to be used for broadcasts in this network (also the
type of group key). Each client wanting to register in a WPA-WLAN must
support this procedure. Here, besides TKIP, WEP is also still allowed, in
order to support mixed WEP/WPA networksin a pure WPA network,
TKIP will be selected.
D A list of encryption methods which the access point provides for the pair-
wise keyhere, WEP is explicitly disallowed.
D A list of authentication methods a client may use to show itself to the
WLAN as authorized for accesspossible methods are currently EAP/
802.1x or PSK.
As mentioned, the original WPA standard specifies only TKIP/Michael as an
improved encryption method. With the further development of the 802.11i
standard, the AES/CCM method described below was added. In a WPA net-
work it is now possible for some clients to communicate with the access point
using TKIP, while other clients use AES.
U AES
BAT54-Rail/F..
42 Release 7.54 06/08
Wireless LAN WLAN 3.2 Development of WLAN security
The suffix CCM denotes the way in which AES is used in WLAN packets. The
process is actually quite complicated, for which reason CCM is only sensibly
implemented in hardwaresoftware-based implementations are possible,
but would result in significant speed penalties due to the processors com-
monly used in access points.
In contrast to TKIP, AES only requires a 128-bit key, with which both the en-
cryption and protection against undetected changes to packets is achieved.
Furthermore, CCM is fully symmetric, i.e. the same key is used in both com-
munications directionsa standards compliant TKIP implementation, on the
other hand, requires the use of different Michael keys in the send and receive
directions, so that CCM is significantly simpler in use than TKIP.
Similar to TKIP, CCM uses a 48-bit Initial Vector in each packetan IV rep-
etition is impossible in practice. As in TKIP, the receiver notes the last IV
used and discards packets with an IV which is equal to or less than the com-
parison value.
802.11i is intended to help with the use of WLAN for speech connections
(VoIP) in enterprise networks. Especially in connection with WLAN-based
wireless telephony, quick roaming (switching from one access point to anoth-
er without lengthy interruptions) is of special significance. In telephone con-
versations, interruptions of 100 milliseconds are irritating, but the full
authentication process over 802.1x, including the subsequent key negotia-
tion with the access point, can take significantly longer.
For this reason, the so-called PMK caching was introduced as a first mea-
sure. The PMK serves as the basis for key negotiation in an 802.1x authen-
tication between client and access point. In VoIP environments it is possible
that a user moves back and forth among a relatively small number of access
points. Thus it may happen that a client switches back to an access point in
which it was already registered earlier. In this case it wouldn't be sensible to
repeat the entire 802.1x authentication again. For this reason, the access
point can provide the PMK with a code, the so-called PMKID, which it trans-
mits to the client. Upon a new registration, the client uses the PMKID to ask
whether this PMK is still stored. If yes, the 802.1x phase can be skipped and
the connection is quickly restored. This optimization is unnecessary if the
PMK in a WLAN is calculated from a passphrase as this applies everywhere
and is known.
BAT54-Rail/F..
Release 7.54 06/08 43
Wireless LAN WLAN 3.2 Development of WLAN security
A second measure allows for some acceleration even in the case of first-time
registration, but it requires a little care on the part of the client. The client must
already detect a degrading connection to the access point during operation
and select a new access point while it is still in communication with the old
access point. In this case it has the opportunity to perform the 802,1x nego-
tiation with the new access point over the old one, which again reduces the
"dead time" by the time required for the 802.1x negotiation.
3.2.7 Summary
After the security loopholes in WEP encryption became public knowledge,
the presentation of short-term solutions such as WEPplus and the intermedi-
ate steps like WPA, the IEEE committee has now presented the new WLAN
security standard 802.11i. The TKIP procedure used by WPA is based on the
older RC4 algorithm, the foundation of WEP. AES is the first important and
conclusive step towards a truly secure encryption system. 802.11i/AES have
confined the practical and theoretical security loopholes in previous methods
to history.
The AES procedure provides security on a level that satisfies the Federal In-
formation Standards (FIPS) 140-2 specifications that are required by many
public authorities.
Hirschmann equips its 54Mbps products with the Atheros chip set featuring
a hardware AES accelerator. This guarantees the highest possible level of
encryption without performance loss.
The user-friendly pre-shared key procedure (entry of a passphrase of 8-63
characters in length) makes 802.11i quick and easy for anybody to set up.
Professional infrastructures with a larger number of users can make use of
802.1x and RADIUS servers.
In combination with further options such as Multi-SSID and VLAN tagging, it
is possible to provide highly secure networks for multiple user groups and
with different levels of security.
D VLAN tagging is available as of LCOS version 3.32.
D Multi-SSID is available as of LCOS 3.42.
D Hirschmann provides the PSK procedure as of the LCOS version 3.50.
D 802.1x will be supported as of LCOS version 3.52.
BAT54-Rail/F..
44 Release 7.54 06/08
Wireless LAN WLAN 3.3 Protecting the wireless network
BAT54-Rail/F..
Release 7.54 06/08 45
Wireless LAN WLAN 3.3 Protecting the wireless network
The modern encryption methods WPA and IEEE 802.11i provide data traffic
in the WLAN with far improved security from eavesdroppers than the older
WEP can. It is very easy to handle a passphrase as a central key; a RADIUS
server such as that for 802.1x installations is not required.
However, the use of WPA and IEEE 802.11i still has some weak spots:
D A passphrase applies globally for all WLAN clients
D The passphrase may fall into unauthorized hands if treated carelessly
D The "leaked" passphrase then offers any attacker free access to the wire-
less network
This means in practice that: Should the passphrase "go missing" or an em-
ployee with knowledge of the passphrase leaves the company, then the
passphrase in the access point really needs to be changedin every WLAN
client, too. As this is not always possible, an improvement would be to have
an individual passphrase for each user in the WLAN instead of a global pass-
phrase for all WLAN clients. In the case mentioned above, the situation of an
employee leaving the company requires merely his "personal" passphrase to
be deleted; all others remain valid and confidential.
With LEPS (LANCOM Enhanced Passphrase Security), there is an efficient
method that makes use of the simple configuration of IEEE 802.11i with
passphrase, but that avoids the potential security loopholes that come with
global passphrases.
LEPS uses an additional column in the ACL (access control list) to assign an
individual passphrase consisting of any 8 to 63 ASCII characters to each
MAC address. The connection to the access point and the subsequent en-
cryption with IEEE 802.11i or WPA is only possible with the right combination
of passphrase and MAC address.
This combination makes the spoofing of the MAC addresses futileand
LEPS thus shuts out a potential attack on the ACL. If WPA or IEEE 802.11i
is used for encryption, the MAC address can indeed be interceptedbut this
method never transmits the passphrase over wireless. This greatly increases
the difficulty of attacking the WLAN as the combination of MAC address and
passphrase requires both to be known before an encryption can be negotiat-
ed.
BAT54-Rail/F..
46 Release 7.54 06/08
Wireless LAN WLAN 3.3 Protecting the wireless network
LEPS can be used both locally in the device and centrally managed with a
RADIUS server. LEPS works with all WLAN client adapters available on the
market without any modification. Full compatibility to third-party products is
assured as LEPS only involves configuration in the access point.
Note: An additional security aspect: LEPS can also be used to secure single
point-to-point (P2P) connections with an individual passphrase. Even if an
access point in a P2P installation is stolen and the passphrase and MAC
address become known, all other WLAN connections secured by LEPS
remain secure, particularly when the ACL is stored on a RADIUS server.
U Configuration
BAT54-Rail/F..
Release 7.54 06/08 47
Wireless LAN WLAN 3.3 Protecting the wireless network
BAT54-Rail/F..
48 Release 7.54 06/08
Wireless LAN WLAN 3.3 Protecting the wireless network
The standard WEP key consists of the first letter L followed by the LAN
MAC address of the access point in ASCII characters. The LAN MAC ad-
dresses of the BAT devices always begin with the character string 00A057.
You will find the LAN MAC address on a sticker on the base of the device.
Only use the character string labelled as MAC address that starts with
00A057. The other addresses that may be found are not the LAN MAC ad-
dress.
A device with the LAN MAC address 00A0570FB9BF thus has a standard
WEP key of L00A0570FB9BF. This key is entered into the Private WEP
settings of the device for each logical WLAN network as Key 1.
Note: To use a WLAN client to connect to a new (unconfigured) BAT access
point, the WEP128 encryption must be activated in the WLAN client and
the 13-character standard WEP key must be programmed in as described
above.
U Rogue AP detection
BAT54-Rail/F..
Release 7.54 06/08 49
Wireless LAN WLAN 3.3 Protecting the wireless network
tackers via unsecured WLAN access. Not quite as dangerous, but disruptive
all the same are access points that belong to third-party networks yet are
within the range of the local WLAN. If such devices also use the same SSID
and channel as the local AP (default settings), then local clients could attempt
to log on to external networks.
Unidentified access points within the range of the local network frequently
pose a possible threat and security gap. At the very least, they are a distur-
bance. Therefore, background scanning identifies rogue APs and helps to
decide whether further measures in securing the local network need to be in-
troduced.
However, the background scanning method can be used for objectives other
than rogue AP detection. A BAT Wireless Router in client mode that logs it-
self on to another access point can also use the roaming procedure in a mo-
bile installation. This is the case, for example, when a BAT Wireless Router
used in an industrial application scenario is mounted to a forklift that navi-
gates its way through multiple warehouses with separate access points. Un-
der normal circumstances, the WLAN client would only log on to another
access point when the connection to the access point it had been using until
that moment was lost. With the background scanning function, the BAT
Wireless Router using the client mode can collect information about other
available access points in advance. Then the client is not switched to another
access point when the existing connection has been completely lost, but
rather when another access point within its range has a stronger signal.
The information on the access points found can be viewed in the BAT
Wireless Router statistics. The WLANmonitor presents the scan results quite
conveniently and also offers additional functions such as access point group-
ing or automatic notification via e-mail whenever a new WLAN device ap-
pears.
Note: Further information can be found under Rogue AP and rogue client
detection with the WLANmonitor page 217.
BAT54-Rail/F..
50 Release 7.54 06/08
Wireless LAN WLAN 3.3 Protecting the wireless network
When configuring the background scan, a time period is defined in which all
available WLAN channels are to be scanned once for the receiving beacons.
BAT54-Rail/F..
Release 7.54 06/08 51
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
D When the background scan time is '0' the background scanning func-
tion is deactivated.
The background scan interval sets the time period between searches by a
Wireless Router or Access Point for third-party WLAN networks within range.
The time interval allows the entered value to be defined in milliseconds, sec-
onds, minutes, hours or days.
Note: To avoid adverse effects on data transfer rates, the interval between
channel scans should be at least 20 seconds. Lesser values will be cor-
rected to this minimum value automatically. For example, with 13 chan-
nels to scan in the 2.4GHz band, one scan of the full spectrum takes at
least 13 x 20s = 260 seconds.
Note: Background scanning can be limited to a lower number of channels
when indoor mode is activated. This allows roaming for the mobile BAT
Wireless Router in client mode to be improved even further.
BAT54-Rail/F..
52 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
U General settings
BAT54-Rail/F..
Release 7.54 06/08 53
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
With the Access Control List (ACL) you can permit or prevent the access to
your wireless LAN by individual clients. The decision is based on the MAC
address that is permanently programmed into wireless LAN adapters.
Configuration with LANconfig
For configuration with LANconfig you will find the general WLAN access set-
tings under the configuration area 'WLAN Security' on the 'Stations' tab.
Check that the setting 'filter out data from the listed stations, transfer all other'
is activated. New stations that are to participate in your wireless network are
added with the button 'Stations'.
BAT54-Rail/F..
54 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
U Protocol filter
With the protocol filter you can influence the handling of certain protocols dur-
ing transfer from the WLAN to the LAN.
Note: Packets from the WLAN for certain protocols/ports can be redirected
to special IP addresses in the LAN by the protocol filter. This function
known as "Redirect is described in detail in the section Redirect function
page 82.
Configuration with LANconfig
For configuration with LANconfig you will find the protocol filter under the con-
figuration area 'WLAN Security' on the 'Protocols' tab.
BAT54-Rail/F..
Release 7.54 06/08 55
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Make an entry in the protocol list for each protocol that requires special han-
dling. Enter the following values:
D A name of your choice for the filter entry
D Protocol number, e.g. '0800' for IP. If no protocol is entered, the filter will
be applied to all packets.
D Subprotocol, e.g. '6' for TCP. If no subprotocol is entered, the filter will be
applied to all packets of the entered protocol.
D Port start and port end, e.g. each '80' for HTTP. If no ports are entered,
then this filter will be applied to all ports of the appropriate protocol/sub-
protocol.
Note: Lists of the official protocol and port numbers are available in the Inter-
net under www.iana.org.
BAT54-Rail/F..
56 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Example:
Name Protocol Sub- Start port End Interface list Action Redirect IP
type port address
ARP 0806 0 0 0 WLAN-1-2 Let through 0.0.0.0
DHCP 0800 17 67 68 WLAN-1-2 Let through 0.0.0.0
TELNET 0800 6 23 23 WLAN-1-2 Redirect 192.168.11.5
ICMP 0800 1 0 0 WLAN-1-2 Let through 0.0.0.0
HTTP 0800 6 80 80 WLAN-1-2 Redirect 192.168.11.5
ARP, DHCP, ICMP will be let through, Telnet and HTTP will be redirected to
192.168.11.5, all other packets will be rejected.
Note: As soon as an entry is made in the protocol filter, all packets not match-
ing the filter will be automatically rejected!
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you will find the protocol filter under the following
paths:
U Encryption settings
Access points of the BAT range support the most up-to-date methods of en-
cryption and security for data that is transferred via WLAN.
D The IEEE standard 802.11i/WPA stands for the highest degree of security
that is currently available for WLAN connections. This standards uses a
new encryption procedure (AES-CCM) which, in combination with other
methods, achieves levels of security equalled only by VPN connections
until now. When using AES-capable hardware the transmissions are
much faster than with comparable VPN security.
D WEP is also supported to ensure compatibility with older hardware. WEP
(Wired Equivalent Privacy) is the encryption method originally incorporat-
ed in the 802.11 standard for the encryption of data in wireless transmis-
sion. This method uses keys of 40 (WEP64), 104 (WEP128) or 128 bits
(WEP152) in length. A number of security loopholes in WEP have come
to light over time, and so the latest 802.11i/WPA methods should be used
wherever possible.
Note: Further information about the 802.11i and WPA standards are avail-
able under Development of WLAN security page 33.
BAT54-Rail/F..
Release 7.54 06/08 57
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
The tab '802.11i/WEP' in the configuration area 'WLAN Security' is used for
setting the encryption parameters for each logical WLAN. Open the list with
the button for WPA or Private WEP settings.
Type of encryption
First of all, select the type of encryption for the individual logical WLAN inter-
faces:
D YesAccess only for stations with encryption (recommended): In this
mode, only the WLAN clients with activated WEP and the correct key can
register with the access point.
D YesAccess also for stations without encryption allowed: In this mode,
WLAN clients with activated WEP and WLAN clients (without WEP) can
register with this access point.
D NoNo encryption
Method/
Key 1 length
Set the encryption method to be used here.
D 802.11i (WPA)-PSK Encryption according to the 802.11i standard offers
the highest security. The 128-bit AES encryption used here offers security
equivalent to that of a VPN connection.
D WEP 152, WEP 128, WEP 64 encryption according to the WEP stan-
dard with key lengths of 128, 104 or 40 bits respectively. This setting is
only to be recommended when the hardware used by the WLAN client
does not support the modern method.
D WEP 152-802.1x, WEP 128-802.1x, WEP 64-802.1x encryption accord-
ing to the WEP standard with key lengths of 128, 104 or 40 bits respec-
tively, and with additional authentication via 802.1x/EAP. This setting is
also only to be recommended when the hardware used by the WLAN cli-
ent does not support the 802.11i standard. The 802.1x/EAP authentica-
tion offers a higher level of security than WEP encryption alone, although
the necessity for a RADIUS server makes very high demands of the IT in-
frastructure.
Key 1/passphrase
In line with the encryption method activated, you can enter a special WEP
key for the respective logical WLAN interface or a passphrase when using
WPA-PSK:
D The passphrase, or the 'password' for the WPA-PSK method, is entered
as a string of at least 8 and up to 63 ASCII characters.
Note: Please be aware that the security of this encryption method depends
on the confidential treatment of this passphrase. Passphrases should not
be made public to larger circles of users.
BAT54-Rail/F..
58 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
D The WEP key 1, that applies only to its respective logical WLAN interface,
can be entered in different ways depending on the key length. Rules of
the entry of the keys can be found in the description of the WEP group key
Rules for entering WEP keys page 62.
WPA session key type
If '802.11i (WPA)-PSK' has been entered as the encryption method, the pro-
cedure for generating a session or group key can be selected here:
D AES the AES method will be used.
D TKIP the TKIP method will be used.
D AES/TKIP the AES method will be used. If the client hardware does not
support the AES method, TKIP will be used.
Authentication
If the encryption method was set as WEP encryption, two different methods
for the authentication of the WLAN client are available:
D The 'Open system' method does not use any authentication. The data
packets must be properly encrypted from the start to be accepted by the
access point.
D With the 'Shared key' method, the first data packet is transmitted unen-
crypted and must be sent back by the client correctly encrypted. This
method presents potential attackers with at least one data packet that is
unencrypted.
Default key
If WEP encryption is selected, the access point can select from four different
WEP keys for each logical WLAN interface:
D Three WEP keys for the physical interface
D An additional WEP key particular to each logical WLAN interface
The private WEP settings are used to set the additional key for each logical
WLAN interface (see 'Key 1/passphrase'). You should also select which of
the four keys is currently to be used for the encryption of the data (default
key). This setting can be used to change the key frequently, so increasing se-
curity.
Rules of the entry of the keys can be found in the description of the WEP
group key Rules for entering WEP keys page 62.
Configuration with LANconfig
For configuration with LANconfig you will find the private WEP settings under
the configuration area 'WLAN Security' on the '802.11i/WEP' tab.
BAT54-Rail/F..
Release 7.54 06/08 59
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
BAT54-Rail/F..
60 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Rules of the entry of the keys can be found in the description of the WEP
group key Rules for entering WEP keys page 62.
Configuration with LANconfig
The tab '802.11i/WEP' in the configuration area 'WLAN Security' is used for
setting the three WEP keys 2 to 4. Open the list with the button for WEP
Group Keys. These WEP keys apply to the physical WLAN interface and
thus globally to all of the associated logical WLAN interfaces.
BAT54-Rail/F..
Release 7.54 06/08 61
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
The ASCII character set includes the characters '0' to'9', 'a' to 'z', 'A' to 'Z' and
the following special characters:
! # $ % & () * + , - ./ : ; < = > ? @ [ \ ] ^ _ { | } ~
The HEX form uses the numbers '0' to '9' and the letters 'A' to 'F' to display
each character as a character pair, which is why twice the number of charac-
ters is required to display a HEX key.
Select the length and the format (ASCII or HEX) of the key depending on the
best option available in the wireless network cards that register with your
WLAN. If the encryption in an access point is set to WEP 152, some clients
may not be able to log into the WLAN as their hardware does not support the
key length.
BAT54-Rail/F..
62 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
This group includes two other parameters in addition to the country setting:
ARP handling
D Mobile stations in the wireless network that are on standby do not answer
the ARP requests from other network stations reliably. If 'ARP handling' is
activated, the access point takes over this task and answers the ARP re-
quests on behalf of stations that are on standby.
Broken link detection
D The 'Broken link detection' deactivates the WLAN card if the access point
loses contact to the LAN.
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you will find the general WLAN parameters un-
der the following paths:
BAT54-Rail/F..
Release 7.54 06/08 63
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Apart from the parameters common to all WLAN cards, there is a series of
settings to be made that are particular to each WLAN card of the access
point.
Configuration with LANconfig
For configuration with LANconfig you will find the settings for the WLAN card
under the configuration area 'Interfaces' on the 'Wireless LAN' tab. Open the
list of physical WLAN interfaces by clicking on the button Physical WLAN
settings.
BAT54-Rail/F..
64 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Operation mode
BAT Wireless Router devices can be operated in two basic operation modes:
D As an access point, it forms the link between the WLAN clients and the
cabled LAN.
D In Client mode the device seeks another access point and attempts to
register with a wireless network. In this case the device serves to link a
cabled network device to another access point over a wireless connec-
tion.
Select the operation mode from the tab 'Operation'. If the WLAN interface is
not required, it can be completely deactivated.
BAT54-Rail/F..
Release 7.54 06/08 65
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
U Radio settings
BAT54-Rail/F..
66 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
BAT54-Rail/F..
Release 7.54 06/08 67
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
The radio channel selects a portion of the conceivable frequency band for
data transfer.
DFS 2 ETSI 301 893 V1.3.1
The ETSI standard 301 893 version 1.3.1 is the latest set of regulations con-
cerning the operation of 5 GHz wireless LANs. In the context of the wireless
LAN modules used in the BAT Wireless Routers and BAT Access Points, this
standard is also referred to as DFS 2.
This standard makes tougher demands on the radar detection patterns used
when operating 5 GHz WLANs. The standard applies to all devices brought
into circulation after April 01, 2008. Devices brought into circulation before
this date do not have to meet this standard. In particular devices with older
WLAN chips (two- or three-chip modules) do not have to meet this standard
and, as such, do not have to be upgraded.
Hirschmann supplies LCOS firmware of the versions 7.30 (for the current
Wireless Routers and Access Points) and 7.52 (for BAT Wireless L-310agn
and BAT Wireless L-305agn) with DFS 2 support. These firmware versions
have different threshold values for radar pattern recognition than with the
former DFS.
Danger: In principle the operator of the WLAN is responsible for maintaining
the new ETSI standards. For this reason Hirschmann recommends that
you perform an update to a firmware version with DFS 2 support.
Note: In the 2.4-GHz band, two separate wireless networks must be at least
three channels apart to avoid interference.
Compatibility mode
Two different wireless standards are based on the 2.4-GHz band: the
IEEE 802.11b standard with a transfer rate of up to 11 Mbps and the
IEEE 802.11g standard with up to 54 Mbps. When 2.4 GHz is selected as the
frequency band, the data transfer speed can be set as well.
Note: Please observe that clients supporting only the slower standards may
not be able to register with the WLAN if the speeds set here are higher.
The 802.11g/b compatibility mode offers the highest possible speeds and yet
also offers the 802.11b standard so that slower clients are not excluded. In
this mode, the WLAN card in the access point principally works with the faster
standard and falls back on the slower mode should a client of this type log
into the WLAN. In the '2Mbit compatible' mode, the access point supports
older 802.11b cards with a maximum transmission speed of 2 Mbps.
BAT54-Rail/F..
68 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Turbo mode
Using two neighboring, vacant channels for wireless transmissions can in-
crease the transfer speeds up to 108 Mbps. Set this option for the 2.4-GHz
band by selecting the drop down list '2.4 GHz mode', for the 5-GHz band in
the appropriate list '5 GHz mode' below.
Antenna gain
Transmission power reduction
Where the transmission power of an antennae exceeds the levels permitted
in the country of operation, the power must be attenuated accordingly.
D The field 'Antenna gain' is for the gain of the antenna minus the actual ca-
ble loss. For an AirLancer Extender O-18a antenna with a gain of 18dBi
and a 4m cable with a loss of 1dB/m, the 'Antenna gain' would be entered
as 18 - 4 = 14. This value for true antenna gain is dynamically used to cal-
culate and emit the maximum permissible power with regards to other pa-
rameters such as country, data rate and frequency band.
D In contrast to this, the entry in the field 'Tx power reduction' causes a static
reduction in the power by the value entered, and ignores the other param-
eters. Also see Establishing outdoor wireless networks page 112.
Note: The transmission power reduction simply reduces the emitted power.
The reception sensitivity (reception antenna gain) remains unaffected.
This option is useful, for example, where large distances have to be
bridged by radio when using shorter cables. The reception antenna gain
can be increased without exceeding the legal limits on transmission pow-
er. This leads to an improvement in the maximum possible range and, in
particular, the highest possible data transfer rates.
BAT54-Rail/F..
Release 7.54 06/08 69
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Maximum distance
Large distances between transmitter and receiver give rise to increasing de-
lays for the data packets. If a certain limit is exceeded, the responses to
transmitted packets no longer arrive within an acceptable time limit. The en-
try for maximum distance increases the wait time for the responses. This dis-
tance is converted into a delay which is acceptable for wireless
communications.
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you will find the radio parameters under the fol-
lowing paths:
U Point-to-point connections
Access points are not limited to communications with mobile clients; they can
also transfer data from one access point to another. On the 'Point-to-Point'
tab for the physical interface settings, you can allow the additional exchange
of data with other access points. You can select from:
BAT54-Rail/F..
70 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
D Point-to-point 'Off': The access point only communicates with mobile cli-
ents
D Point-to-point 'On': The access point can communicate with other access
points and with mobile clients
D Point-to-point 'Exclusive': The access point only communicates with other
access points
The input fields are for the MAC addresses of the WLAN cards for the point-
to-point connections (up to 7).
Note: Please observe that only the MAC addresses of the WLAN cards at the
other end of the connections are to be entered here! Not the access
point's own MAC address, and not the MAC addresses from any other in-
terfaces that may be present in the access points.
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you can set the settings for the point-to-point
connections under the following paths:
U Client mode
If the BAT Wireless Router device is operating as a client, the tab 'Client
mode' can be used for further settings that affect the behavior as a client.
BAT54-Rail/F..
Release 7.54 06/08 71
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Network types
'Network types' controls whether the station can register only with infrastruc-
ture networks, or also with adhoc networks. Further information about these
network types can be found under The ad-hoc mode page 26 and The
infrastructure network page 26.
Create IBBS
If the station can establish an IBBS (Independent Basic Service Set), mean-
ing an adhoc network, then the station can connect to other WLAN clients.
For the connection of devices with a client station, this is mostly unwanted or
not required.
Keep client connection alive
This option ensures that the client station keeps the connection to the access
point alive even when the connected devices do not send any data packets.
If this option is switched off, the client station will automatically log off from
the wireless network if no packets are transferred over the WLAN connection
within a given time.
Scan bands
This defines whether the client station scans just the 2.4 GHz, just the 5 GHz,
or all of the available bands for access points.
Preferred BSS-ID
If the client station is only supposed to log in on a certain access point, you
can enter the MAC address of the WLAN card from the access point.
BAT54-Rail/F..
72 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Address Adaption
In client mode the client station usually replaces the MAC addresses con-
tained in the data packets of the connected devices with the own MAC ad-
dress. The access point on the other side of the connection therefore only
"sees" the MAC address of the client station, but not the MAC address of the
connected computer or computers.
MAC-address of
the client station
MAC-Adresse of
the computers
Without MAC Address-Adaption
MAC-Adresse of
the computer
With MAC Address-Adaption
Access Point Client station
Server
In some installations it is required, that the MAC address of the computer and
not of the client station is transmitted. With the option Address-Adaption the
replacement of the MAC address by the client stations is prevented and the
data packets are transmitted with the original MAC address.
Note: The address-adaption only works if only one computer is connected
to the client station.
BAT54-Rail/F..
Release 7.54 06/08 73
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
MAC address of
station 1
In this operating mode not the usual MAC addresses for instance in client
mode are used (in this example for server, access points and client stations),
but in conformity to point-to-point connections four addresses (the MAC ad-
dress of the station in LAN of the client station is additional). The fully trans-
parent connection of a LAN to the client station allows transmitting data
packets in the WLAN and therefore works like TFTP downloads, which are
triggered over a broadcast.
The Client-Bridge mode has following advantages compared to other meth-
ods:
D Compared to the "normal" client mode the address encryption (masquer-
ading) is not required.
D Compared to a point-to-point connection the entry of the MAC addresses
is not required. Additionally in the Client -Bridge mode more than six con-
nections (with P2P limited) can be established.
Note: The Client-Bridge mode can only be used between two BAT devices.
Applying the Client-Bridge mode must also be activated in the settings for
the logical network of the access point.
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you will find the settings for the client mode under
the following paths:
BAT54-Rail/F..
74 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
In WLAN client operation mode, the BAT Wireless Router can authenticate
to another access point using EAP/802.1X. To activate the EAP/802.1X au-
thentication in client mode, the client EAP method is selected as the encryp-
tion method for the first logical WLAN network.
BAT54-Rail/F..
Release 7.54 06/08 75
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Note: In addition to setting the client EAP method, also be sure to observe
the corresponding setting for the WLAN client operation mode!
The client EAP method setting has no function on logical WLAN networks
other than WLAN 1.
When selecting the frequency band (2.4 or 5 GHz), among other things, you
must determine the channels which may possibly be used for transmission.
From these possible channels, under automatic channel selection, a
Wireless Router selects a free channel, for example, in order to avoid inter-
ference with other radio signals.
In some countries, there are special regulations on the frequency bands and
channels which may be used for WLAN for indoor and outdoor operation. For
example, in France, not all available channels in the 2.4 GHz band may be
used in outdoor operation. In some countries the DFS procedure is required
for outdoor operation in the 5 GHz band in order to avoid interference from
radar systems.
With the option 'indoor-only' a BAT Wireless Router can be restricted exclu-
sively to operation in closed buildings. This restriction on the other hand al-
lows the channels to be managed more flexibly under automatic channel
selection.
BAT54-Rail/F..
76 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
5.25 GHz. At the same time, the DFS function is turned off and the
mandatory interruption after 24 hours is no longer in effect. This
restriction reduces the risk of interruption due to false radar detections.
D In the 2.4 GHz band in France, the channels 8 to 13 are also permitted,
although these channels are permitted solely for indoor operation.
Note: Activating the indoor-only function can only be relied upon if the coun-
try in which the access point is being operated has been set.
Caution: Activating the indoor-only function is only permitted when the
access point and all connected clients are located in a closed space.
BAT54-Rail/F..
Release 7.54 06/08 77
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
the number of flashes for each client. Select this operation mode when
you are operating the BAT Wireless Router in access point mode.
D Client signal strength: In this operation mode, this LED displays the
signal strength of the access point with which the BAT Wireless Router
has registered itself as a client. The faster the LED blinks, the better
the signal. Select this operation mode only if you are operating the BAT
Wireless Router in client mode.
D P2P1 to P2P6 signal strength: In this operation mode, the LED dis-
plays the signal strength of respective P2P partner with which the BAT
Wireless Router forms a P2P path. The faster the LED blinks, the bet-
ter the signal.
BAT54-Rail/F..
78 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
U Network settings
Enablingf
The switch 'WLAN network enabled' enables the logical WLAN to be
switched on or off separately.
Set the SSID
Define an unambiguous SSID (network name) for each of the logical wireless
networks on the 'Network' tab for the logical interfaces. Only network cards
that have the same SSID can register with this wireless network.
BAT54-Rail/F..
Release 7.54 06/08 79
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Note: The MAC filter list is always required in logical networks, in which cli-
ents log in with an individual passphrase over LEPS. The Passphrase
used with LEPS must also be enterd in the MAC filter list. For the log in
with an individual Passphrase the MAC filter list is always considered,
even if the option is deactivated at this place.
Maximum count of clients
Here you can specify the number of clients, that can connect to the access
point. Further clients are rejected.
Client-Bridge-Support
Enable this option for an access point, if you have enabled the client-bridge
support in the WLAN client mode for a client station.
Note: The client-bridge mode can only be used between two BAT devices.
Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet you can set the network settings for the logical
WLAN interface under the following paths:
U Transmission settings
Details for the data transfer over the logical interface are set on the 'Trans-
mission' tab.
BAT54-Rail/F..
80 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Packet size
Smaller data packets cause fewer transmission errors than larger packets,
although the proportion of header information in the traffic increases, leading
to a drop in the effective network load. Increase the factory value only if your
wireless network is largely free from interference and very few transmission
errors occur. Reduce the value to reduce the occurrence of transmission er-
rors.
Minimum and maximum transmit rate
The access point normally negotiates the data transmission speeds with the
connected WLAN clients continuously and dynamically. In doing this, the ac-
cess point adjusts the transmission speeds to the reception conditions. As an
alternative, you can set fixed values for the minimum and maximum trans-
mission speeds if you wish to prevent the dynamic speed adjustment.
Broadcast rate
The defined broadcast rate should allow the slowest clients to connect to the
WLAN even under poor reception conditions. A higher value should only be
set here if all clients are able to connect "faster".
RTS threshold
The RTS threshold prevents the occurrence of the "hidden station phenom-
enon.
Here, the three access points , , and are positioned such that no direct
wireless connection between the two outer devices is possible. If sends a
packet to , is not aware of this as it is outside of 's coverage area.
may also try, during the transmission from , to send a packet to as well,
because has no knowledge of the medium (in this case the wireless con-
nection) being blocked. A collision results and neither of the transmissions
from nor to will be successful. The RTS/CTS protocol is used to pre-
vent collisions.
BAT54-Rail/F..
Release 7.54 06/08 81
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
U Redirect function
Clients within wireless networks often have one main aspect in common: a
high degree of mobility. The clients are thus not always connected to the
same access point, but frequently change between access points and the re-
lated LANs.
BAT54-Rail/F..
82 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
The redirect function assist the applications being used by the WLAN clients
to find the correct target computer in the LAN automatically. If a WLAN cli-
ent's HTTP request from a certain logical wireless network should always be
directed to a certain server in the LAN, then a filter setting for the appropriate
protocol with the action "redirect" will be set up for the desired logical WLAN
interface.
10.0.0.99
All requests with this protocol from this logical wireless network will automat-
ically be redirected to the target server in the LAN. The returning data pack-
ets are sent to the senders' addresses and ports according to the entries in
the connection statistics, which ensures the trouble-free operation in both di-
rections. Further information to the configuration of the protocol filter can be
found Protocol filter page 55
U IEEE 802.1x/EAP
BAT54-Rail/F..
Release 7.54 06/08 83
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
Only with the VPN Option. Not available with all BAT devices.
With the help of the IPSec-over-WLAN technology in addition to the security
measures described already, a wireless network for the exchange of espe-
cially sensitive data can be optimally secured. To this end, the BAT Wireless
Router access point is upgraded to a VPN gateway with the VPN Option. In
addition to the encryption per 802.11i, WPA or WEP, the BAT Wireless
Router now offers the possibility of encrypting wireless connections with an
IPSec-based VPN.
BAT54-Rail/F..
84 Release 7.54 06/08
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
D Beacon period
This value defines the time interval in Ks between beacon transmission
(1 Ks corresponds to 1024 microseconds and is a measurement unit of
the 802.11 standard. 1 Ks is also known as a Timer Unit (TU)). Smaller
values result in a shorter beacon timeout period for the client and enable
quicker roaming in case of failure of an access point, but they also
increase the WLAN overhead.
D Default: 100
D DTIM period
This value defines the number of beacons which are collected before mul-
ticasts are broadcast. Higher values enable longer client sleep intervals,
but worsen the latency times.
D Default: 1
D Beacon order
Beacon order refers to the order in which beacons are sent to the various
WLAN networks. For example, if three logical WLAN networks are active
and the beacon period is 100 Ks, then the beacons will be sent to the
three WLANs every 100 Ks. Depending on the beacon order, the bea-
cons are transmitted at times as follows:
D Cyclic: In this mode the access point transmits the first beacon trans-
mission at 0 Ks to WLAN-1, followed by WLAN-2 and WLAN-3. For
the second beacon transmission (100 Ks) WLAN-2 is the first recipi-
ent, followed by WLAN-3 and then WLAN-1. For the third beacon
transmission (200 Ks) the order is WLAN-3, WLAN-1, WLAN-2.
Thereafter the order starts at the beginning again.
D Staggered: In this mode, the beacons are not sent together at a partic-
ular time, rather they are divided across the available beacon periods.
Beginning at 0 Ks, WLAN-1 only is sent; after 33.3 Ks WLAN-2, after
BAT54-Rail/F..
Release 7.54 06/08 85
Wireless LAN WLAN 3.4 Configuration of WLAN parameters
The transmission settings regulate variables such as the packet size for
WLAN communications and minimum and maximum transmission speeds.
Transmission properties can also be improved with the number of repetitions
for packet transmission:
D Hard retries
This value defines the number of times that the hardware should attempt
to send packets before a Tx error message is issued. Smaller values
mean that a packet which cannot be sent blocks the sender for less time.
D Default: 10
D Soft retries
If the hardware was unable to send a packet, the number of soft retries
defines how often the system repeats the attempt to transmit.
The total number of attempts is thus (soft retries + 1) * hard retries.
The advantage of using soft retries at the expense of hard retries is that
the rate-adaption algorithm immediately begins the next series of hard
retries with a lower datarate.
D Default: 0
BAT54-Rail/F..
86 Release 7.54 06/08
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
BAT54-Rail/F..
Release 7.54 06/08 87
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
D Action: Action performed for the data packets captured using this rule:
D Pass: The packet is forwarded on without change.
D Drop: The complete packet is dropped.
BAT54-Rail/F..
88 Release 7.54 06/08
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
Name DHCP Destina- Prot. IP IP net- Sub- Start End Inter- Action Redirect
source tion MAC address work: type port port face list IP
MAC: address. address
ARP irrele- 00000000 0806 0.0.0.0 0.0.0.0 0 0 0 WLAN- Pass 0.0.0.0
vant 0000 1-2
DHCP irrele- 00000000 0800 0.0.0.0 0.0.0.0 17 67 68 WLAN- Pass 0.0.0.0
vant 0000 1-2
TEL- irrele- 00000000 0800 0.0.0.0 0.0.0.0 6 23 23 WLAN- Redirect 192.168.1
NET vant 0000 1-2 1.5
ICMP irrele- 00000000 0800 0.0.0.0 0.0.0.0 1 0 0 WLAN- Pass 0.0.0.0
vant 0000 1-2
HTTP irrele- 00000000 0800 0.0.0.0 0.0.0.0 6 80 80 WLAN- Redirect 192.168.1
vant 0000 1-2 1.5
ARP, DHCP, ICMP are allowed to pass, Telnet and HTTP are redirected to
192.168.11.5 and all other packets are rejected.
BAT54-Rail/F..
Release 7.54 06/08 89
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
BAT54-Rail/F..
90 Release 7.54 06/08
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
Note: If rules are defined for an interface, but there is no match with one of
the rules for a packet from/for this interface, the default rule for this inter-
face is used for the packet. The default rule is pre-configured for each in-
terface with the 'drop' action but this is not visible in the protocol table. To
modify a default rule for an interface, a rule with the name 'default-drop' is
defined. Besides the interface naming, this rule can only contain wildcats
and the required action.
Checking of MAC addresses in packets sent over the respective inter-
face takes on a different form to that with in-coming packets.
V With out-going packets, the source MAC address read out of the pack-
et is checked against the destination MAC address entered in the rule.
V The destination MAC addresses read out of the packet are then
checked to see whether they are listed as currently active DHCP cli-
ents.
V Rules with the 'Redirect' action are ignored if they apply for an inter-
face over which the packet is to be sent. Please refer to section Redi-
rect function page 82 for further information.
V In the third step, the action associated with the applicable rule is carried
out.
With the Redirect action, IPv4 packets can not only be transferred and
dropped, they can also be communicated specifically to a particular destina-
tion. As a general rule, the destination IP address of the packet is replaced
by the Redirect IP address entered. The destination MAC address of the
packet is replaced by the MAC address determined by ARP and associated
with the Redirect IP address.
In order for the redirected packets to find the correct sender on their "return
trip", a dynamic table is compiled with automatic filter rules that apply to pack-
ets leaving via this interface. This table can be viewed under Status > LAN
Bridge > Connection table. Rules in this table have a higher priority than oth-
er matching rules with the 'Transfer' or 'Drop' actions.
BAT54-Rail/F..
Release 7.54 06/08 91
Wireless LAN WLAN 3.5 Extended WLAN protocol filters
U Example application
Clients within wireless networks often have one aspect in common: a high
degree of mobility. Consequently, clients are not necessarily always connect-
ed to the same access point, but frequently change between access points
and the related LANs.
The redirect function assists WLAN client applications to automatically find
the correct target computer in the LAN. If a WLAN client's HTTP request from
a particular logical wireless network is to be always directed to a particular
server in the LAN, a filter setting with the "Redirect" action is set up for the
appropriate protocol for the desired logical WLAN interface.
10.0.0.99
All requests with this protocol from this logical wireless network are automat-
ically redirected to the target server in the LAN. The returning data packets
are sent to the senders' addresses and ports according to the entries in the
connection statistics, ensuring trouble-free operation in both directions.
BAT54-Rail/F..
92 Release 7.54 06/08
Wireless LAN WLAN 3.6 Client mode
BAT54-Rail/F..
Release 7.54 06/08 93
Wireless LAN WLAN 3.6 Client mode
WLAN device in
client mode
WLAN device in
AP mode
Note: Multiple WLAN clients can register with a WLAN device in AP mode,
which is not the case for a WLAN device in client mode.
V The WLAN interface is enabled from the 'Operation' tab. In addition, the
WLAN operating mode is set to 'Station (client mode)'.
BAT54-Rail/F..
94 Release 7.54 06/08
Wireless LAN WLAN 3.6 Client mode
Note: A WLAN interface can only be set to one of the two operating modes.
Simultaneous operation of a WLAN interface as both access point and cli-
ent is not supported.
Many models can not be operated as an access point. In this case the
WLAN operating mode is permanently set to 'Client'.
Under WEBconfig or Telnet the setting for the operating mode of the physical
WLAN interface can be found under the following paths:
U Client settings
For BAT Wireless Routers in client mode, further settings/client behavior can
be configured from the 'Client mode' tab under the settings for the physical
interfaces.
V To edit the settings for client mode in LANconfig, go to the 'Client mode'
tab under the physical WLAN settings for the desired WLAN interface.
V In 'Scan bands', define whether the client station scans just the 2.4 GHz,
just the 5 GHz, or all of the available bands to locate an access point.
BAT54-Rail/F..
Release 7.54 06/08 95
Wireless LAN WLAN 3.6 Client mode
Under WEBconfig or Telnet the settings for client mode can be found
under the following paths:
U Radio settings
For the WLAN client to connect to an access point, it needs to use suitable
frequency bands/channels.
V To edit the radio settings in LANconfig, go to the 'Radio' tab under the
physical WLAN settings for the desired WLAN interface.
V Set the frequency band, the channels and the 2.4 GHz/5 GHz mode to
match the settings of the access point.
Note: Selection of the frequency band and channels is not necessary on
some models, such as those devices which support only one frequency
band.
Under WEBconfig or Telnet the settings for client mode can be found
under the following paths:
In the WLAN clients, the SSIDs of the networks to which the client stations
are to connect must be entered.
V To enter the SSIDs, change to the 'General' tab under LANconfig in the
'Wireless LAN' configuration area. In the 'Interfaces' section, select the
first WLAN interface from the list of logical WLAN settings.
BAT54-Rail/F..
96 Release 7.54 06/08
Wireless LAN WLAN 3.6 Client mode
V Enable the WLAN network and enter the SSID of the network the client
station should log onto.
Under WEBconfig or Telnet the network settings for the logical WLAN
interfaces can be found under the following paths:
U Encryption settings
For access to a WLAN, the appropriate encryption methods and key must be
set in the client station.
V To enter the key, change to the '802.11i/WEP' tab under LANconfig in the
'Wireless LAN' configuration area. From 'WPA / private WEP settings', se-
lect the first WLAN interface from the list of logical WLAN settings.
BAT54-Rail/F..
Release 7.54 06/08 97
Wireless LAN WLAN 3.6 Client mode
V Enable encryption and match the encryption method to the settings for the
access point.
V In WLAN client operating mode, the BAT device can authenticate itself to
another access point using EAP/802.1X. For this, select the desired client
EAP method here. Note that the selected client EAP method must match
the settings of the access point that the BAT Wireless Router is attempt-
ing to log onto.
Under WEBconfig or Telnet the network settings for the logical WLAN
interfaces can be found under the following paths:
BAT54-Rail/F..
98 Release 7.54 06/08
Wireless LAN WLAN 3.6 Client mode
Under normal circumstances the WLAN client would only log onto another
access point if the connection to the access point used up to that point was
lost completely (hard roaming). Soft roaming on the other hand enables the
client to use scan information to roam to the strongest access point. With the
background scanning function, the BAT device in client mode can gather in-
formation on other available access points prior to the connection being lost.
In this case the client is not switched to another access point once the exist-
ing connection has been lost completely, but rather when another access
point within its range has a stronger signal.
V To enable soft roaming, change to Setup > Interfaces > WLAN > Roaming
in WEBconfig or Telnet and select the physical WLAN interface.
V Enable soft roaming and, if required, set the other parameters (such as
threshold levels and signal level). Please refer to the reference handbook
for further information on these parameters.
V To configure background scanning in LANconfig, go to the 'Radio' tab un-
der the physical WLAN settings for the desired WLAN interface.
V Enter the background scan interval as the time in which the BAT device
cyclically searches the currently unused frequencies of the active band for
available access points. To achieve fast roaming, the scan time is restrict-
ed to e.g. a minimum of 260 seconds (2.4 GHz) or 720 seconds (5 GHz).
BAT54-Rail/F..
Release 7.54 06/08 99
Wireless LAN WLAN 3.6 Client mode
Under WEBconfig or Telnet the network settings for the logical WLAN
interfaces can be found under the following paths:
D Soft roaming
This option enables a client to use scan information to roam to the stron-
gest access point (soft roaming). Roaming due to connection loss (hard
roaming) is unaffected by this. The roaming threshold values only take
effect when soft roaming is activated.
D Beacon miss threshold
This defines how many access-point beacons can be missed before an
associated client starts searching again.
Higher values will delay the recognition of an interrupted connection, so a
longer time period will pass before the connection is re-established.
The smaller the value set here, the sooner a potential interruption to the
connection will be recognized; the client can start searching for an alter-
native access point sooner.
D Default: 4
Note: Values which are too small may cause the client to detect lost connec-
tions more often than necessary.
D Roaming threshold
This value is the percentage difference in signal strength between access
points above which the client will switch to the stronger access point.
D Default: 15
BAT54-Rail/F..
100 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Note: Other contexts require the value of signal strengths in dB. The follow-
ing conversion applies:
64dB - 100%
32dB - 50%
0dB - 0%
D No roaming threshold
This threshold refers to the field strength in percent. Field strengths
exceeding the value set here are considered to be so good that no switch-
ing to another access point will take place.
D Default: 45
D Forced roaming threshold
This threshold refers to the field strength in percent. Field strengths below
the value set here are considered to be so poor that a switch to another
access point is required.
D Default: 12
D Connect threshold
This value defines field strength in percent defining the minimum that an
access point has to show for a client to attempt to associate with it.
D Default: 0
D Connect hold threshold
This threshold defines field strength in percent. A connection to an access
point with field strength below this value is considered as lost.
D Default: 0
BAT54-Rail/F..
Release 7.54 06/08 101
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
BAT54-Rail/F..
102 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Note: The 'Point-to-point' entry is only visible in the LANmonitor if the moni-
tored device has at least one base station defined as a remote station for
a P2P connection (LANconfig: Wireless LAN General Physical
WLAN settings Point-to-Point).
In the dialog for setting up point-to-point connections, LANmonitor prompts
for the information required to establish the P2P connection:
D Is the P2P connection configured at both ends (remote base station de-
fined with MAC address or station name)?
D Is the point-to-point mode of operation activated?
D Which access point is to be monitored? All of the base stations defined as
P2P remote stations in the device concerned can be selected here.
D Are both antennas approximately aligned? The basic P2P connection has
to be working before fine-tuning can be performed with the aid of
LANmonitor.
Once signal monitoring has commenced, the P2P dialog displays the abso-
lute values for the current signal strength and the maximum value since start-
ing the measurement. The development of the signal strength over time and
the maximum value are displayed in a diagram, too.
BAT54-Rail/F..
Release 7.54 06/08 103
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Initially only one of the two antennas should be adjusted until a maximum val-
ue is achieved. This first antenna is then fixed and the second antenna is
then adjusted to attain the best signal quality.
3.7.2 Configuration
In the configuration of point-to-point connections, entries have to be made for
the point-to-point operation mode, the channel selection scheme and the
MAC addresses of the remote sites.
Configuration with LANconfig
For configuration with LANconfig you will find the settings for P2P connec-
tions under the configuration area 'Interfaces' on the 'Wireless LAN' tab.
Note: The configuration of the P2P connections can also be carried out with
the WLAN Wizards in LANconfig.
V Click on the button Physical WLAN settings to open the corresponding
WLAN interface and select the tab for 'Point-to-Point'.
V Activate the suitable point-to-point operation mode here and set the chan-
nel selection scheme to either 'Master' or 'Slave'. If the peers of the P2P
connections are to be identified via their station names, then enter a
unique name for this WLAN station.
V Close the physical WLAN settings and open the list of Point-to-point
partners. For each of the maximum of six P2P connections, enter either
the MAC address of the WLAN card at the remote station or enter the
WLAN station's name (depending on the chosen method of identification).
BAT54-Rail/F..
104 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Danger: Please observe that only the MAC addresses of the WLAN cards at
the other end of the connections are to be entered here! Not the access
point's own MAC address, and not the MAC addresses from any other in-
terfaces that may be present in the access points.
You will find the WLAN MAC address on a sticker located under each of the
antenna connectors. Only use the string that is marked as the "WLAN MAC"
or "MAC-ID". The other addresses that may be found are not the WLAN MAC
address but the LAN MAC address.
Alternatively you will find the MAC addresses for the WLAN cards in the de-
vices under WEBconfig, Telnet or a terminal program under the following
paths:
BAT54-Rail/F..
Release 7.54 06/08 105
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
BAT54-Rail/F..
106 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Note: The use of relay stations each equipped with two WLAN modules si-
multaneously solves the problem of the "hidden station", by which the
MAC addresses of the WLAN clients are not transferred over multiple sta-
tions.
BAT54-Rail/F..
Release 7.54 06/08 107
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Terminal/Telnet /Setup/Interfaces/WLAN-Interfaces/Encryption-Settings
BAT54-Rail/F..
108 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
BAT54-Rail/F..
Release 7.54 06/08 109
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Antennas do not broadcast their signals linearly, but within an angle that de-
pends on the model in question. The spherical expansion of the signal waves
results in amplification of or interference to the effective power output at cer-
tain intervals of the connection between the transmitter and receiver. The ar-
eas where the waves amplify or cancel themselves out are known as Fresnel
zones.
Fresnel zone 2
Distance d
Fresnel zone 1
ANTENNA ANTENNA
The Fresnel zone 1 must remain free from obstruction in order to ensure that
the maximum level of output from the transmitting antenna reaches the re-
ceiving antenna. Any obstructing element protruding into this zone will sig-
nificantly impair the effective signal power. The object not only screens off a
portion of the Fresnel zone, but the resulting reflections also lead to a signif-
icant reduction in signal reception.
The radius (R) of Fresnel zone 1 is calculated with the following formula as-
suming that the signal wavelength () and the distance between transmitter
and receiver (d) are known.
R = 0.5 * ( * d)
The wavelength in the 2.4 GHz band is approx. 0.125 m, in the 5 GHz band
approx. 0.05 m.
Example: With a separating distance of 4 km between the two antennae, the
radius of Fresnel zone 1 in the 2.4-GHz band is 11 m, in the 5-GHz band 7 m.
To ensure that the Fresnel zone 1 remains unobstructed, the height of the an-
tennas must exceed that of the highest obstruction by this radius. The full
height of the antenna mast (M) should be as depicted:
BAT54-Rail/F..
110 Release 7.54 06/08
Wireless LAN WLAN 3.7 IEEE 802.11i for point-to-point connections
Fresnel zone 1
Radius R
ANTENNA ANTENNA
Safety: 1m
Obstruction height H
OBSTRUCTION
ADMINISTRATION WLAN Router WLAN Router PRODUCTION
Earth's curvature E
M = R + 1m + H + E (earth's curvature)
The allowance for the curvature of the earth (E) can be calculated at a dis-
tance (d) as E = d * 0.0147 i.e. at a distance of 8 km this is almost 1m
Example: With a distance of 8 km between the antennae, the result in the
2.4-GHz band is a mast height above the level of the highest obstruction of
approx. 13 m, in the 5-GHz band 9 m.
U Antenna power
The power of the antennas must be high enough to ensure acceptable data
transfer rates. On the other hand, the country-specific legal regulations re-
garding maximum transmission power should not be exceeded.
The calculation of effective power considers everything from the radio mod-
ule in the transmitting access point to the radio module in the receiving ac-
cess point. In between there are attenuating elements such as the cable, plug
connections or simply the air transmitting the signals and amplifying ele-
ments such as the external antennas.
BAT54-Rail/F..
Release 7.54 06/08 111
Wireless LAN WLAN 3.8 Establishing outdoor wireless networks
ANTENNA ANTENNA
SA-5L SA-5L
BAT54-Rail/F..
112 Release 7.54 06/08
Wireless LAN WLAN 3.8 Establishing outdoor wireless networks
Fresnel zone 3
Fresnel zone 2
d
Distance
Fresnel zone 1
Radius R
BAT54-Rail/F..
Release 7.54 06/08 113
Wireless LAN WLAN 3.8 Establishing outdoor wireless networks
Fresnel zone 1
Radius R
Safety margin: 1m
Obstruction height H
Earth's curvature E
M = R + 1m + H + E (Earth's curvature)
The height of the Earth's curvature (E) is calculated from the distance (d) E
= d * 0,0147 even at a distance of 8 km that results in almost 1m!
Example: With a distance of 8 km between the antennae, the result in the
2.4-GHz band is a mast height above the level of the highest obstruction of
approx. 13 m, in the 5-GHz band 9 m.
BAT54-Rail/F..
114 Release 7.54 06/08
Wireless LAN WLAN 3.8 Establishing outdoor wireless networks
V The calculation of the power over the path begins at the transmitters's ra-
dio module. The radio module in the BAT access points in 802.11a mode
emits the following power levels depending on the channel used and the
data transmission rate:
Mbps 5.150 - 5.250 GHz 5.250 -5.350 GHz 5.470 -5.725 GHz 5.725 -5.850 GHz
6 17 17 17 17
9 17 17 17 17
12 17 17 17 17
18 17 17 17 17
24 17 17 17 17
36 14 14 14 14
48 13 13 13 13
54 12 12 12 12
72 (Turbo) 14 14 14 14
96 (Turbo) 13 13 13 13
108 (Turbo) 12 12 12 12
BAT54-Rail/F..
Release 7.54 06/08 115
Wireless LAN WLAN 3.8 Establishing outdoor wireless networks
Note: This values are the result of a calculation that includes a 'safety margin'
of 10dB. As every radio path is unique, these values can only serve as a
rough guide.
BAT54-Rail/F..
116 Release 7.54 06/08
Wireless LAN WLAN 3.9 Bandwidth limits in the WLAN
BAT54-Rail/F..
Release 7.54 06/08 117
Wireless LAN WLAN 3.9 Bandwidth limits in the WLAN
Note: The significance of the Rx and Tx values depends on the device's op-
erating mode. In this case, as an access point, Rx stands for "Send data"
and Tx stands for "Receive data".
Configuration with LANconfig
The maximum bandwidths for the connected clients are entered in LANconfig
in the MAC access list in the 'WLAN Security' configuration area on the 'Sta-
tions' tab page.
BAT54-Rail/F..
118 Release 7.54 06/08
Wireless LAN WLAN 3.10 WLAN according to 802.11h
3.10.1 Standards
U IEEE standards
In November 2002, the 5 GHz band was released for private use in Germany,
and opened up the path for significantly faster WLAN connections according
to the IEEE 802.11a standard, which had already been available for a while.
The wider use of 5 GHz WLANs was, however, restricted by its exclusive use
in closed spaces and the relatively low transmission power.
BAT54-Rail/F..
Release 7.54 06/08 119
Wireless LAN WLAN 3.10 WLAN according to 802.11h
With the 802.11h enhancement in September 2003, the private use of the
5 GHz band was finally possible even outside closed spaces. To protect mil-
itary applications in the 5 GHz band, the DFS (Dynamic Frequency Selec-
tion) and TPC (Transmission Power Control) procedures were prescribed.
Moreover, the use of DFS and TPC can achieve significantly higher transmis-
sion powers (maximum 1000 mW) than the other standards that were previ-
ously valid.
U ETSI standards
ETSI adopted the first standard for controlling remote data transfers back in
1996 under the name of Hiperlan (High Performance Radio Local Area Net-
works). The first version (Hiperlan Type 1) was intended for use in the fre-
quency range of 5.15 to 5.30 GHz with a transmission rate of 20 MBit/s. As
no manufacturers took up this standard, Hiperlan initially had no practical sig-
nificance.
With the new version, Hiperlan Type 2, in 2000, ETSI introduced a WLAN so-
lution that operates in the 5 GHz band similarly to IEEE 802.11a, and also
provides a gross data rate of 54 MBps. However, as the frequencies and the
OFMD modulation method that was also used for 802.11a overlapped, it was
necessary to adapt the standards between IEEE and ETSI to avoid disrup-
tions to the systems.
U European harmonization
To standardize the use of the 5 GHz band in Europe, the European Commis-
sion issued the ETSI 301 893 standard on July 11, 2005. The member states
of the EU are obliged to implement this by October 31, 2005.
Instead of the three sub-bands described in the 802.11a/h standards (5150 -
5350 MHz, 5470 - 5725 MHz and 5725 - 5875 MHz for the UK), the
ETSI 301 893 standard regulates the three following areas with different
specifications:
D 5150 -5250 MHz
D 5250 -5350 MHz
D 5470 - 5725 MHz
The guidelines focus on preventive measures for avoiding disruptions to oth-
er systems that use the same frequency band. This includes radar equipment
that counts as "primary applications". The "secondary applications" such as
WLAN have to change the frequency as soon as a conflict is detected.
D Dynamic Frequency Selection DFS
BAT54-Rail/F..
120 Release 7.54 06/08
Wireless LAN WLAN 3.10 WLAN according to 802.11h
BAT54-Rail/F..
Release 7.54 06/08 121
Wireless LAN WLAN 3.10 WLAN according to 802.11h
The USA and Asia use different frequency bands and different maximum sig-
nal strengths to the European standard.
In the USA, three sub-bands, each 100 MHz wide, are used for wireless net-
works in the 5 GHz band. The "lower band" ranges from 5150 - 5250 MHz,
the "middle band" ranges from 5250 - 5350 MHz and the "upper band" rang-
es from 5725 - 5825 MHz. In the lower band, a maximum average EIRP of
50 mW is permitted; in the middle band this is 250 mW and 1 W in the upper
band.
In Japan, the use of the 5 GHz band is possible to a limited extent: only the
lower band of 5150 - 5250 MHz is released for private use.
BAT54-Rail/F..
122 Release 7.54 06/08
Wireless LAN WLAN 3.10 WLAN according to 802.11h
Note: Other regulations may apply to use in other countries. Please refer to
the current wireless network regulations for the country in which you want
to operate a wireless LAN device, and make sure you configure the coun-
try in which you are operating the device in the WLAN settings.
BAT54-Rail/F..
Release 7.54 06/08 123
Wireless LAN WLAN 3.10 WLAN according to 802.11h
BAT54-Rail/F..
124 Release 7.54 06/08
Configuration and management 4.1 Configuration tools and approaches
This section will show you the methods and ways you can use to access the
device and specify further settings. You will find descriptions on the following
topics:
D Configuration tools
D Monitoring and diagnosis functions of the device and software
D Backup and restoration of entire configurations
D Installation of new firmware in the device
BAT54-Rail/F..
Release 7.54 06/08 125
Configuration and management 4.2 Configuration software
On the other hand, whether or not you will need additional hardware and soft-
ware: The inband configuration requires one of the computers already avail-
able in the LAN or WAN, as well as only one suitable software, such as
LANconfig or WEBconfig (see following section). In addition to the configura-
tion software, the outband configuration also requires a the computers with a
serial port. The preconditions are most extensive for ISDN remote configura-
tion: In addition to an ISDN capable BAT, an ISDN card is needed in the con-
figuration PC or alternatively, access via LANCAPI to an additional BAT that
is ISDN capable.
Configuration LAN, WAN, Config Interface ISDN remote Analog dail-in (with BAT Modem
software WLAN (Outband) configuration Adapter Kit)
(Inband)
LANconfig Yes Yes Yes Yes
WEBconfig Yes No Yes Yes
SNMP Yes No Yes Yes
BAT54-Rail/F..
126 Release 7.54 06/08
Configuration and management 4.3 Searching and configuring devices
Configuration LAN, WAN, Config Interface ISDN remote Analog dail-in (with BAT Modem
software WLAN (Outband) configuration Adapter Kit)
(Inband)
Terminal pro- No Yes No No
gram
Telnet Yes No No No
TFTP Yes No Yes Yes
Note: Please note that all procedures access the same configuration data.
For example, if you change the settings in LANconfig, this will also have
a direct effect on the values under WEBconfig and Telnet.
Please observe the following hints when using a terminal program over the
serial interface:
V The models BAT54-F and BAT54-F X2 feature a reduced serial inter-
face (Rx, TX, ground only), hence the hardware handshake has to be
deactivated.
V The BAT54-Rail featurees a fully-fledged serial interface which sup-
ports the hardware handshake of the terminal program.
BAT54-Rail/F..
Release 7.54 06/08 127
Configuration and management 4.4 Configuration using different tools
ISDN
4.4.1 LANconfig
Start LANconfig by, for example, using the Windows Start menu: Start
Programme Hirschmann BAT Hirschmann LANconfig. LANconfig
will now automatically search for devices on the local network. It will automat-
ically launch the setup wizard if a device which has not yet been configured
is found on the local area network LANconfig.
Note: If the firewall is activated the LANconfig might not be able to find the
new device in the LAN. In this occasion deactivate the firewill whilst the
configuration.
Your BAT device is equipped with an extensive firewall and protects
your computer even if no further firewall is active.
BAT54-Rail/F..
128 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
Click on the Find button or call up the command with Device Find to initiate
a search for a new device manually. LANconfig will then prompt for a location
to search. You will only need to specify the local area network if using the in-
band solution, and then you're off.
Once LANconfig has finished its search, it displays a list of all the devices it
has found, together with their names and, perhaps a description, the IP ad-
dress and its status
Two different display options can be selected for configuring the devices with
LANconfig:
D The 'Simple configuration display' mode only shows the settings required
under normal circumstances.
D The 'Complete configuration display' mode shows all available configura-
tion options. Some of them should only be modified by experienced users.
Select the display mode in the View Options menu.
BAT54-Rail/F..
Release 7.54 06/08 129
Configuration and management 4.4 Configuration using different tools
Double-clicking the entry for the highlighted device and then clicking the
Configure button or the Device Configure option reads the device's cur-
rent settings and displays the 'General' configuration selection.
LANconfig supports multi device remote management. Simply select the de-
sired devices, and LANconfig performs all actions for all selected devices
then, one after the other. The only requirement: The devices must be of the
same type.
In order to support an easy management, the devices can be grouped togeth-
er. Therefore, ensure to enable Folder Tree in the View menu, and group
the devices by drag an drop into the desired folders.
Note: LANconfig shows only those parameters that are suitable for multi de-
vice configuration when more than one device is selected, e.g. MAC Ac-
cess Control Lists for all BAT Wireless Access Points.
BAT54-Rail/F..
130 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
4.4.2 WEBconfig
You can use any web browser, even text-based, for basic setup of the device.
The WEBconfig configuration application is integrated in the BAT. All you
need is a web browser in order to access WEBconfig.
WEBconfig offers setup wizards similar to LANconfig and has all you need
for easy configuration of the BATcontrary to LANconfig but under all oper-
ating systems for which a web browser exists.
A LAN or WAN connection via TCP/IP must be established to use
WEBconfig. WEBconfig is accessed by any web browser via the IP address
of the BAT, via the name of the device (if previously assigned), or via any
name if the device has not been configured yet.
http://<IP address or device name>
For the usage of WEBconfig the PC must be connected to the LAN or WAN
over TCP/IP. WEBconfig runs with the help of a web browser and accesses
the device either with the IP address of the BAT, with the name of the device
(if already assigned) or with a any desired name, in case the device has not
been configured yet.
The reaction of Routers and Access Points, as well as their accessibility for
configuration via web browser is dependent on whether a DHCP server and
a DNS server are already active in the LAN, and whether these two server
processes exchange the assignment of IP addresses to symbolic names
within the LAN between each other.
BAT54-Rail/F..
Release 7.54 06/08 131
Configuration and management 4.4 Configuration using different tools
After powered on, unconfigured BAT devices check first, whether a DHCP
server is already active in the LAN. Dependent on the situation, the device is
able to switch on its own DHCP server or, alternatively, to activate its DHCP
client mode. In this second operating mode, the device itself can obtain an IP
address from a DHCP server already existing in the LAN.
If the configuration PC does not obtain its IP address from the BAT DHCP
server, figure out the current IP address of this PC (with Start Execute
cmd and command ipconfig at the prompt under Windows 2000 or Windows
XP, with Start Execute cmd and the command winipcfg at the prompt
under Windows Me and Windows 9x, or with the command ifconfig on the
console under Linux). In this case, the BAT is reachable under the IP address
x.x.x.254 ( x stands for the first three blocks in the IP address of the config-
uration PC).
BAT54-Rail/F..
132 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
Note: The MAC address can be found on a label at the bottom of the device.
D If there is no DNS server in the LAN, or it is not linked to the DHCP server,
then the device can not be reached by the name. The following options
remain in this case:
D Figure out the DHCP-assigned IP address of the BAT by suitable tools
and contact the device directly with this IP address.
D Use LANconfig.
D Connect a PC with a terminal program via the serial configuration in-
terface to the device.
4.4.3 Telnet
U Launching Telnet
Start configuration using Telnet, e.g. from the Windows command line with
the command:
C:\>telnet 10.0.0.1
Telnet will then establish a connection with the device using the IP address.
After entering the password (if you have set one to protect the configuration),
all configuration commands are available.
Note: Linux and Unix also provide Telnet over SSL encoded connections.
Depending on your distribution you might have to replace your version
with one that provides SSL. The encoded Telnet connection is started
with the command
C:\>telnet -z ssl 10.0.0.1 telnets
BAT54-Rail/F..
Release 7.54 06/08 133
Configuration and management 4.4 Configuration using different tools
The terminal can be set to English and German modes. The display language
of your BAT is set to English at the factory. In the remaining documentation,
all configuration commands will be provided in English. To change the dis-
play language to German, use the following commands:
U Terminating Telnet
To terminate the configuration using Telnet, e.g. from the Windows com-
mand line with the command:
C:\>exit
Navigating the command line can be accomplished by DOS and UNIX style
commands as follows:
Note: For executing some commands Supervisor rights are required.
Command Description
beginscript Begins script mode. In this state following entered commands are not directly
transmitted into the configuration RAM of the BAT, but into the script memory of
the device (BAT Scripting page 181).
cd [path] Change the current directory. Certain abbreviations exists, e.g. cd ../.. can be
abbreviated to cd ... etc.
del [name] Delete the table entry with the index <name>
BAT54-Rail/F..
134 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
Command Description
default [-r] [path] Resets single parameters, tables or hole indexes. Shows PATH on the directory of
the index, the option -r (recursive) must be entered.
dir [path] Display the contents of a directory.
list[path] The detached parameter -a additionally to the contents of the request shows the
ls [path] SNMP-ID. Thereby the output begins with the SNMP ID of the device, followed
ll [path] by the SNMP ID of the present menu. In front of the single entries you can then
find the SNMP IDs of the subitems.
do [path] [parameters] Execute the action [path] in the current directory. Additional parameters can be
entered.
echo <ARG>... Display argument on the console
exit/quit/x Close the console session
feature <code> Unlock the feature with the specified feature code
flash Yes/No The changes of the configuration with the commands in the command line are
written directly into the boot resistent Flash memory of the devices (flash yes). If
the update of the configuration is inhibited by the Flash (flash no), the changes
are only saved in the RAM and are deleted when booting (flash Yes/No
page 193).
history Shows a list of the previously executed commands. With the command !# the
command of the list with the number (#) is directly executed: For instance !3
specifies the third command of the list.
killscript Deletes the not yet processed contents of a script session. The script session is
specified by its name Scripting page 181
loadconfig Load the configuration via TFTP client into the device
loadfirmware Load firmware via TFTP client into the device
loadscript Load script via TFTP client into the device
passwd Change the passwords
passwd -n new [old] Change Password (without prompt)
ping [IP address] Issues an ICMP echo request to the specified IP address
readconfig Display the complete configuration of the device in readconfig syntax
readmib Display SNMP Management Information Base
readscript [-n] [-d] [-c] [- Display all commands and parameters, which are important for the configuration
m] [path] of the BAT in present state (Scripting page 181).
repeat [VALUE] <com- repeats command every VALUE seconds until terminated by new input
mand>
sleep [-u] Value[suffix] Delays processing the configuration commands for a certain time or terminates
them at a certain time. As a suffix s, m, or h for seconds, minutes or hours, without
suffix the command works in milliseconds. With the option switch -u the sleep
command time of the form MM/DD/YYYY hh:mm:ss (english) or the form DD.MM.YYYY
hh:mm:ss (german) is used. The date as parameters is only accepted if the sys-
tem time is set.
stop stop ping
set [path] <value(s)> Set a configuration item to the specified value. If the item is a table entry, multiple
values must be given (one for each table column). A * as a value indicates that
the column in question should be left at its previous value.
set [path] Show which values are allowed for a configuration item. If [path] is empty, this is
displayed for each item in the current directory.
setenv <NAME> Set environment variable
<VALUE>
unsetenv <NAME> Remove environment variable
getenv <NAME> Read out environment variable (no newline)
BAT54-Rail/F..
Release 7.54 06/08 135
Configuration and management 4.4 Configuration using different tools
Command Description
printenv Dump environment variable
show <options> Shows internal data. Run show ? for a list of available items, e.g. boot history,
firewall filter rules, vpn rules and memory usage
sysinfo Shows basic system information
testmail Sends an e-Mail. Parameter see 'testmail ?'
time Set time (DD.MM.YYYY hh:mm:ss)
trace [] Configures the trace output system for several modules, see How to start a
trace page 225
who List active sessions
writeconfig Accept a new configuration in readconfig syntax. All subsequent lines are inter-
preted as configuration values until two blank lines in a row are encountered
writeflash Load new firmware via TFTP
!! Repeat previous command
!<num> Repeat command <num>
!<prefix> Repeat last command beginning with <prefix>
#<blank> Comment
D PATH:
D Qualifier for a menu or parameter separated by / or \
D .. stands for upper level
D . stands for current level
D VALUE:
D Possible input
D "" stands for an empty input
D NAME:
D Sequence of _ 0..9 A..Z
D first character must not be numeric
D case does not matter
D All commands and directory/item names may be abbreviated as long as
no ambiguity exists. For example, it is valid to shorten the sysinfo
command to sys or a cd Management to c ma. Not allowed would
be cd /s, since that could mean either cd /Setup or cd /Status.
D Names with blanks in them must be enclosed in double quotes.
D Additionally, there is a command-specific help function available by call-
ing functions with a question mark as the argument, i.e. entering ping
? displays the options for the built-in PING command.
D A complete listing of available commands for a particular device is avail-
able by entering ? from the command line.
BAT54-Rail/F..
136 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
4.4.4 TFTP
Certain functions cannot be run at all, or not satisfactorily, with Telnet. These
include all functions in which entire files are transferred, for example the up-
loading of firmware or the saving and restoration of configuration data. In this
case TFTP is used.
TFTP is available by default under the Windows 2000 and Windows NT op-
erating systems. It permits the simple transfer of files with other devices
across the network.
The syntax of the TFTP call is dependent on the operating system. With Win-
dows 2000 and Windows NT the syntax is:
tftp -i <IP address Host> [get|put] source [target]
Note: With numerous TFTP clients the ASCII format is preset. Therefore, for
the transfer of binary data (e.g. firmware) the binary transfer must usually
be explicitly selected.This example for Windows 2000 and Windows NT
shows you how to achieve this by using the '-i' parameter.
If the device is password protected, username and password needs to be in-
serted into the TFTP command. The file name is either made up of the mas-
ter password and the command to be executed, or of the combined user
name and password separated by a colon, plus with the command as a suf-
fix. Thus a command sent by TFTP resembles the following:
D <Master password><Command> or
D <User name>:<Password>@<Command>
Futher information concerning TFTP commands and user rights can be
foung in Rights for the administrators page 150 and Access with TFTP
page 152.
BAT54-Rail/F..
Release 7.54 06/08 137
Configuration and management 4.4 Configuration using different tools
4.4.5 SNMP
The Simple Network Management Protocol (SNMP V.1 as specified in RFC
1157) allows monitoring and configuration of the devices on a network from
a single central instance.
There are a number of configuration and management programs that run via
SNMP. Commercial examples are Tivoli, OpenView from Hewlett-Packard,
SunNet Manager and CiscoWorks. In addition, numerous programs also ex-
ist as freeware and shareware.
Your BAT can export a so-called device MIB file (Management Information
Base) for use in SNMP programs.
BAT54-Rail/F..
138 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
Alternatively, you can use LANconfig under Tools Options Extras to en-
ter your SSH client as an "external program; then start the SSH access with
a right-mouseclick on the device and open WEBconfig/Console session
Open SSH session.
BAT54-Rail/F..
Release 7.54 06/08 139
Configuration and management 4.4 Configuration using different tools
The configuration is carried out with the same commands as used under Tel-
net or other terminal program (Command line reference page 134).
The pairs consisting of public and private keys can be generated with the
help of OpenSource software OpenSSH, for example. The following com-
mand from a Linux operating system creates a key pair from the public part
'id_rsa.pub' and the private part 'id_rsa':
ssh-keygen -t rsa
BAT54-Rail/F..
140 Release 7.54 06/08
Configuration and management 4.4 Configuration using different tools
The private part of the key must be installed on the SSH client. Refer to the
documentation for information on the steps required for your SSH client.
The public key(s) can be uploaded to the BAT Router using WEBconfig. For
this, select the entry Upload certificate or file on the WEBconfig start page.
In the following dialog, select the type of key ('SSH RSA key' or 'SSH DSA
key'), select the file and enter the password if required. Entering the Upload
command initiates the transfer to BAT.
The authentication methods permitted for SSH access can be set separately
for LAN, WAN and WLAN.
D Methods
D All: Allows authentication using password and digital certificate.
D Password: Allows authentication with a password.
D Public key: Only allows authentication with a digital certificate.
When establishing the SSH connection, the client first asks the BAT Router
which authentication methods are permitted for this connection. If the public
key method is allowed, the client searches for private keys that have been
installed and transfers these with the user name to the BAT Router. When
the BAT Router finds an entry in the list that includes the user name that cor-
BAT54-Rail/F..
Release 7.54 06/08 141
Configuration and management 4.5 Working with configuration files
responds to its public SSH key, the SSH connection is permitted. If the client
does not have a suitable private key installed or if the BAT Router does not
have a corresponding entry with the user name or public key, the SSH client
can revert to authentication with user name/password as long as this au-
thentication method is permitted.
With this function you can create backup copies of the configuration of your
BAT.
However, even when you are faced with the task of configuring several BAT
of the same type, you will come to appreciate the function for saving and re-
storing configurations. In this case you can save a great deal of work by first
importing identical parameters as a basic configuration and then only making
individual settings to the separate devices.
BAT54-Rail/F..
142 Release 7.54 06/08
Configuration and management4.6 New firmware with Hirschmann FirmSafe
U Running function
BAT54-Rail/F..
Release 7.54 06/08 143
Configuration and management4.6 New firmware with Hirschmann FirmSafe
D In contrast to the first option, the device will wait for the adjusted firm-
safe timeout (using WEBconfig in the menu Expert Configuration
Firmware Timeout-firmsafe, using Telnet adjust with 'Firmware/
Timeout-firmsafe') until it is logged on over Telnet, a terminal program
or WEBconfig. Only if this login attempt is successful does the new
firmware remain active permanently.
D If the device no longer responds or it is impossible to log in, it automat-
ically loads the previous firmware version and reboots the device with
it.
D 'Manual': With the third option you can define a time period during which
you want to test the new firmware yourself. The device will start with the
new firmware and wait for the preset period until the loaded firmware is
manually activated and therefore becomes permanently effective. Acti-
vate the new firmware using LANconfig with Device Firmware Man-
agement Activate Firmware running in Test Mode, using Telnet
under 'firmware/firmsafe table' with the command 'set # active' (# is the
position of the firmware in the firmsafe table). Using WEBconfig you can
find the firmsafe table under Expert Configuration Firmware.
The modus for the firmware upload can be adjusted using WEBconfig in the
menu Expert Configuration Firmware Mode-firmsafe, using Telnet
under 'firmware/timeout firmsafe'. Using LANconfig select the modus when
selecting the new firmware file.
Note: LIt is only possible to upload a second firmware, if the device has
enough memory for two firmware versions. Current firmware versions (in
occasion with additional software options) may use up more than half of
the available memory. In this case the configuration software notifies a
conflict and recommends the use of the converter.
This converter can be downloaded free of charge from the Hirschmann
website. With the converter the memory in the BAT is divided into a
larger area for the new firmware version and a smaller area for the exist-
ing version.
While uploading the new firmware a minimal version of the previous firm-
ware is loaded into the smaller memory area. This version is used as a
safety copy with the following restrictions:
D The minimal version of the firmware only partly provides the LCOS
functions to restore the previous state or to load another firmware. In-
ternet access is possible with this version.
D A BAT with an active minimal firmware can only be addressed over the
LAN, the WLAN or the outband interface. The remote configuration is
not possible, not even over ISDN.
BAT54-Rail/F..
144 Release 7.54 06/08
Configuration and management4.6 New firmware with Hirschmann FirmSafe
All settings will remain unchanged by a firmware upload. All the same you
should save the configuration first for safety's sake (with Device Configu-
ration Management Save to File if using LANconfig, for example). Before
uploading you should also save a version of the current firmware. If you do
not have the firmware as a file, you can download it from www.hir-
schmann.com.
If the newly installed release contains parameters which are not present in
the device's current firmware, the device will add the missing values using
the default settings.
U LANconfig
When using LANconfig, highlight the desired device in the selection list and
click on Device Firmware Upload, or click directly on the Firmware Up-
load button. Then select the directory in which the new version is located and
mark the corresponding file.
LANconfig then tells you the version number and the date of the firmware in
the description and offers to upload the file. The firmware you already have
installed will be replaced by the selected release by clicking Open.
You also have to decide whether the firmware should be permanently acti-
vated immediately after loading or set a testing period during which you will
activate the firmware yourself. To activate the firmware during the set test pe-
riod, click on Edit Firmware Management . After upload, start the new
firmware in test mode.
BAT54-Rail/F..
Release 7.54 06/08 145
Configuration and management4.6 New firmware with Hirschmann FirmSafe
U WEBconfig
Start WEBconfig in your web browser. On the starting page, follow the Per-
form a Firmware Upload link. In the next window you can browse the folder
system to find the firmware file and click Start Upload to start the installation.
If using a terminal program, you should first select the 'set mode-firmsafe'
command on the 'Firmware' menu and select the mode in which you want the
new firmware to be loaded (immediately, login or manually). If desired, you
can also set the time period of the firmware test under 'set Timeout-firmsafe'.
Select the 'do Firmware-upload' command to prepare the router to receive
the upload. Now begin the upload procedure from your terminal program:
D If you are using Telix, click on the Upload button, specify 'XModem' for
the transfer and select the desired file for the upload.
D If you are using Hyperterminal, click on Transfer Send File, select the
file, specify 'XModem' as the protocol and start the transfer with OK.
Note: The firmware upload over a terminal program is only possible over a
serial configuration interface.
Please observe the following hints when using a terminal program over the
serial interface:
V The models BAT54-F and BAT54-F X2 feature a reduced serial inter-
face (Rx, TX, ground only), hence the hardware handshake has to be
deactivated.
V The BAT54-Rail featurees a fully-fledged serial interface which sup-
ports the hardware handshake of the terminal program.
BAT54-Rail/F..
146 Release 7.54 06/08
Configuration and management4.6 New firmware with Hirschmann FirmSafe
U TFTP
TFTP can be used to install new firmware on BAT. This can be done with the
command (or target) writeflash. For example, to install new firmware in a
BAT with the IP address 10.0.0.1, enter the following command under Win-
dows 2000 or Windows NT:
tftp -i 10.0.0.1 put Lc_16xxu.282 writeflash
The serial interface can also be used to load firmware into the device. Enter-
ing the serial number instead of the configuration password results in the de-
vice configuration being reset to its ex-factory settings. In this way you can
re-open the device in the case that the configuration password is lost and the
reset button has been set to 'Ignore' or 'Boot only'.
V Use the serial configuration cable to connect the device to a computer.
V On the computer, start a terminal program such as Hyperterminal.
V Open a connection with the settings 115200bps, 8n1, hardware hand-
shake (RTS/CTS).
V In the terminal program's welcome screen, press the Return key until the
request to enter the password appears.
V Enter the serial number that is displayed under the firmware version and
press Return again.
Please observe the following hints when using a terminal program over the
serial interface:
V The models BAT54-F and BAT54-F X2 feature a reduced serial inter-
face (Rx, TX, ground only), hence the hardware handshake has to be
deactivated.
V The BAT54-Rail featurees a fully-fledged serial interface which sup-
ports the hardware handshake of the terminal program.
BAT54-Rail/F..
Release 7.54 06/08 147
Configuration and management 4.7 How to reset the device?
Note: After applying the reset, the device will start fresh with factory defaults.
All settings will be lost. Therefore, you should save the current configura-
tion if possible before the reset!
BAT54-Rail/F..
148 Release 7.54 06/08
Configuration and management 4.7 How to reset the device?
Note: Please notice that also the WLAN encryption settings of the device will
get lost in case of a reset and the standard WEP key comes into effect
again. The wireless configuration of a device with WLAN interface will
only succeed after a reset, if the standard WEP key is programmed into
the WLAN adapter!
The reset button offers two basic functionsboot (restart) and reset (to the
factory settings)which are called by pressing the button for different
lengths of time.
Some devices simply cannot be installed under lock and key. There is con-
sequently a risk that the configuration will be deleted by someone pressing
the reset button too long. With the suitable setting, the behavior of the reset
button can be controlled accordingly.
D Reset button
This option controls the behavior of the reset button when it is pressed:
D Ignore: The button is ignored.
Note: Please observe the following notice: The settings 'Ignore' or 'Boot
only' makes it impossible to reset the configuration to the factory settings
using the reset button. If the password is lost for a device with this setting,
there is no way to access the configuration! In this case the serial commu-
nications interface can be used to upload a new firmware version to the
device-this resets the device to its factory settings, which results in the de-
letion of the former configuration. Instructions on firmware uploads via the
serial configuration interface are available here ( page 147).
D Boot only: A press of the button prompts a restart, regardless of how
long the it is held down.
D Reset-or-boot (standard setting): Press the button briefly to restart the
device. Pressing the button for 5 seconds or longer restarts the device
and resets the configuration to its factory settings. All LEDs on the
device light up continuously. Once the switch is released the device
will restart with the restored factory settings.
Caution: This hard reset causes the device to start with the default facto-
ry settings; all previous settings are lost!
Caution: Note that resetting the device leads to a loss on the WLAN en-
cryption settings within the device and that the default WEP key is active
again.
BAT54-Rail/F..
Release 7.54 06/08 149
Configuration and management 4.8 Managing administrators rights
U Administrator groups
BAT54-Rail/F..
150 Release 7.54 06/08
Configuration and management 4.8 Managing administrators rights
D Local administrator with read and write access: Also has full access to the
configuration, although the following options are prohibited:
D Upload firmware onto the device
D Upload configuration onto the device
D Configuration with LANconfig
Note: Local administrators with write access can also edit the admin table.
However, a local administrator can only change or create entries for users
with the same or less rights than himself. It follows that a local administra-
tor cannot create a supervisor access and assign himself those rights.
D Local administrator with read access: Can read the configuration with Tel-
net or a terminal program, but cannot change any values. The administra-
tors can be assigned certain configuration options via their function rights.
D None: Cannot read the configuration. The administrators can be assigned
certain configuration options via their function rights.
U Function rights
A user with supervisor rights can login to LANconfig by entering his user data
into the Password field of the login window in the combination <User-
name>:<Password>.
BAT54-Rail/F..
Release 7.54 06/08 151
Configuration and management 4.8 Managing administrators rights
In TFTP, the user name and password are coded in the source (TFTP read
request) or target file names (TFTP write request). The file name is either
made up of the master password and the command to be executed, or of the
combined user name and password separated by a colon, plus with the com-
mand as a suffix. Thus a command sent by TFTP resembles the following:
D <Master password><Command> or
D <Username>:<Password>@<Command>
Examples (the BAT has the address mybat.intern, the master password is
'RootPwd' and a user has been set up named 'LocalAdmin' with the pass-
word 'Admin'):
D Read the configuration from the device (supervisor only)
tftp mybat.intern GET RootPwdreadconfig mybat.lcf
D Write the configuration to the device (supervisor only)
tftp mybat.intern PUT mybat.lcf RootPwdwriteconfig
D Read out the device MIB (for the local administrator)
tftp mybat.intern GET localadmin:Adminreadmib
mybat.lcf mybat.mib
For the menus and available commands, the same limitations on rights apply
as with Telnet.
For the administration of networks with the help of SNMP tools such as HP
OpenView, the various levels of administrator access can be used for the
precise control of rights.
Under SNMP, user name and password are coded in the "community". Here,
the 'public' community can be selected or one of either the master password
or a combination of user name and password divided by a colon can be se-
lected.
Note: The community 'public' corresponds with the rights of a local adminis-
trator with read-only access, as long as the SNMP read access without
password is enabled (Password protection for SNMP read-only access.
page 175). If this access is not allowed, then the 'public' community will
have access to no menus at all.
Otherwise, the same limitations on rights apply for the menus as with Telnet.
BAT54-Rail/F..
152 Release 7.54 06/08
Configuration and management 4.8 Managing administrators rights
BAT54-Rail/F..
Release 7.54 06/08 153
Configuration and management 4.8 Managing administrators rights
Description Rights
Supervisor Supervisor member of all groups
Admin-RW Local administrator with read and write access
Admin-RO Local administrator with read access but no write access
None No access to the configuration
Value Rights
0x00000001 The user can run the Basic Configuration Wizard
0x00000002 The user can run the Security Wizard
0x00000004 The user can run the Internet Wizard
0x00000008 The user can run the Wizard for selecting Internet providers
0x00000010 The user can run the RAS Wizard
0x00000020 The user can run the LAN-LAN Coupling Wizard
0x00000040 The user can set the date and time (also applies for Telnet and TFTP)
0x00000080 The user can search for additional devices
0x00000100 The user can run the WLAN Link test (also applies for Telnet)
0x00000200 The user can run the a/b Wizard
The entry results from the sum of the first, second and third columns from the
right. If, for example, the user is to receive rights to use the "Security Wizard",
"Selection of Internet provider", "RAS Wizard", "Change time" and "WLAN
Link Test", then the resulting values are as follows:
D First column from the right: 2 (Security Wizard) + 8 (Selection of Internet
Provider) = "a" (hexadecimal)
D Second column from the right: 1 (RAS Wizard) + 4 (Change Time) = "5"
(hexadecimal)
D Third column from the right: 1 (WLAN-Linktest) = "1" (hexadecimal)
For this example, the function rights are entered with the value "0000015a".
BAT54-Rail/F..
154 Release 7.54 06/08
Configuration and management 4.8 Managing administrators rights
Description Value
Security Wizard 0x00000002
Selection of Internet provider 0x00000008
RAS Wizard 0x00000010
Change time 0x00000040
WLAN Link Test 0x00000100
Disjunction 0x0000015a
U Examples:
The following command sets up a new user in the table who, as local admin-
istrator "Smith" with the password "BW46zG29", can select the Internet pro-
vider. The user will be activated immediately:
set Smith BW46zG29 yes Admin-RW 00000008
The following command extends the function rights such that user "Smith"
can also run the WLAN link test (the asterisks stand for the values which are
not to be changed):
set Smith * * * 00000108
BAT54-Rail/F..
Release 7.54 06/08 155
Configuration and management 4.8 Managing administrators rights
The following parameters are available for configuring HTTP tunnel in BAT:
BAT54-Rail/F..
156 Release 7.54 06/08
Configuration and management 4.8 Managing administrators rights
BAT54-Rail/F..
Release 7.54 06/08 157
Configuration and management 4.8 Managing administrators rights
V Select a port for the HTTP tunnel and, if applicable, enter the routing tag
of the IP network in which the device is located and confirm your entries
with Create.
V The dialog that follows displays a confirmation of the newly created tunnel
and provides a link to the device.
The newly created HTTP tunnel is deleted automatically if the tunnel remains
inactive for the duration of the tunnel idle timeout. To delete the tunnel earlier,
click on Expert Configuration Status TCP-IP HTTP to access the list
of active tunnels and delete the one you no longer require.
Note: Although active TCP connections in this tunnel are not terminated im-
mediately, no new connections can be established.
BAT54-Rail/F..
158 Release 7.54 06/08
Configuration and management 4.9 Named loopback addresses
D Name
A freely definable name for the loopback address.
D Values: Maximum 16 characters.
D Loopback address
Loopback address for the device
D Routing tag
Routing tag of the loopback address. Loopback addresses with the rout-
ing tag '0' (untagged) are visible to all networks. Loopback addresses with
a different routing tag are only visible to networks with the same routing
tag.
D Values: 0 to 65,535
D 0: Untagged
D Default: 0
BAT54-Rail/F..
Release 7.54 06/08 159
Configuration and management 4.9 Named loopback addresses
D Peer
Name of the remote station which is to be checked with this entry.
D IP address 1 - 4
IP addresses for targeting with ICMP requests to check the remote site.
BAT54-Rail/F..
160 Release 7.54 06/08
Configuration and management 4.9 Named loopback addresses
Note: If no IP address is entered for a remote site that can be checked with
a ping, then the IP address of the DNS server that was determined during
the PPP negotiation will be checked instead.
D Ping interval
The time entered into the polling table defines the time interval between
ping requests. If the value "0" is entered, then the standard value of 30
seconds applies.
D Values: 0 to 65,535
D 0: Use default
D Default: 30 seconds
D Retries
If no reply to a ping is received then the remote site will be checked in
shorter intervals. The device then tries to reach the remote site once a
second. The number of retries defines how many times these attempts
are repeated. If the value "0" is entered, then the standard value of 5
retries applies.
D Values: 0 to 255
D 0: Use default
D Default: 5 retries
D Loopback address
Sender address sent with the ping; this is also the destination for the
answering ping. The following can be entered as the loopback address:
D Name of a defined IP network.
D 'INT' for the IP address in the first network with the setting 'Intranet'.
D 'DMZ' for the IP address in the first network with the setting 'DMZ'.
Note: If the list of IP networks or loopback addresses contains an entry
named 'DMZ' then the associated IP address will be used.
D Name of a loopback address.
D Any other IP address.
BAT54-Rail/F..
Release 7.54 06/08 161
Configuration and management 4.9 Named loopback addresses
D Name or address
Name or IP address of the NTP server. The BAT Router attempts to reach
the servers in the order that they are entered.
D Maximum 5 entries.
D Loopback address
Sender address sent with the NTP request; this is also the destination for
the NTP answer. The following can be entered as the loopback address:
D Name of a defined IP network.
D 'INT' for the IP address in the first network with the setting 'Intranet'.
D 'DMZ' for the IP address in the first network with the setting 'DMZ'.
Note: If the list of IP networks or loopback addresses contains an entry
named 'DMZ' then the associated IP address will be used.
D Name of a loopback address.
D Any other IP address.
BAT54-Rail/F..
162 Release 7.54 06/08
Configuration and management 4.9 Named loopback addresses
D IP address
IP address of the SYSLOG client.
D Loopback address
Sender address entered into the SYSLOG message. No answer is
expected to a SYSLOG message. The following can be entered as the
loopback address:
D Name of a defined IP network.
D 'INT' for the IP address in the first network with the setting 'Intranet'.
D 'DMZ' for the IP address in the first network with the setting 'DMZ'.
Note: If the list of IP networks or loopback addresses contains an entry
named 'DMZ' then the associated IP address will be used.
D Name of a loopback address.
D Any other IP address.
D Source
D System: System messages (boot events, timer system, etc.)
D Logins: Messages concerning the user's login or logout during the
PPP negotiation, and any errors that occur during this.
D System time: Messages about changes to the system time
D Console logins: Messages about console logins (Telnet, Outband,
etc.), logouts and any errors that occurred during this.
BAT54-Rail/F..
Release 7.54 06/08 163
Configuration and management 4.9 Named loopback addresses
BAT54-Rail/F..
164 Release 7.54 06/08
LANtools network management
BAT54-Rail/F..
Release 7.54 06/08 165
LANtools network management 5.1 Switch UI language
BAT54-Rail/F..
166 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
Release 7.54 06/08 167
LANtools network management 5.2 Project management with LANconfig
D Open Telnet session: Opens up multiple DOS windows and sets up a Tel-
net connection to each device
D Monitor device: Starts LANmonitor for the surveillance of the selected de-
vices
D Set date/time: Sets the same time on all selected devices.
Note: When setting the time, please observe the functions of the BAT as
NTP client and NTP server (Time server for the local net page 486).
D Delete: Deletes the selected devices from the LANconfig list.
BAT54-Rail/F..
168 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
Release 7.54 06/08 169
LANtools network management 5.2 Project management with LANconfig
Note: If this option is activated in parallel with the 'Use configuration file' op-
tion, then the file selected here will be used when the program starts and
changes made to the program settings are stored to it.
D Use configuration file
The activates the usage of the lanconf.ini from the given directory.
With this option activated, changes to the program settings are saved to
the ini file selected here.
D Possible values: On/off and selection of the settings file
D Default: Off
Note: The file you select must be a valid LANconfig settings file.
Caution: If neither of the two options is activated, the ini file from the pro-
gram directory will be used instead.
BAT54-Rail/F..
170 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
Note: The directory structure in the left margin of the LANconfig window can
be switched on and off with the F6 function key or by using the menu View
Folder Tree.
5.2.3 Multithreading
The management of larger projects can be aided by simultaneously opening
up configuration windows for multiple devices to compare similarities and dif-
ferences. LANconfig allows multiple configuration dialogs to be opened at the
same time ("multithreading"). After opening the configuration for a device,
simply open up further configurations from the device list in LANconfig. All of
the configurations can be processed in parallel.
BAT54-Rail/F..
Release 7.54 06/08 171
LANtools network management 5.2 Project management with LANconfig
Note: "Cut and paste" can be used to transfer content between the configu-
ration windows via the Windows clipboard.
Multithreading allows changes to both the internal configurations of the avail-
able devices and to the configuration files. Each configuration is written sep-
arately to the file and to the device when the dialog is closed.
BAT54-Rail/F..
172 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
Release 7.54 06/08 173
LANtools network management 5.2 Project management with LANconfig
The directory where LANconfig is to search for the updates is set under
Tools Options Extras. It is also possible to set up LANconfig to search
the firmware archive and to check if any of the devices found require an up-
date. With this option activated, starting LANconfig automatically displays all
of the devices for which new updates are available.
To search manually for firmware updates, click with the right-hand mouse
key on a device marked in the list and select the following point from the con-
text menu: Firmware management Check for firmware update. If you
wish to update several devices simultaneously, the entry Check for firm-
ware updates is displayed directly in the context menu.
BAT54-Rail/F..
174 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
If your search in the archive did not reveal a new firmware version, you can
alternatively view a full list of all of the firmware files that have been found.
You can, for example, switch back to an older version. LANconfig displays all
versions found for the marked devices, including the version currently active
in each device. For each device, you can select precisely one firmware ver-
sion that will then be uploaded onto the device.
BAT54-Rail/F..
Release 7.54 06/08 175
LANtools network management 5.2 Project management with LANconfig
LANmonitor
User information can be entered in LANmonitor separately for each device.
To do this, click with the right-hand mouse key on the required device, select
the Options point from the context menu and enter your user data.
BAT54-Rail/F..
176 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
Release 7.54 06/08 177
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
178 Release 7.54 06/08
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
Release 7.54 06/08 179
LANtools network management 5.2 Project management with LANconfig
BAT54-Rail/F..
180 Release 7.54 06/08
LANtools network management 5.3 Scripting
5.3 Scripting
Installations with multiple BAT devices often profit from the automatic execu-
tion of certain configuration tasks. The scripting function in BAT enables en-
tire sets of commands for device configuration to be stored in a single file
a scriptfor transfer to one or more devices in one step.
5.3.1 Applications
Scripting provides users with a powerful tool for the centralized configuration
of BAT devices, and thus a wide range of potential applications:
D Read-out device configurations in a form that is easy to read and save
The configuration files generated by LANconfig are not intended for pro-
cessing with other tools; users will only get an overview of the complete
configuration from a print-out of the configuration file. The scripting func-
tions can output the configuration as ASCII text to be saved as a text file.
D Edit the configuration with a simple text editor
If offline configuration with LANconfig is not possible or not desired, a
configuration file generated by scripting can be edited with a text editor
and then uploaded to the device again.
D Edit sections of the configuration
Instead of the entire configuration, smaller sections of it can be read out
from a device instead (e.g. just the firewall settings). Just as with com-
plete configurations, sections can be edited and transferred to one or
more devices. This allows the particular settings in a device to be
uploaded to other models or devices with a different version of the firm-
ware.
D Automized configuration updates
The centralized storage of configuration scripts in combination with
scheduled LCOS commands (cron jobs) can be used to keep vital sec-
tions of the configuration in multiple devices up to date, e.g. the encryp-
tion settings for a WLAN.
D Convenient roll-out for larger installations
The installation of multiple devices at different locations can be very eas-
ily controlled from a central location. Even employees without administra-
tor rights can then set up the devices with a single command.
D Storage of configuration to volatile memory only
Scripting commands can store configuration changes in RAM only,
whereby storage of configuration information to the non-volatile flash
memory is prevented. This ensures that the configuration is available
only until the next system boot, so that in case of theft, for example, sen-
sitive elements of the configuration cannot fall into the wrong hands.
BAT54-Rail/F..
Release 7.54 06/08 181
LANtools network management 5.3 Scripting
BAT54-Rail/F..
182 Release 7.54 06/08
LANtools network management 5.3 Scripting
Configuration for
operating the
BAT
Configuration in Configuration in
Script commands in RAM (deleted flash (not deleted
EXIT Flash ON
the script memory upon booting) upon booting)
script memory
"Normal" configuration
via console, LANconfig
Beginscript or WEBconfig
D In Flash No mode the data are written to RAM only and are thus available
only until the next boot.
D During the boot process, the device reads the configuration data from
the flash memory.
D The configuration in the RAM can be written to the flash memory at any
time with the command "Flash Yes".
While operating, BAT devices work with the information stored in the RAM
configuration. The script commands stored in the intermediate memory are,
just like the configuration in the flash memory, of no relevance to the real-time
operations of a BAT.
BAT54-Rail/F..
Release 7.54 06/08 183
LANtools network management 5.3 Scripting
The configuration commands can be read out directly from the command-line
interface via TFTP.
V To do this, open up a DOS box, for example.
V Enter the following command at the prompt:
C:\>tftp IP address get "PASSWORDreadscript path" script.lcs
D IP address is the address of the device containing the configuration
commands you wish to read out.
D PASSWORD is the appropriate password for the device.
D Path defines the branch of the configuration menu tree that is to be
read out. If no path is entered then the entire configuration will be read
out.
D script.lcs is the name of the script file in the current directory where the
commands will be written to.
Note: Please be aware that device passwords will be clearly visible as plain
text while entering this command!
U Via Hyperterminal
BAT54-Rail/F..
184 Release 7.54 06/08
LANtools network management 5.3 Scripting
V Select the menu item Transfer Capture Text and select the desired
storage location and file name for the script.
Please observe the following hints when using a terminal program over the
serial interface:
V The models BAT54-F and BAT54-F X2 feature a reduced serial inter-
face (Rx, TX, ground only), hence the hardware handshake has to be
deactivated.
V The BAT54-Rail featurees a fully-fledged serial interface which sup-
ports the hardware handshake of the terminal program.
Installations with multiple BAT devices often profit from the automatic execu-
tion of certain configuration tasks. The scripting function in BAT enables en-
tire sets of commands for device configuration to be stored in a single file
a scriptfor transfer to one or more devices in one step.
BAT54-Rail/F..
Release 7.54 06/08 185
LANtools network management 5.3 Scripting
Note: Detailed information about scripting can be found under the section
'scripting' in the chapter on Network Management with LANtools in the
user manual configuration.
In addition to manually setting a script and console read-outs, script files can
also be read out from a device with the help of LANconfig. For this, right click
on the corresponding entry in the device list and select the entry Configura-
tion management Save script to file from the context menu. Select the
following options here:
D Numeric sections
Enable this option if you do not want the configuration sections in the
script to be displayed in cleartext (e.g. /setup/wlan/ppp), but numerically
(/2/2/5).
D Default parameters
Unless defined otherwise, the only parameters saved in a script are those
that deviate from the default values. Enable this option if the standard val-
ues should also be entered into the script.
D Column names
Unless defined otherwise, the fields of a table are initially entered as col-
umn names in the scripts and, thereafter, only the respective values are
inserted into the rows. Enable this option when every value in the table
should explicitly receive the description of the column in which it is
inserted.
D Comments
Activate this option when additional comments should be included in the
script file.
D Compact formatting
D Enable this option if spaces and tabs should be suppressed.
D Download only selected sections
Without further entries, the entire device configuration will always be
saved in the script. In contrast, entering the sections also makes it possi-
ble to save partial configurations. Enter the sections to which the script
should be transferred into this field, e.g. /setup/wlan.
BAT54-Rail/F..
186 Release 7.54 06/08
LANtools network management 5.3 Scripting
In a console session, a script can be uploaded to the device via the Clip-
board:
V Open your script with any text editor and transfer the configuration com-
mands to the Clipboard.
V Log on to the console with Supervisor rights.
V Start the script mode with the command beginscript.
V Paste the commands from the Clipboard following the script prompt
(script>). In Telnet, for example, with a right mouse-click on the upper
frame of the window.
V Entering the command exit executes of the configuration commands.
Note: If the command exit is already included in the commands after past-
ing, the execution of the configuration will be carried out automatically im-
mediately after pasting!
BAT54-Rail/F..
Release 7.54 06/08 187
LANtools network management 5.3 Scripting
During a console session (e.g. via Telnet or SSH), TFTP commands can be
used to upload script files to the device directly from a TFTP server.
V Log on to the console with Supervisor rights.
V Enter the following command at the prompt:
>loadscript -s IP address -f script.lcs
D IP address is the address of the TFCTP server where the script file is
stored.
D script.lcs is the name of the script file on the TFTP server
LANconfig has the option to upload a script either to a single device or to mul-
tiple devices simultaneously.
V Click on a device with the right mouse key and use the context menu to
select the
entry Configuration Management Apply Script. If multiple devices
are marked, the entry Apply Script appears directly in the context menu.
V In the following dialog, select the required script file (*.lcs) for upload.
Note: The upload of the script starts automatically. Status and error messag-
es are either displayed directly by LANconfig or the can be viewed in a
console session with the command show script.
BAT54-Rail/F..
188 Release 7.54 06/08
LANtools network management 5.3 Scripting
Following the successful completion of the transfer, the script is started au-
tomatically.
Please observe the following hints when using a terminal program over the
serial interface:
V The models BAT54-F and BAT54-F X2 feature a reduced serial inter-
face (Rx, TX, ground only), hence the hardware handshake has to be
deactivated.
V The BAT54-Rail featurees a fully-fledged serial interface which sup-
ports the hardware handshake of the terminal program.
BAT54-Rail/F..
Release 7.54 06/08 189
LANtools network management 5.3 Scripting
BAT54-Rail/F..
190 Release 7.54 06/08
LANtools network management 5.3 Scripting
Example: For a BAT that is set up only for Internet-by-call via ISDN, the
command readscript will produce the following console output (assuming
that there are no further restrictions):
BAT54-Rail/F..
Release 7.54 06/08 191
LANtools network management 5.3 Scripting
This script can be used to program other BATs with exactly the same
configuration as the original device.
As these scripts can be very long in some cases, it is possible to gener-
ate scripts that focus only on parts of the configuration. To do this, you
first change to the directory with the configuration that is to be recorded
(e.g. cd set/ip-router/firewall for the firewall settings) and then exe-
cute the readscript command. Alternatively, enter the path directly with
the readscript command as a path parameter (e.g. readscript set/ip-
router/firewall). In both cases, only the firewall settings that have been
changed will be recorded in the script.
The following options can be used with the readscript command:
D -d (default): The commands for modifying parameters that are set to
the factory settings will be listed as well. These long scripts are useful
for transferring configurations between different types of devices or
between devices with different firmware versions as the factory set-
tings can vary.
D -n (numeric): This suffix causes the paths to be output in the numeric
form of the SNMP description instead of plain text. This also facilitates
the transfer of scripts between devices with different firmware versions
as the path names may change but the SNMP tree generally does not.
D -c (comment): In combination with -d and -n, this parameter generates
additional comments which make the script easier to read. For the pa-
rameter -d, every command combination that sets a default value is
marked with # default value. With -n, each numeric path is supple-
mented with its plain text equivalent.
D -m (minimize): This parameter removes any gaps in the script, so
making it more compact.
D #
The # character followed by a space at the start of a line are the first
characters of a comment. Subsequent characters to the end of the line
will be ignored.
Note: The space after the # is obligatory.
D del *
This command deletes the table in the branch of the menu tree defined
with Path.
Syntax: del [PATH]*
D default
This command enables individual parameters, tables or entire menu
trees to be reset to their factory settings.
Syntax: default [-r] [PATH]
BAT54-Rail/F..
192 Release 7.54 06/08
LANtools network management 5.3 Scripting
D beginscript
The command beginscript switches a console session into script mode.
In this state, commands entered are not transferred directly to the BAT's
configuration RAM but initially to the device's script memory. The com-
mands will only be transferred to and started in the configuration RAM
via a script session by executing the command exit.
Note: Supervisor rights are necessary to execute this command.
D show script
The command show script displays the content of the most recently exe-
cuted script and an overview of the currently running scripts. The names
displayed in this output can be used to interruption scripts early (kill-
script page 193).
D killscript
The command killscript deletes the content of a script session that has
not yet been executed. The script session is selected by its name (show
script page 193).
Note: Supervisor rights are necessary to execute this command.
D flash Yes/No
BAT54-Rail/F..
Release 7.54 06/08 193
LANtools network management 5.3 Scripting
When configuring a device with scripts, any add-, set- or del- command
can lead to an (unintentional) update of the configuration in flash; to pre-
vent this, the update to flash function can be deactivated. After conclud-
ing the configuration, this function can be activated again with flash Yes.
Changes in the RAM configuration are then written to flash. The status
flash Yes/No is stored globally.
D sleep
The sleep command allows the processing of configuration commands to
be delayed for a certain time period or to be scheduled for a certain time.
Syntax: sleep [-u] value[suffix]
Permissible suffixes are s, m, or h for seconds, minutes, or hours; if no
suffix is defined, the units are milliseconds.
With the option switch -u, the sleep command accepts times in the for-
mat MM/DD/YYYY hh:mm:ss (English) or in the format TT.MM.JJJJ hh:mm:ss
(German).
Note: Times will only be accepted if the system time has been set.
BAT54-Rail/F..
194 Release 7.54 06/08
LANtools network management 5.3 Scripting
V Mark your BAT Access Point in the selection window in LANconfig. From
the command line, select Extras Setup Wizard.
V In the selection menu, select the Setup Wizard, Configure WLAN inter-
face and confirm the selection with Continue.
V Make the settings as requested by the wizard and as described as fol-
lows.
U Country settings
Regulations for the operation of WLAN cards differ from country to country.
The use of some radio channels is prohibited in certain countries. To operate
the BAT Access Points while observing the regulations in various countries,
all physical WLAN interfaces can be set up for the country where they are op-
erated.
BAT54-Rail/F..
Release 7.54 06/08 195
LANtools network management 5.4 Group configuration with LANconfig
Along with the radio channels, the physical WLAN settings can also be used
to activate options such as the bundeling of WLAN packets (TX Burst), hard-
ware compression, or the use of QoS compliant with 802.11e. You also con-
trol the settings for the diversity behavior here.
Each WLAN module can support up to eight logical WLAN networks for mo-
bile WLAN clients to register with. The following parameters have to be set
when configuring a logical WLAN network:
D The network name (SSID)
D Open or closed radio LAN
D Encryption settings
D MAC filter
D Client-bridge operation
D Filter settings
U Point-to-point settings
The configuration of P2P connections involves setting not only the operating
mode but also the station name that the Access Point can connect to. Also,
the role as "Master" or "Slave" is set here.
Along with the settings for the Access Point itself, also to be defined is the
remote site that the Access Point can contact via the P2P connection.
For further information please refer to section Point-to-point connections.
BAT54-Rail/F..
196 Release 7.54 06/08
LANtools network management 5.4 Group configuration with LANconfig
The partial configuration files with the common parameters for a group of
BAT devices are, just like the full configuration files, stored on hard disk or on
a server. To aid the configuration of entire groups of devices, links to the par-
tial configuration files are created under LANconfig to provide a convenient
connection between the device entries in LANconfig and these partial config-
uration files.
Note: Group configuration is supported only by BAT devices with a firmware
version LCOS 5.00 or higher.
LCOS version 5.00 initially support the group configuration of WLAN
devices. Later firmware versions will also support further types of
group configuration, such as the VPN parameters. Refer to the BAT
web site www.hirschmann.com for more information about the latest
firmware versions and the additional possibilities of group configura-
tion.
V Create a new folder and move the devices that are to be grouped into it
with the mouse.
V Then click on the folder with the right-hand mouse key and select the en-
try New group configuration... from the context menu. After selecting
the group type and the firmware version, the LANconfig configuration di-
alogue opens up with a reduced selection of configuration options.
BAT54-Rail/F..
Release 7.54 06/08 197
LANtools network management 5.4 Group configuration with LANconfig
V The parameters here should be set as required for the entire group. When
the configuration dialogue is closed, LANconfig will request that you save
the partial configuration file to a location of your choice.
Note: The group configuration then saves all parameters to a partial config-
uration file. Those parameters which were not changed are also set to the
standard values. Use the scripting function (Scripting page 181) to
read out non-standard settings from a device and transfer them to other
devices, if required.
V The link to the partial configuration file appears in the list of entries and
has the description 'Group Configuration'. The name of the group config-
uration can be changed via the Properties. To do this, click on the entry
with the right-hand mouse key and select Properties from the context
menu.
Note: The group configuration is a link to the partial configuration file. Please
note that changes to the partial configuration file will lead to changes in
that group configuration.
BAT54-Rail/F..
198 Release 7.54 06/08
LANtools network management 5.4 Group configuration with LANconfig
There are cases where it is more effective to use a different folder structure
in LANconfig than that required for group configuration. Devices in location-
specific folders can indeed be set up with the same group configurations. To
avoid having to create the same partial configuration for every folder, links to
a common partial configuration file can be created in multiple folders.
V To use an existing partial configuration file for a group configuration, click
on the appropriate folder with the right-hand mouse key and select Add
group configuration... from the context menu.
V In the subsequent dialog, select the existing partial configuration file to
create a link to this file in the folder.
Note: Please note that changes to the partial configuration file will lead to
changes in that group configuration in various folders.
BAT54-Rail/F..
Release 7.54 06/08 199
LANtools network management 5.4 Group configuration with LANconfig
BAT54-Rail/F..
200 Release 7.54 06/08
LANtools network management 5.5 Rollout Wizard
BAT54-Rail/F..
Release 7.54 06/08 201
LANtools network management 5.5 Rollout Wizard
5.5.2 Variables
Maximum ten variables can be defined with Index, Ident, Title, Type, Min-Val-
ue, Max-Value and Default-Value.
D Index
Index for the variable. The Rollout Wizard displays the variables in
ascending order.
D Possible values: 1 to 232 - 1
D Default: 0
D Ident
Unique identifier of variables that are referenced during the execution of
actions. Identifiers are not required for fields that are not used by users to
enter their data (e.g. label).
D Possible values: Maximum 64 alphanumerical characters
D Default: blank
D Title
Name of the variable as displayed by the Rollout Wizard in WEBconfig.
D Possible values: Maximum 64 alphanumerical characters
D Default: blank
D Type
Name of the variable as displayed by the Rollout Wizard in WEBconfig.
D Possible values: Label, Integer, String, Password, Checkmark
D Label: Text that is displayed to provide explanations of the other vari-
ables. Min.-Value and Max.-Value are of no further significance for
these entries.
D Integer: Allows the entry of a positive integer number between 0 and
232 - 1. By entering the Min.-Value and Max.-Value, the range of
entries can be limited. Also, a default value can be defined. This
default value must be between the Min. and Max.-Values.
D String: Enables text to be entered. By entering the Min.-Value and
Max.-Value, the length of the string can be limited. Also, a default value
can be defined. This default text must be shorter than the maximum
length, otherwise it will be truncated.
D Password: splayed while being entered. Entering a password has to
be repeated. The Rollout Wizard will execute no actions if the pass-
words do not agree.
BAT54-Rail/F..
202 Release 7.54 06/08
LANtools network management 5.5 Rollout Wizard
BAT54-Rail/F..
Release 7.54 06/08 203
LANtools network management 5.5 Rollout Wizard
D http and http: Enables a Web site to be accessed, for example to carry
out an action there.
<http:|http:>//[user[:pass]@]hostname[:port]/...
D Variables in the actions: When actions are executed, the values as
defined with the Rollout Wizard can be referenced. To this end, the
variable's identifier is used for the action with a leading percent char-
acter. The identifier must be enclosed by curly brackets if other alpha-
numeric characters are included in the action. The following example
sets the name of the device to the format 'Site (branch)', if the location
of the device is being queried as a variable with the identifier 'Location':
exec: set /setup/name %{Location}(Branch)
For variables of the type Integer or String, the value as entered by the
user is used. In the case of variables of the type Checkmark, '1'
(switched on) or '0' (switched off) is used.
Note: If the expression for the action contains spaces then the expression
must be enclosed by quotation marks.
D Default: blank
BAT54-Rail/F..
204 Release 7.54 06/08
LANtools network management 5.6 Display functions in LANmonitor
increment are not defined, both are set automatically to 10. If no argu-
ments are entered, the action renumbers the indices with 10, 20, 30, etc.
The information that can be taken from the overview includes, among others,
details about active WAN connections, the five most recent firewall messag-
es, the current VPN connections and system information about charges and
online times.
BAT54-Rail/F..
Release 7.54 06/08 205
LANtools network management 5.6 Display functions in LANmonitor
BAT54-Rail/F..
206 Release 7.54 06/08
LANtools network management 5.6 Display functions in LANmonitor
BAT54-Rail/F..
Release 7.54 06/08 207
LANtools network management 5.7 LANmonitorknow what's going on
D Time
D Source and destination address
D Protocol with source and destination port
D Activated filter rule and exceeded limit
D Action carried out
BAT54-Rail/F..
208 Release 7.54 06/08
LANtools network management 5.7 LANmonitorknow what's going on
Note: With LANmonitor you can only monitor those devices that you can ac-
cess via IP (local or remote). With this program you cannot access a rout-
er via the serial interface.
BAT54-Rail/F..
Release 7.54 06/08 209
LANtools network management 5.7 LANmonitorknow what's going on
BAT54-Rail/F..
210 Release 7.54 06/08
LANtools network management 5.7 LANmonitorknow what's going on
V LANmonitor automatically creates a new entry in the device list and initial-
ly displays the status of the transfer channels. Start your Web browser
and enter any web page you like. LANmonitor now shows a connection
being established on one channel and the name of the remote site being
called. As soon as the connection is established, a plus sign against the
communication channel entry indicates that further information on this
channel is available. Click on the plus sign or double-click the appropriate
entry to open a tree structure in which you can view various information
.
In this example, you can determine from the PPP protocol information
the IP address assigned to your router by the provider for the duration of
the connection and the addresses transmitted for the DNS and NBNS
server.
Under the general information you can watch the transmission rates at
which data is currently being exchanged with the Internet.
V To break the connection manually, click on the active channel with the
right mouse button. You may be required to enter a configuration pass-
word.
V If you would like a log of the LANmonitor output in file form, select Device
Device Activities Logging and go to the 'Logging' tab. Open the dialog
for the settings for the activity protocol, click on Tools Options.
BAT54-Rail/F..
Release 7.54 06/08 211
LANtools network management 5.7 LANmonitorknow what's going on
On the 'Protocol' tab you can define whether the following activities
should be protocolled:
D WAN connections
D WLAN connections
D VPN connections
D LANCAPI connections
D a/b port connections
D Firewall actions
You can also specify whether LANmonitor should create a log file daily,
monthly, or on an ongoing basis.
BAT54-Rail/F..
212 Release 7.54 06/08
LANtools network management 5.7 LANmonitorknow what's going on
Note: Telnet-access to the device must be enabled to carry out trace re-
quests with LANmonitor.
The trace function in LANmonitor exceeds the standard trace functions avail-
able from Telnet and offers greater convenience in the generation and anal-
ysis of traces. For example, the current trace configuration for activating the
necessary trace commands can be stored to a configuration file. An experi-
enced service technician can set up a trace configuration and provide it to a
less experienced user for executing specialized trace requests for a device.
The trace results can also be stored in a file and returned to the technician
for analysis.
LANmonitor has the following buttons for operating the trace module:
Opens a pre-defined configuration for the trace command. This al-
lows you to carry out trace commands precisely as required by the
service technician, for example.
Stores the current trace configuration to be passed on to a user.
Opens a file with trace results for viewing in the trace module.
Saves the current trace results to a file.
Clears the current display or trace results.
Starts outputting the trace results as produced by the current config-
uration and automatically switches to the trace-result display mode.
As soon as the trace results are returned, the other buttons are de-
activated.
Stops the output of trace results.
Switches to the mode for configuring the trace output.
BAT54-Rail/F..
Release 7.54 06/08 213
LANtools network management 5.8 Visualization of larger WLANs
BAT54-Rail/F..
214 Release 7.54 06/08
LANtools network management 5.8 Visualization of larger WLANs
Alternatively, WLANmonitor can be started from the console with the com-
mand
[installation path]lanmon -wlan
BAT54-Rail/F..
Release 7.54 06/08 215
LANtools network management 5.8 Visualization of larger WLANs
BAT54-Rail/F..
216 Release 7.54 06/08
LANtools network management 5.8 Visualization of larger WLANs
The groups are shown in the left column in WLANmonitor. Starting from the
top group 'WLANmonitor', you can use the menu item File Add group to
create new sub-groups and so build up a structure. Access points found dur-
ing a search are assigned to the currently selected group in the group tree.
Access points that have been recognized already can be moved to the an-
other group with drag and drop.
To aid the allocation of access points and clients, you can mark a device with
the mouse. The counterpart(s) will then be marked in the list as well:
D If an access point is marked in the access point list, all of the clients
logged in to this device will also be marked in the client list.
D If a client is marked in the client list, the access point that it is registered
with will be marked in the access point list.
BAT54-Rail/F..
Release 7.54 06/08 217
LANtools network management 5.8 Visualization of larger WLANs
U Rogue AP detection
The WLANmonitor sorts all of the access points found into predefined sub-
groups under 'Rogue AP Detection' while displaying the following informa-
tion:
D Time of first and last detection
D BSSID, the MAC addresse of the AP for this WLAN network
D Network name
D Type of encryption used
D Frequency band used
D Radio channel used
D Use of 108Mbps mode
Note: To use rogue AP detection, background scanning has to be activated
in the BAT Wireless Router.
The WLANmonitor uses the following groups for sorting the APs that are
found:
D All APs: List of all scanned WLAN networks grouped as follows
D New APs: New unknown and unconfigured WLAN networks are automat-
ically grouped here (APs displayed in yellow)
BAT54-Rail/F..
218 Release 7.54 06/08
LANtools network management 5.8 Visualization of larger WLANs
D Rogue APs: WLAN networks identified as rogue and in need of urgent ob-
servation (APs displayed in red)
D Unknown APs: WLAN networks which are to be further analyzed (APs
displayed in gray)
D Known APs: WLAN networks which are not a threat (APs displayed in
gray)
D Own APs: New affiliated WLAN networks from access points monitored
by WLANmonitor are automatically grouped here (APs displayed in
green)
The WLANs that have been found can be placed into a corresponding group
depending on their status. You can set up your own network groups within
the individual groups by using the context menu (right mouse button) (except
for the group 'All APs').
The WLANmonitor presents all of the clients found into predefined subgroups
under 'Rogue Client Detection' while displaying the following information:
D Time of first and last detection
D MAC address of the client
D Network name
Note: No configuration of the BAT Wireless Router is necessary to make use
of rogue client detection.
BAT54-Rail/F..
Release 7.54 06/08 219
LANtools network management 5.8 Visualization of larger WLANs
The WLANmonitor uses the following groups for sorting the clients that are
found:
D All clients: List of all found clients grouped as follows (clients are colored
according to their group)
D New clients: New unknown clients are automatically grouped here (clients
displayed in yellow)
D Rogue clients: Clients identified as rogue and in need of urgent observa-
tion (clients displayed in red)
D Unknown clients: Clients which are to be further analyzed (clients dis-
played in gray)
D Known clients: Clients which are not a threat (clients displayed in gray)
D Own clients: New affiliated clients associated with access points moni-
tored by WLAN monitor are automatically grouped here (APs displayed in
green)
The clients that have been found can be placed into a corresponding group
depending on their status. You can set up your own network groups within
the individual groups by using the context menu (right mouse button) (except
for the group 'All clients').
BAT54-Rail/F..
220 Release 7.54 06/08
LANtools network management 5.8 Visualization of larger WLANs
D E-mail messaging
Activate this option if you would like the WLANmonitor to report unknown
or unconfigured access points via e-mail.
D Recipient e-mail addresses
Enter the e-mail address(es) of the administrators here that should be
informed in the event of rogue AP detection. Multiple e-mail addresses
should be separated by commas.
Note: In order to send e-mail alerts, the computer on which WLANmonitor is
running requires a standard e-mail client (MS Outlook Express or Mozilla
Thunderbird) that allows automatic mail transmission to be configured
and running.
BAT54-Rail/F..
Release 7.54 06/08 221
LANtools network management 5.9 Messaging
5.9 Messaging
The action table contains the following variables for control over messaging
when certain events occur in the BAT:
D %a
WAN IP address of the WAN connection relating to the action.
D %H
Host name of the WAN connection relating to the action.
D %h
as %h, except the hostname is in small letters
D %c
Connection name of the WAN connection relating to the action.
D %n
Device name
D %s
Device serial number
D %m
Device MAC address (as in Sysinfo)
D %t
Time and date in the format YYYY-MM-DD hh:mm:ss
BAT54-Rail/F..
222 Release 7.54 06/08
LANtools network management 5.9 Messaging
D The BAT has to be configured as an NTP client in order to have the cur-
rent system time.
D An SMTP account must be set up for transmitting e-mails.
Once these requirements are fulfilled, messaging can be set up. This is done
with a new entry in the action table; e. g. with LANconfig under Communica-
tion General Action table.
Select the remote site for the relevant connection. As Condition select 'Bro-
ken' and enter the action as the transmission of an e-mail.
mailto:[email protected]?subject=VPN connection broken at %t?bo-
dy=VPN connection to Subsidiary 1 was broken.
If the connection is broken, this action sends an e-mail to the administrator
with the time of the event in the subject line.
Note: If the mail is sent to an appropriate Mail2SMS gateway the alert can
be sent directly to a mobile telephone.
Note: For complex scenarios with several subsidiaries, each of the remote
sites is given a corresponding entry in the central BAT. For monitoring the
central device itself, an action is entered into a device at one of the sub-
sidiaries. In this way the administrator receives an alert even if the VPN
gateway at the central location fails, which could potentially prevent any
messages from being transmitted.
BAT54-Rail/F..
Release 7.54 06/08 223
LANtools network management 5.9 Messaging
Some providers interrupt the DSL connection used for the VPN connections
once every 24 hours. To avoid informing the administrator of these regular
interruptions, messaging can be disabled at the time when the re-connect oc-
curs.
First of all an action is required to force the re-connect to occur at a fixed time;
generally at night when the Internet connection is not in use. The entry de-
fines, for example, 03:00h and the Internet connection is broken with the
command do other/manual/disconnect internet.
With two more cron commands set /setup/wan/action-table/1 yes/no the
corresponding entry in the action table is switched off three minutes before
03:00h and switched on again three minutes after 03:00h. The number 1 fol-
lowing the path to the action table is an index that stands for the first entry in
the table.
BAT54-Rail/F..
224 Release 7.54 06/08
Diagnosis 6.1 Trace informationfor advanced users
6 Diagnosis
BAT54-Rail/F..
Release 7.54 06/08 225
Diagnosis 6.1 Trace informationfor advanced users
This parameter... ... brings up the following display for the trace:
Status status messages for the connection
Error error messages for the connection
IPX-router IPX routing
PPP PPP protocol negotiation
SAP IPX Service Advertising Protocol
IPX-watchdog IPX watchdog spoofing
SPX-watchdog SPX watchdog spoofing
LCR Least-Cost Router
Script script processing
IPX-RIP IPX Routing Information Protocol
Firewall Firewall activities
RIP IP Routing Information Protocol
ARP Address Resolution Protocol
ICMP Internet Control Message Protocol
IP masquerading processes in the masquerading module
DHCP Dynamic Host Configuration Protocol
NetBIOS NetBIOS management
DNS Domain Name Service Protocol
Packet dump display of the first 64 bytes of a package in hexadecimal form
D-channel-dump trace on the D channel of the connected ISDN bus
ATM-cell spoofing at the ATM packet level
ATM-Error ATM errors
ADSL ADSL connections status
SMTP-Client E-mail processing of the integrated mail client
Mail-Client E-mail processing of the integrated mail client
SNTP Simple Network Time Protocol information
NTP Timeserver Trace
Connact Messages from the activity protocol
Cron cron table
RADIUS RADIUS trace
Serial Status of serial interface
USB Status of USB interface
Load-Balancer Load balancing information
VRRP Information concerning Virtual Router Redundancy Protocol
Ethernet Status of ethernet interface
BAT54-Rail/F..
226 Release 7.54 06/08
Diagnosis 6.1 Trace informationfor advanced users
This parameter... ... brings up the following display for the trace:
VLAN Information concerning virtual networks
IGMP Information concerning Internet Group Management Protocol
WLAN Information concerning wireless networks
IAPP Trace for Inter Access Point Protocol, shows information concerning WLAN
roaming.
DFS Trace for Dynamic Frequency Selection
Bridge Information concerningWLAN bridge
EAP Trace for EAP
Spgtree Information concerning Spanning Tree Protokoll
LANAUTH LAN authentication (e.g. Public Spot)
VPN-Status IPSec and IKE negotiation
VPN-Packet IPSec and IKE packets
Any appended parameters are processed from left to right. This means that
it is possible to call a parameter and then restrict it.
BAT54-Rail/F..
Release 7.54 06/08 227
Diagnosis 6.1 Trace informationfor advanced users
A trace filter is activated by adding the parameter @ that induces the follow-
ing filter description. In filter description uses of the following perators:
Operator Beschreibung
(space) OR:
The filter applies if one of the operator occurs in the trace output
+ AND:
The filter applies if the operator occurs in the trace output
- Not:
The filter applies if the operator does not occur in the trace output
" the output must match the search string exactly
BAT54-Rail/F..
228 Release 7.54 06/08
Diagnosis 6.2 SYSLOG storage in the device
In the window 'Connect to' use the pulldown menu 'Connect using' and select
the entry 'TCP/IP'. As 'Host address' enter the local/official IPaddress or the
FQDN of the device. After confirmation, HyperTerminal dipslays a request to
log in. Enter the configuration password .
You record the traces by clicking on Transmit Capture text. Enter the path
of the directory where the text file is to be saved. Now change back to the
dialog window and enter the required trace command.
To stop the trace, click on the HyperTerminal menus Transmit Stop text
capture.
BAT54-Rail/F..
Release 7.54 06/08 229
Diagnosis 6.2 SYSLOG storage in the device
BAT54-Rail/F..
230 Release 7.54 06/08
Diagnosis 6.2 SYSLOG storage in the device
BAT54-Rail/F..
Release 7.54 06/08 231
Diagnosis 6.3 The ping command
Parameter Meaning
-a a.b.c.d Sets the sender address of the ping (standard: IP Adresse of the router)
-a INT Sets the intranet address of the router as sender address
-a DMZ Sets the DMZ address of the router as sender address
- a LBx Sets one of the 16 Loopback addresses as sender address. Valid for x are the hexadeci-
mal values 0-f
-f flood ping: Sends many ping signals in a small amount of time. Can be used e. g. to test
the broadband of the network. ATTENTION: flood ping can easily be interpretated as a
DoS attack.
-n Sends the computer name back zu the given IP address
-q Ping command does not give an output on the panel
-r Change to traceroute mode: every interstation passed by the data package is listed
-s n Sets the package size to n Byte (max. 1472)
-i n Time between the packages in seconds
BAT54-Rail/F..
232 Release 7.54 06/08
Diagnosis 6.4 Monitoring the switch
Parameter Meaning
-c n Send n ping signals
hostaddress Address or hostname of the recipient
stop / Entering stop or pressing the RETURN button terminates the ping command
<RETURN>
BAT54-Rail/F..
Release 7.54 06/08 233
Diagnosis 6.5 Cable testing
For monitoring data traffic between ports, the ports must be set to monitor
mode. In this state all data is issued, that is transmitted over the switch of the
devices between stations of the LAN and WAN.
LANconfig
For the configuration with LANconfig open the Ethernet switch settings in the
configuration area 'Interfaces' on the register 'LAN' with the button Ethernet
Ports.
BAT54-Rail/F..
234 Release 7.54 06/08
Diagnosis 6.5 Cable testing
You can test the cabling with the built-in cable tester of your BAT. Change
under WEBconfig to menu item Expert configuration Status Ethernet-
Ports Cable test. Enter here the name of the interface to be tested (e.g.
DSL1 or LAN-1). Pay attention to the correct spelling of the interfaces.
Start the test for the specified interface by clicking on Execute.
BAT54-Rail/F..
Release 7.54 06/08 235
Diagnosis 6.5 Cable testing
BAT54-Rail/F..
236 Release 7.54 06/08
Security 7.1 Protection for the configuration
7 Security
You certainly would not like any outsider to have easy access to or to be able
to modify the data on your computer. Therefore this chapter covers an impor-
tant topic: safety. The description of the security settings is divided into the
following sections:
D Protection for the configuration
D Password protection
D Login barring
D Access verification
D Securing ISDN access
At the end of the chapter you will find the most important security settings as
a checklist. It ensures that your BAT is excellently protected.
Note: Some further LCOS features to enhance the data security are de-
scribed in separate chapters:
BAT54-Rail/F..
Release 7.54 06/08 237
Security 7.1 Protection for the configuration
Note: As long as a password hasn't been set, anyone can change the con-
figuration of the device. For example, your Internet account information
could be stolen, or the device could be reconfigured in a way that the pro-
tection-mechanisms could by bypassed.
Note: Note: If a password has not been set, the Power LED flashes, until the
devices have been configured correctly.
We would like to give you a few tips here for using passwords:
D Keep a password as secret as possible.
Never write down a password. For example, the following are popular but
completely unsuitable: Notebooks, wallets and text files in computers. It
sounds trivial, but it can't be repeated often enough: don't tell anyone your
password. The most secure systems surrender to talkativeness.
D Only transmit passwords in a secure manner.
A selected password must be reported to the other side. To do this, select
the most secure method possible. Avoid: Non-secure e-mail, letter, or fax.
Informing people one-on-one is preferable. The maximum security is
achieved when you personally enter the password at both ends.
D Select a secure password.
Use random strings of letters and numbers. Passwords from common lan-
guage usage are not secure. Special characters such as '&?#-*+_:;,!'
make it difficult for potential attackers to guess your password and in-
crease the security of the password.
Note: Capital and small letters are distinguished in the configuration pass-
word.
BAT54-Rail/F..
238 Release 7.54 06/08
Security 7.1 Protection for the configuration
If you comply with these simple rules, you will achieve the highest possible
degree of security.
You will find the box to enter the password in LANconfig in the configuration
area 'Management' on the 'Admin' tab. Under WEBconfig you run the wizard
Security Settings. In a terminal or Telnet session you set or change the
password with the command passwd.
At the same time you should also protect the SNMP read access with a pass-
word. For SNMP the general configuration password is used.
BAT54-Rail/F..
Release 7.54 06/08 239
Security 7.1 Protection for the configuration
BAT54-Rail/F..
240 Release 7.54 06/08
Security 7.1 Protection for the configuration
BAT54-Rail/F..
Release 7.54 06/08 241
Security 7.1 Protection for the configuration
The access to the internal functions can be controlled separately for access-
es from the local or from remote networks - for all configuration services sep-
arately. The configuration access can generally be permitted or forbidden, a
pure read access or - if your model is equipped with VPN - also can be per-
mitted only over VPN.
Note: If you want to remove the network access to the router over the WAN
completely, set the configuration access from distant nets for all methods
to 'denied'.
You can reach the configuration of the access-list of WEBconfig or Telnet
with the following runs:
BAT54-Rail/F..
242 Release 7.54 06/08
Security 7.1 Protection for the configuration
With a special filter list the access to the internal functions of the devices can
be limited to certain IP addresses. The configuration dialog with the access
rights from local or distant networks can be opened with the Button Access
stations.
By default, this table does not contain entries. Thus the device can be ac-
cessed over TCP/IP from computers with arbitrary IP addresses. With the
first entry of a IP address (as well as the associated net mask) the filter is ac-
tivated, and solely the IP addresses contained in this entry are entitled to use
the internal functions then. With further entries, the number of the entitled
ones can be extended. The filter entries can designate both individual com-
puters and whole networks.
With WEBconfig for Telnet you reach the configuration of the access list with
the following runs:
BAT54-Rail/F..
Release 7.54 06/08 243
Security 7.2 The security checklist
The simplest option for the protection of the configuration is the estab-
lishment of a password. As long as a password hasn't been set, anyone
can change the configuration of the device. The box for entering the
password is located in LANconfig in the 'Management' configuration area
on the 'Security' tab. It is particularly advisable to assign a password to
the configuration if you want to allow remote configuration.
Also protect the SNMP configuration with a password. The field for pro-
tection of the SNMP configuration with a password is also contained in
LANconfig in the 'Management' configuration area on the 'Security' tab.
BAT54-Rail/F..
244 Release 7.54 06/08
Security 7.2 The security checklist
When a call is placed over an ISDN line, the caller's number is normally
sent over the D channel before a connection is even made (CLI Calling
Line Identifier). Access to your own network is granted if the call number
appears in the number list, or the caller is called back if the callback
option is activated (this callback via the D channel is not supported by
the Windows Dial-Up Network). If the BAT is set to provide security using
the telephone number, any calls from remote stations with unknown
numbers are denied access.
The Stateful Inspection Firewall of the BAT ensures that your local net-
work cannot be attacked from the outside . The Firewall can be enabled
in LANconfig under Firewall/QoS on the register card General.
For maximum security and control you prevent at first any data transfer
through the Firewall. Only those connections, which are explicitly desired
have to allowed by the a dedicated Firewall rule then. Thus Trojans and
certain Email viruses loose their communication way back. The Firewall
rules are summarized in LANconfig under Firewall/Qos on the register
card Rules.
BAT54-Rail/F..
Release 7.54 06/08 245
Security 7.2 The security checklist
IP masquerading is the hiding place for all local computers for connec-
tion to the Internet. Only the router module of the unit and its IP address
are visible on the Internet. The IP address can be fixed or assigned
dynamically by the provider. The computers in the LAN then use the
router as a gateway so that they themselves cannot be detected. The
router separates Internet and intranet, as if by a wall. The use of IP mas-
querading is set individually for each route in the routing table. The rout-
ing table can be found in the LANconfig in the 'IP router' configuration
section on the 'Routing' tab.
BAT54-Rail/F..
246 Release 7.54 06/08
Security 7.2 The security checklist
With 802.11i, WPA or WEP you can encode your data in the radio net-
work with different kinds of encoding methods as for AES, TKIP or WEP.
Hirschmann recommends the most secure encoding with 802.11i and
AES. If the used WLAN client adapter does not provide these, use the
TKIP or at least WEP. Make sure that your device when using the encod-
ing function has at least one passphrase or WEP key entered. To check
the WEP settings select in the LANconfig in the configuration area 'Man-
agement' on the tab 'Interfaces' under 'Wireless LAN' the wireless LAN
interface you would like to configure.
With the Access Control List (ACL) you allow or prohibit the access of
single radio LAN clients to your radio LAN. The access is regulated over
the static MAC address of the wireless client adapter. To check the
Access Control List select in LANconfig in the configuration area 'WLAN
Security' the tab 'Stations'.
For more security when transmitting sensitive data over your wireless
LAN you can use the IEEE 802.1x technology. To check or activate the
IEEE 802.1x settings select in the LANconfig the configuration area
'WLAN Security' the tab 'IEEE 802.1x'.
If your base station provides VPN you can alternatively to IEEE 802.1x
select IPsec over WLAN to protect your data between radio networks
and local networks in a VPN tunnel.
BAT54-Rail/F..
Release 7.54 06/08 247
Security 7.2 The security checklist
BAT54-Rail/F..
248 Release 7.54 06/08
Firewall 8.1 Threat analysis
8 Firewall
For most companies and many private users a work without the Internet is no
longer conceivable. E-mail and web are indispensable for communication
and information search. But each connection of the workstations from the
own, local network to the Internet represents however a potential danger: Un-
authorized users can try to see your data via this Internet connection, to mod-
ify it or to manipulate your PCs.
Therefore this chapter covers an important topic: the firewall as defensive
measure against unauthorized access. Besides a brief introduction to the
topic of Internet security, we show you which protection a BAT is able to offer
you by right configuration and how to make the needed specific settings.
BAT54-Rail/F..
Release 7.54 06/08 249
Firewall 8.1 Threat analysis
Note: For hints on the protection of wireless networks, please refer to the re-
spective chapters of this user manual configuration resp. of the appropri-
ate device documentation.
BAT54-Rail/F..
250 Release 7.54 06/08
Firewall 8.1 Threat analysis
BAT54-Rail/F..
Release 7.54 06/08 251
Firewall 8.2 What is a Firewall?
How does the Firewall supervises the data traffic? The Firewall works in prin-
ciple like a door keeper for data packets: Each packet will be checked, wheth-
er it may pass the door of the network (Firewall) in the desired direction or
not. For such a checking different criteria are used, in common language of
Firewalls called rules or guidelines. Depending on the kind of information,
which are used for creation of the rules and which are checked during the op-
eration of the Firewall, one distinguishes different types of Firewalls.
BAT54-Rail/F..
252 Release 7.54 06/08
Firewall 8.2 What is a Firewall?
Above all, the aspect of the central positioning is very Important: Only when
the entire data traffic between inside and outside goes through the Fire-
wall, it can fulfil its task reliably under any circumstances. Each alternative
way can reduce or even turn off the security of the Firewall. This central po-
sition of the Firewall simplifies by the way also the maintenance: One Firewall
as common passage between two networks is certainly easier to maintain
than a Personal Firewall on each of the workstations belonging to the LAN.
Note: In principle, Firewalls operate at the interconnection between two or
more networks. For the following explanation, we only look as example at
the passage between a local network of a company and the Internet.
These explanations can be transferred however in a general manner also
to other network constellations, e.g. for the protection of a subnetwork of
the personnel department of a company against the remaining network
users.
U Packet filters
One speaks about a packet filter-based Firewall, if the router only checks the
details in the header of the data packets and decides on the basis of this in-
formation, whether the packet may pass or not. The following details belong
to the analyzed information:
D IP address of source and destination
D Transfer protocol (TCP, UDP or ICMP)
BAT54-Rail/F..
Release 7.54 06/08 253
Firewall 8.2 What is a Firewall?
To enable this process, the administrator of the packet filter must open all
ports for incoming connections, because he does not know in advance for
which port the client will inquire the FTP connection. An alternative is to use
passive FTP. Thereby, the client establishes the connection itself to the serv-
er over a particular port, which was told to the server before. This process is,
however, not supported by all clients/servers.
BAT54-Rail/F..
254 Release 7.54 06/08
Firewall 8.2 What is a Firewall?
If we furthermore compare the Firewall with a porter, this door keeper only
checks, whether he knows or not the courier with the packet at the door. If
the courier is known and came ever into the building before, he has the per-
mission to go in without hindrance and without being checked also for all fol-
lowing orders up to the workplace of the addressee.
Additionally, the Stateful Inspection is able to track from the connection set
up, whether additional channels are negotiated for data exchange or not.
Some protocols like e.g. FTP (for data transfer), T.120, H.225, H.245 and
H.323 (for netmeeting or IP telephony), PPTP (for VPN tunnels) or IRC (for
chatting) signalize when establishing the connection from the LAN to the In-
ternet by a particular used source port whether they are negotiating further
ports with the remote station. The Stateful Inspection dynamically adds also
these additional ports into the connection state list, of course limited to the
particular source and destination addresses only.
BAT54-Rail/F..
Release 7.54 06/08 255
Firewall 8.2 What is a Firewall?
Lets have once again a look at the FTP download example. When starting
the FTP session, the client establishes a connection from source port '4321'
to the destination port '21' of the server. The Stateful Inspection allows this
first set up, as long as FTP is allowed from local workstations to the outside.
In the dynamic connection state table, the Firewall enters source and desti-
nation and the respective port. Simultaneously, the Stateful Inspection can
inspect the control information, sent to port 21 of the server. These control
signals indicate that the client requires a connection of the server from its port
20 to port 4322 of the client. The Firewall also enters these values into the
dynamic table, because the connection to the LAN has been initiated from
the client. Afterwards, the server can send so the desired data to the client.
outgoing connection
unauthorized incoming
connection
Source port 20
IP: 80.146.204.15
But if another workstation from the Internet tries to use the just opened port
4322 of the LAN to file itself data from its port 20 on the protected client, the
Firewall will stop this try, because the IP address of the attacker does not fit
to the permitted connection!
Note: After the successful data transfer, the entries disappear automatically
from the dynamic table and the ports will be closed again.
Moreover, a Firewall with Stateful Inspection is mostly able to re-assemble
the received data packets, that means to buffer the individual parts and to as-
semble them again to an complete packet. Therefore, complete IP packets
can be checked by the Firewall, rather than individual parts only.
BAT54-Rail/F..
256 Release 7.54 06/08
Firewall 8.2 What is a Firewall?
This porter is making a definite better job. When somebody in this company
orders a courier, he must also inform the porter that he is expecting a courier,
when he will be arriving and what information should be found on the delivery
note. Only when this information matches the logbook entries of the porter,
the courier may pass. If the courier brings not only one packet, but rather two,
only the one with the correct delivery note will pass. Likewise, a second cou-
rier demanding access to the employee will be rejected, too.
U Application Gateway
The Application Gateway is thus a kind of proxy for each of the two networks.
Another term for this constellation is the dualhomed gateway, because this
workstation is so to speak at home in two networks.
For each application to be allowed through this gateway, an own service will
be set up, e.g. SMTP for mail, HTTP for surfing the Internet or FTP for data
downloads.
BAT54-Rail/F..
Release 7.54 06/08 257
Firewall 8.2 What is a Firewall?
Mail
SMTP
HTTP
FTP
Local network
This service accepts data received by either one of the two sides and depicts
it to the respective other side. What seems to be at first sight a needless mir-
roring of existing data, is on closer examination the far-reaching concept of
Application Gateways: It never exists a direct connection e.g. between a cli-
ent of the local network and a server of the Internet. The LAN workstations
only see the proxy, the workstations of the Internet likewise. This physical
separation of LAN and WAN, makes it quite difficult for attackers to intrude
into the protected network.
Applied to the porter example, the packet will be left at the gate, the courier
is not allowed to enter the company premises. The porter takes the packet,
will open it after checking address and delivery note and will control also the
content. When the packet has taken these hurdles successfully, then the
company internal courier will bring it himself to the addressee of the compa-
ny. He became proxy of the courier on company premises. The other way
around, all employees, wanting to send a packet, have to inform the porter,
which has to collect the packet at the workstation place and which will hand
over the packet to the ordered courier at the gate.
Note: Functions of Application Gateways are not supported by the BAT,
mainly because of the high hardware demands.
BAT54-Rail/F..
258 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
For BAT devices with VoIP functions that were already integrated or added
in with a software option, the ports required for voice connections are acti-
vated automatically.
BAT54-Rail/F..
Release 7.54 06/08 259
Firewall 8.3 The BAT Firewall
N:N mapping
user man- client / server
agement LAN interfaces
MAC/protocol filter
Virtual LANs (VLAN)
DHCP client / PPP
802.11i/WPA/
connection via LAN/
Encryption:
to
IP router
ADSL WLAN-2-
1
to
IP-Redirect
DSL
IP masquerading
DMZ
ISDN Configuration &
management:
Filter
Filter
WEBconfig, Telnet,
TFTP
IPX router
IPX over PPTP/
VPN
LANCAPI
The Firewall only checks data packets routed by the IP router of the BAT.
In general, these are the data packets, which are exchanged between
one of the WAN interfaces and the internal networks (LAN, WLAN,
DMZ).
For example, the communication between LAN and WLAN is normally
not carried out by the router, as long as the LAN bridge allows a direct
exchange. Thus the Firewall rules do not apply here. The same applies
to the so-called internal services of the BAT like Telnet, TFTP, SNMP
and the web server for the configuration with WEBconfig. The data pack-
ets of these services do not run through the router, and therefore arent
influenced by the Firewall.
Note: Due to the positioning behind the masquerading module (seen
from the WAN), the Firewall operates with the real internal IP ad-
dresses of the LAN stations, and not with the outside known Internet
address of the BAT.
The BAT Firewall uses several lists for checking data packets, which are au-
tomatically generated from Firewall rules, resulting Firewall actions or by ac-
tive data connections:
BAT54-Rail/F..
260 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Host blocked?
Port blocked?
Active connection?
BAT RADIUS
N:N mapping
DSLoL WLAN-1-1
MAC/protocol filter
Virtual LANs (VLAN)
DHCP client / PPP
WLAN-1-8
IP router
ADSL WLAN-2-
1
to
IP-Redirect WLAN-2-
DSL
IP masquerading
DMZ
ISDN Configuration &
management:
Filter
Filter
WEBconfig, Telnet,
TFTP
IPX router
IPX over PPTP/
VPN
LANCAPI
BAT54-Rail/F..
Release 7.54 06/08 261
Firewall 8.3 The BAT Firewall
Note: If no explicit Firewall rule exists for a data packet, the packet will be
accepted (Allow-All). That grants a backward-compatibility for existing
installations. For maximum protection by the Stateful Inspection, please
note the section Set-up of an explicit "Deny All" strategy page 283.
The four lists obtain their information as follows:
D In the host block list are all those stations listed, which are blocked for a
certain time because of a Firewall action. The list is dynamic, new entries
can be added continuously with appropriate actions of the Firewall. En-
tries automatically disappear after exceeding the timeout.
D In the port block list those protocols and services are filed, which are
blocked for a certain time because of a Firewall action. This list is likewise
a dynamic one, new entries can be added continuously with the appropri-
ate Firewall actions. Entries automatically disappear after exceeding the
timeout.
D For each established connection an entry is made in the connection list,
if the checked packet has been accepted by the filter list. In the connec-
tion list is noted from which source to which destination, over which pro-
tocol and which port a connection is actually allowed. The list contains in
addition, how long an entry will stay in the list and which Firewall rule is
responsible for the entry. This list is very dynamic and permanently mov-
ing.
D The filter list is made of the Firewall rules. The containing filters are static
and only changed when Firewall rules are added, edited or deleted.
Thus all lists, which are consulted by the Firewall to check data packets, fi-
nally base on the Firewall rules (Parameters of Firewall rules page 268).
BAT54-Rail/F..
262 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U UDP connections
12345 Response 53
However, if the server wants to send larger sets of data (e.g. TFTP) and
would not like or can not differentiate on the well known port between re-
quests and acknowledges, then it sends the response packets to the source
port of the sender of the original request, but uses as its own source port a
free port, on which it reacts now only to those packets, which belong to the
data communication:
While the data communication takes place now over the ports 12345 and
54321, the server on the well-known port (69) can accept further requests. If
the BAT pursues a "Deny All" strategy, the answer packets of an entry of the
port filter Firewall, which permits only a connection to port 69 of the server,
would simply be discarded. In order to prevent this, when creating the entry
in the connection state database, the destination port of the connection is
kept free at first, and set only with the arrival of the first answer packet,
whereby both possible cases of an UDP connection are covered.
BAT54-Rail/F..
Release 7.54 06/08 263
Firewall 8.3 The BAT Firewall
U TCP connections
U ICMP connections
For ICMP two cases must be differentiated: The ICMP request/reply connec-
tions, like to be used with "ping", and the ICMP error messages, which can
be received as an answer to any IP packet.
ICMP request/reply connections can be clearly assigned to the identifier
used by the initiator, i.e. in the status database an entry will be provided with
the sending of an ICMP request, which lets through only ICMP replies with
the correct identifier. All other ICMP replies will get discarded silently.
In ICMP error messages, the IP header and the first 8 bytes of the IP packet
(on behalf UDP or TCP headers) can be found within the ICMP packet. With
the help of this information, the receipt of an ICMP error message triggers au-
tomatically the search for the accessory entry in the status database. The
packet passes only if such an entry exists, otherwise it is discarded silently.
Additionally, potentially dangerous ICMP error messages (redirect route) are
filtered out.
For all other protocols no related connections can be followed up, i.e. with
them only a connection between involved hosts can occur in the status data-
base. These can be initiated also only from one side, unless, in the port filter
Firewall exists a dedicated entry for the "opposite direction".
BAT54-Rail/F..
264 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U Firewall/QoS enabled
This option switches on or off the entire Firewall, including Quality of Service
functions.
Note: Please notice that the N:N mapping functions (N:N mapping
page 425) are only active when the Firewall has been switched on!
U Administrator email
U Fragments
Some attacks from the Internet try to outsmart the Firewall by fragmented
packets (packets split into several small units). One of the main features of a
Stateful Inspection like in the BAT is the ability to re-assemble fragmented
packets in order to check afterwards the entire IP packet.
You can centrally adjust the desired behavior of the Firewall. The following
options are available:
D Filter: Fragmented packets are directly discarded by the Firewall.
D Route: Fragmented packets are passed on without any further checking
by the Firewall, as long as permitted by valid filter settings.
D Re-assemble: Fragmented packets are buffered and re-assembled to
complete IP packets. The re-assembled packets will then be checked and
treated according to the valid filter settings.
U Session recovery
The Firewall enters all actual permitted connections into the connection list.
Entries disappear automatically from the connection list after a certain time
(timeout), when no data has been transmitted over this connection any more
re-triggering the timeout.
BAT54-Rail/F..
Release 7.54 06/08 265
Firewall 8.3 The BAT Firewall
Sometimes connections are ended according to the general TCP aging set-
tings, before data packets requested by an inquiry have been received by the
remote station. In this case perhaps an entry for a permitted connection still
exists in the connection list, but the connection itself is no more existing.
The parameter Session recovery determines the behavior of the Firewall for
packets that indicate a former connection:
D Always denied: The Firewall re-establishes the session under no circum-
stances and discards the packet.
D Denied for default route: The Firewall re-establishes the session only if
the packet wasnt received via the default route (e.g. Internet).
D Denied for WAN: The Firewall re-establishes the session only if the pack-
et wasnt received over one of the WAN interfaces.
D Always allowed: The Firewall re-establishes the connection in principle
if the packet belongs to a former connection of the connection list.
U Ping blocking
One - not undisputed - method to increase security is hiding the router. Based
loosely on the method: Who doesnt see me neither tries to attack me....
Many attacks begin with the searching for workstations and/or open ports by
actual harmless inquiries, e. g. with the help of the ping command or with a
portscan. Each answer to these inquiries, even the answer Im not here in-
dicates to the attacker that he has found a potential destination. Because
anybody who answers must be existing, too. In order to prevent this conclu-
sion, the BAT is able to suppress the answers to these inquiries.
In order to achieve this, the BAT can be instructed not to answer ICMP echo
requests any more. At the same time TTL-exceeded messages of a "trace
route" are also suppressed, so that the BAT cannot be found, neither by
"ping" nor by "trace route".
Possible settings are:
D Off: ICMP answers are not blocked.
D Always: ICMP answers are always blocked.
D WAN only: ICMP answers are blocked on all WAN connections.
D Default route only: ICMP answers are blocked on default route (usually
Internet).
BAT54-Rail/F..
266 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Apart from ICMP messages, also the behavior in case of TCP and UDP con-
nections gives information on the existence or non-existence of the ad-
dressed workstation. Depending on the surrounding network it can be useful
to simply reject TCP and UDP packets instead of answering with a TCP RE-
SET resp. an ICMP message (port unreachable), if no listener for the respec-
tive port exists. The desired behavior can be adjusted in the BAT.
Note: If ports without listener are hidden, this generates a problem on
masked connections, since the "authenticate" - resp. "ident" service does
no longer function properly (resp. do no longer correctly reject). The ap-
propriate port can so be treated separately (Mask authentication port
page 267).
Possible settings are:
D Off: All ports are closed and TCP packets are answered with a TCP reset.
D Always: All ports are hidden and TCP packets are silently discarded.
D WAN only: On the WAN side all ports are hidden and on the LAN side
closed.
D Default route only: Ports are hidden on the default route (usually Inter-
net) and closed on all other routes.
When TCP or UDP ports are hidden, inquiries of mail servers to authenticate
users can no more be answered correctly. Inquiries of the servers run into a
timeout, and delivery of mails will be considerably delayed.
Also when the TCP Stealth mode is activated, the Firewall detects the inten-
tion of a station in the LAN to establish a connection to a mail server. As a
result, the needed port will be opened for a short time (20 seconds) solely for
the authentication inquiry.
This behavior of the Firewall in TCP Stealth mode can be suppressed specif-
ically with the parameter Always mask authentication port, too.
Note: The activation of the option Mask authentication port can lead to con-
siderable delays for the dispatch and receipt of e. g. emails or news!
A mail or a news server, which requests any additional information from the
user with the help of this service, runs first into a disturbing timeout, before it
begins to deliver the mails. This service needs thus its own switch to hide
and/or to hold it conformingly.
The problem thereby is however that a setting, which hides all ports, but re-
jects the ident port is unreasonable - alone by the fact that rejecting the ident
port would make the BAT visible.
BAT54-Rail/F..
Release 7.54 06/08 267
Firewall 8.3 The BAT Firewall
The BAT offers now the possibility to reject ident inquiries only by mail and
news servers, and to discard those of all other PCs. For this, the ident inquir-
ies of the respective servers are rejected for a short time (20 seconds) when
a mail (SMTP, POP3 IMAP2) or a news server (NNTP) is calling up.
When the timeout is exceeded, the port will be hidden again.
A Firewall rule is at first defined by its name and some further options:
D On/Off switch: Is the rule active for the Firewall?
D Priority: Which is the priority of the rule? ( Page 268)
D Observe further rules: Should further Firewall rules be observed when
this rule applies to a data packet? ( Page 269)
D Create VPN rule: Is this Firewall rule also used to create a VPN rule?
( Page 269)
D Routing Tag: When applying the routing tag further information about for
instance the used service or protocol can be used for selecting the target
route. With this so called policy based routing a much better control of the
routing behaviour is possible (Policy-based routing page 358).
U Priority
When setting up the filter list of the Firewall rules, the BAT will automatically
sort the entries. Thereby the grade of detail will be considered: All specified
rules are observed at first, after that the general ones (e. g. Deny All).
If after the automatic sorting the desired behavior of the Firewall does not turn
out, it is possible to change the priority manually. The higher the priority of
the Firewall rule, the earlier it will be placed in the according filter list.
Note: For complex rule types please check the filter list as described in sec-
tion Firewall diagnosis page 295.
BAT54-Rail/F..
268 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U VPN rules
A VPN rule can receive its information about source and destination network
from Firewall rules.
By activating the option This rule is used to create VPN rules for a Firewall
rule, you determine that a VPN rule will be derived from this Firewall rule.
Apart from this basic information, a Firewall rule answers the question when
and/or on what it should apply to and which actions should be executed:
BAT54-Rail/F..
Release 7.54 06/08 269
Firewall 8.3 The BAT Firewall
BAT54-Rail/F..
270 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Firewall rule
Port?
Limit/trig-
Connection?
Packet ac-
Other
BAT RADIUS
N:N mapping
MAC/protocol filter
Virtual LANs (VLAN)
DHCP client / PPP
802.11i/WPA/
connection via LAN/
Encryption:
to
IP router
ADSL WLAN-2-
1
to
IP-Redirect
DSL
IP masquerading
DMZ
ISDN Configuration &
management:
Filter
Filter
WEBconfig, Telnet,
TFTP
IPX router
IPX over PPTP/
VPN
LANCAPI
U Connection
The connection of a Firewall rule defines to which data packets the rule
should refer to. A connection is defined by its source, its destination and the
used services. The following details can be used to specify the source or des-
tination:
D All stations
D The entire local network (LAN)
D Certain remote stations (described by the name of the remote site list)
D Certain stations of the LAN described by the host name)
D Certain MAC1 addresses
D Ranges of IP addresses
D Complete IP networks
BAT54-Rail/F..
Release 7.54 06/08 271
Firewall 8.3 The BAT Firewall
You can only operate with host names, when your BAT is able to transform
the names into IP addresses. For that purpose the BAT must have learned
the names via DHCP or NetBIOS, or the assignment must be entered stati-
cally in the DNS or IP routing table. An entry in the IP routing table can there-
fore assign a name to a whole network.
Note: If the source or the destination for a Firewall rule has not been deter-
mined at greater detail, the rule applies generally to data packets from all
stations resp. to all stations.
The service is determined by the combination of an IP protocol with respec-
tive source and/or destination port. For frequently used services (www, mail,
etc.) the appropriate combinations are already predefined in the BAT, others
can be compiled additionally as required.
U Condition
U Limit / Trigger
The limit or trigger describes a quantified threshold value that must be ex-
ceeded on the defined connection before the filter action gets executed for a
data packet. A limit is composed by the following parameters:
D Unit (kbit, kbyte or packets)
D Amount, that means data rate or number.
D Reference value (per second, per minute, per hour or absolute)
1. MAC is the abbreviation for Media Access Control and it is the crucial factor for communication inside of a LAN.
Every network device has its own MAC address. MAC addresses are worldwide unique, similar to serial numbers.
MAC addresses allow distinguishing between the PCs in order to give or withdraw them dedicated rights on an
IP level. MAC addresses can be found on most networking devices in a hexadecimal form (e.g.
00:A0:57:01:02:03).
BAT54-Rail/F..
272 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Additionally, you can adjust for the limit whether it refers to a logical connec-
tion or to all connections together, which exist between the defined destina-
tion and source stations via the corresponding services. Thus it is controlled
whether the filter takes effect, if e.g. all HTTP connections of the users in the
LAN exceed the limit in sum, or whether it is sufficient that only one of the
parallel established HTTP connections exceeds the threshold value.
For absolute values it is additionally possible to specify whether the counter
belonging to it will be reset to zero when the limit has been reached.
Note: In any case, data will be transferred if a limit has not been reached yet!
With a trigger value of zero a rule becomes immediately active, as soon
as data packets arrive for transmission on the specified connection.
U Packet action
U Further measures
The Firewall does not only serve to discard or accept the filtered data pack-
ets, but it can also take additional measures when a data packet has been
registered by the filter. The measures here are divided into the fields proto-
colling/notification and prevent further attacks:
D Send a Syslog message: Sends a message via the SYSLOG module to
a SYSLOG client, as defined in configuration field Log & Trace.
D Send an email message: Sends an email message to the administrator,
using the account specified in the configuration field Log & Trace.
D SNMP/LANmonitor: Sends a SNMP trap, that will be analyzed e. g. by
LANmonitor.
Note: Each of these three message measures leads automatically to an en-
try in the Firewall event table.
D Disconnect: Cuts the connection, over which the filtered packet has been
received.
BAT54-Rail/F..
Release 7.54 06/08 273
Firewall 8.3 The BAT Firewall
Note: On the occasion, the physical connection will be cut off (e. g. the Inter-
net connection), not only the logical connection between the two involved
PCs!
D Lock source address: Blocks the IP address from that the filtered packet
has been received for a given time.
D Lock target port: Blocks the destination port to that the filtered packet
has been sent for a given time.
Apart from the restrictions for the transfer of data packets, the Firewall can
also concede a special treatment to certain applications. QoS settings use
features of the Firewall to specifically identify data packets of certain connec-
tions or services.
Note: For further information about QoS and the appropriate configuration
please see chapter Quality of Service page 311.
An example:
Let us assume a filter named 'BLOCKHTTP', which blocks all access to a
HTTP server 192.168.200.10. In case some station would try to access the
server nevertheless, the filter would block any traffic from and to this station,
and inform the administrator via SYSLOG also.
BAT54-Rail/F..
274 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U SYSLOG notifications
U Notification by email
If the email system of the BAT is activated, then you can use the comfortable
notification by email. The device sends an email to the administrator as soon
as the firewall executes the appropriate action:
FROM: [email protected]
TO: [email protected]
SUBJECT: packet filtered
Date: 9/24/2002 15:06:46
The packet below
Src: 10.0.0.37:4353 {cs2} Dst: 192.168.200.10:80 {ntserver} (TCP)
45 00 00 2c ed 50 40 00 80 06 7a a3 0a 00 00 25 | E..,.P@. ..z....%
c0 a8 c8 0a 11 01 00 50 00 77 5e d4 00 00 00 00 | .......P .w^.....
60 02 20 00 74 b2 00 00 02 04 05 b4 | `. .t... ....
matched this filter rule: BLOCKHTTP
and exceeded this limit: more than 0 packets transmitted or received on
a connection
because of this the actions below were performed:
drop
block source address for 1 minutes
send syslog message
send SNMP trap
send email to administrator
BAT54-Rail/F..
Release 7.54 06/08 275
Firewall 8.3 The BAT Firewall
Sending the email from the BAT to the administrator only works if the right
email address is entered. Under LANconfig you can enter the email address
in the configuration area 'Firewall/QoS' under the tab 'General' .
Under WEBconfig or Telnet you can find the administrator email address as
follows:
BAT54-Rail/F..
276 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
BAT54-Rail/F..
Release 7.54 06/08 277
Firewall 8.3 The BAT Firewall
BAT54-Rail/F..
278 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U Allow All
U Deny All
The Deny All strategy proceeds at first according to the method Block all!.
The Firewall blocks completely the communication between the protected
network and the rest of the world. In a second step, the administrator opens
address ranges or ports, which are necessary e.g. for daily communication
with the Internet.
This approach ensures superior security for the LAN security compared to
the Allow All strategy, but may lead especially in its initial stages to difficulties
for the users. After activation of the Deny All strategy, some things just may
behave differently than before, some stations may not reached any more etc.
The demilitarized zone (DMZ) is a special range of the local network, which
is shielded by a Firewall both against the Internet and against the normal
LAN. All stations or servers that should be accessible from the unsecured
network (Internet) should be placed into this network. These include for ex-
ample own FTP and web servers.
The Firewall protects at first the DMZ against attacks from the Internet. Addi-
tionally, the Firewall protects also the LAN against the DMZ. To do so, the
Firewall is configured in this way that only the following accesses are possi-
ble:
D Stations from the Internet can access to the servers in the DMZ, but no
access from the Internet to the LAN is possible.
BAT54-Rail/F..
Release 7.54 06/08 279
Firewall 8.3 The BAT Firewall
D The stations of the LAN can access the Internet, as well as servers in the
DMZ.
D Servers of the DMZ have no access to the stations of the LAN. That guar-
antees that no cracked server of the DMZ becomes a security risk for
the LAN.
FTP server
Web server
Internet
Some BAT models support this structure by a separate LAN interface only
used for the DMZ. Looking at the path of data through the BAT, then the func-
tion of the Firewall for shielding the LAN against the DMZ becomes visible.
BAT54-Rail/F..
280 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
BAT RADIUS
N:N mapping
user manage- client / server
ment LAN interfaces
WAN interfaces
MAC/protocol filter
Virtual LANs (VLAN)
DHCP client / PPP
802.11i/WPA/
Encryption:
WLAN-1-8
IP router
ADSL WLAN-2-1
to
WLAN-2-8
IP-Redirect
DSL
IP masquerading
DMZ
ISDN Configuration &
management:
Filter
Filter
WEBconfig, Telnet,
TFTP
IPX router
IPX over PPTP/VPN
LANCAPI
A direct data exchange between LAN and DMZ via LAN bridge is not possible
if a dedicated DMZ port is used. The path from LAN to DMZ and vice versa
is therefore only possible through the router, and thus also only through the
Firewall! This shields the LAN against inquiries from the DMZ, similar to the
LAN against inquiries from the Internet.
Note: The shielding of the DMZ against the Internet on one side and the LAN
on the other is solved in many network structures with two separate Fire-
walls. When using a BAT with DMZ port, only one device for this setup is
needed, which e.g. results in a clearly simplified configuration.
For BAT devices with VoIP functions that were already integrated or added
in with a software option, the ports required for voice connections are acti-
vated automatically.
BAT54-Rail/F..
Release 7.54 06/08 281
Firewall 8.3 The BAT Firewall
On delivery there is exactly one entry in the Firewall rule table: WINS. This
rule prevents unwanted connection set-ups on the default route (gen. to the
Internet) by the NetBIOS protocol. Windows networks send inquiries in reg-
ular intervals into the network to find out if known stations are still available.
This leads in case of a time-based account of a network coupling to unwant-
ed connection set-ups.
Note: The BAT can prevent this by the integrated NetBIOS proxy also for net-
work couplings, by pretending an answer for the concerned resource, until
a real access takes place.
If no further Firewall rule will be entered, the local area network is protected
by the interaction of Network Address Translation and Stateful Inspection:
Only connections from the local area network produce an entry in the NAT
table, whereupon the BAT opens a communication port. The Stateful Inspec-
tion supervises communication via this port: Only packets, which belong ex-
actly to this connection may communicate via this port. For accesses from
the outside to the local network results thus an implicit "Deny All" strategy.
With the help of scripts firewall rules can easily be transmitted to device
and software (Scripting page 181). Example scripts are saved in the
BAT KnowledgeBase under www.hirschmann.com/support.
Note: If you operate a web server in your LAN, that has been permitted ac-
cess to this service from the outside (see IP masquerading page 369),
stations from the Internet can establish from the outside connections to
this server. The inverse masquerading has priority over the Firewall in this
case, as long as no explicit "Deny All" rule has been set.
BAT54-Rail/F..
282 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
For maximum protection and optimum control of the data traffic it is recom-
mended to prevent first any data transfer by the Firewall. Then only the nec-
essary functions and communication paths are allowed selectively. This
offers e.g. protection against so-called "Trojans" and/or e-mail viruses, which
set up actively an outgoing connection on certain ports.
The Deny All rule is by far the most important rule to protect local networks.
By this rule the Firewall operates according to the principle: All actions,
which are not explicitly allowed, remain forbidden! Only by this strategy
the administrator can be sure not to have forgotten an access method,
because only those accesses exist, which have been opened explicitly by
himself.
We recommend to set up the Deny All rule before connecting the LAN via
a BAT to the Internet. Then you can analyse in the logging table (to start e.
g. via LANmonitor), which connection attempts have been blocked by the
Firewall. With the help of this information the Firewall and the Allow rules
can be gradually extended.
BAT54-Rail/F..
Release 7.54 06/08 283
Firewall 8.3 The BAT Firewall
D If you want to permit a VPN dial-in to a BAT acting as VPN gateway, then
you need a Firewall rule allowing incoming communication from the client
to the local network:
D In case a VPN is not terminated by the BAT itself (e.g. a VPN Client in the
local area network, or BAT as Firewall in front of an additional VPN gate-
way), you'd have to allow IPSec and/or PPTP (for the "IPSec over PPTP"
of the VPN Client) ports additionally:
D For ISDN or V.110 dial-in (e.g. by HSCSD mobile phone) you have to al-
low the particular remote site (see also Configuration of remote stations
page 366):
D If you operate e.g. an own web server, you selectively allow access to the
server:
BAT54-Rail/F..
284 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
These rules can now be refined as needed - e.g. by the indication of minimum
and maximum bandwidths for the server access, or by a finer restriction on
certain services, stations or remote sites.
Note: The BAT automatically sorts Firewall rules when creating the filter list.
Thereby, the rules are sorted into the filter list on the basis of their level of
detail. First all specific rules are considered, afterwards the general ones
(e.g. Deny All). Examine the filter list in case of complex rule sets, as de-
scribed in the following section.
The fastest method to configure the Firewall is provided by the Firewall wiz-
ard in LANconfig:
BAT54-Rail/F..
Release 7.54 06/08 285
Firewall 8.3 The BAT Firewall
U LANconfig
The filters can be installed very comfortably with LANconfig. Starting from the
general register card "Firewall / QoS / Rules", you reach after "Add" or "Edit"
the dialogue to define the Firewall rules:
Within the dialogue for the definition of filter rules, the following options can
be found on different index cards:
D General: Here the name of the Firewall rule is specified, as well as if fur-
ther rules should be considered after this rule matched, and whether a
VPN rule should be derived from this rule.
BAT54-Rail/F..
286 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
D The option 'Observe further rules ...' can be used to create complex
functions ensuring e.g. certain bandwidths with QoS (Connection
page 271)
D The option 'This rule is used to create VPN rules' enables to utilize the
information about source and destination networks of this rule also to
define VPN networks.
D Actions: Here the Firewall actions are defined, consisting of condition,
trigger, packet action and further measures.
D QoS: Here you can assign minimum bandwidths for data packets speci-
fied by according Firewall rules (see also Defining minimum and maxi-
mum bandwidths page 328).
BAT54-Rail/F..
Release 7.54 06/08 287
Firewall 8.3 The BAT Firewall
D Services: Here the IP protocols, source and destination ports are speci-
fied for which the filter rule shall apply. For example, it can be specified
here that only access to web pages and emails shall be permissible.
BAT54-Rail/F..
288 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
U WEBconfig, Telnet
Under WEBconfig or Telnet the Firewall rules are configured in the following
menus and lists:
There is a special syntax in LCOS for the description of the Firewall rules.
This syntax allows to describe also complex relations for checking and treat-
ment of data packets within the Firewall just with a few characters.
Rules are defined in the rule table. Pre-defined objects can be saved in two
additional tables in order to prevent entering frequently used objects each
time again in LCOS syntax:
D The action table contains Firewall actions
D The object table contains stations and services
Note: Objects from these tables can be used for rule definition, but this is not
a must. They simply facilitate the use of frequently used objects.
BAT54-Rail/F..
Release 7.54 06/08 289
Firewall 8.3 The BAT Firewall
Rule table
The rule table combines different information to a Firewall rule. The rule con-
tains the protocol to be filtered, the source, the destination as well as the Fire-
wall action to be executed. For each Firewall rule there is an additional on/
off-switch, a priority, the option for a linkage with other rules and an activation
of the rule for VPN connections. General information concerning these pa-
rameters can be found in section Parameters of Firewall rules page 268.
The definition of the Firewall rules can be composed of entries of the object
table for protocols, services, stations ( Page 290), and of entries of the ac-
tion table for Firewall actions( Page 292). It can also contain direct descrip-
tions in the appropriate LCOS syntax (e. g. %P6 for TCP).
Note: For direct entering of rule parameters in LCOS syntax, the same guide-
lines apply as described in the following sections for protocols, source and
destination, as well as for Firewall actions.
Object table
The object table defines elements and objects that apply to the rule table of
the Firewall. Objects can be:
D Single PCs (MAC or IP address, host name)
D Entire networks
D Protocols
D Services (ports or port ranges, e. g. HTTP, Mail&News, FTP, ...)
BAT54-Rail/F..
290 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Note: When configuring via console (Telnet or terminal program), the com-
bined parameters (port, destination, source) must be embraced with in-
verted commas (character ").
BAT54-Rail/F..
Release 7.54 06/08 291
Firewall 8.3 The BAT Firewall
Action table
As described above, a Firewall action consists of condition, limit, packet ac-
tion and further measures. In the action table Firewall actions are composed
as any combination of the following elements:
D Conditions
BAT54-Rail/F..
292 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Note: If an action is given without any associated limit, then implicitly a pack-
et limit is assumed that is immediately exceeded with the first packet.
D Packet action
BAT54-Rail/F..
Release 7.54 06/08 293
Firewall 8.3 The BAT Firewall
BAT54-Rail/F..
294 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
When building the actual filter table, action objects get minimized similarly to
the address and service objects to the smallest necessary number, i.e. mul-
tiple definitions of an action get eliminated, and contradictory actions are
turned into the "safest". Thus e.g. %a (accept) and %d (drop) becomes only
%d, and %r (reject) and %d becomes %r.
A new window with the complete logging table opens by clicking the right
mouse button in the Firewall Event Log context menu. ( Page 295).
All lists and tables described in this section can be found under the following
menu options:
If an event occurred that had to be logged in either way, i.e. a log action was
specified with the receipt of a packet, or a report by e-mail, Syslog or SNMP
was generated, then this event is held in the logging table.
BAT54-Rail/F..
Release 7.54 06/08 295
Firewall 8.3 The BAT Firewall
If you call up the logging table via LANmonitor, it looks like the following de-
piction:
If you call up the logging table via WEBconfig, it looks like the following de-
piction:
BAT54-Rail/F..
296 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Note: All Firewall actions are likewise displayed within the IP router trace
(How to start a trace page 225). Furthermore, some BAT models have
a Firewall LED, which signals each filtered packet.
The filter list allows to examine filters generated by rules defined in the action,
object and rule table.
Note: Please note that manually entered filter rules do not generate a fault
indication and also no error message. If you configure filters manually,
you should in each case examine on the basis of the filter list whether the
desired filters were generated or not.
On Telnet level, the content of the filter list can be displayed with the com-
mand show filter:
BAT54-Rail/F..
Release 7.54 06/08 297
Firewall 8.3 The BAT Firewall
The individual fields in the filter list have the following meaning:
Entry Description
Idx. Current index
Prot Protocol to be filtered, e.g. 6 for TCP or 17 for UDP.
Src MAC Ethernet source address of the packet to be filtered or 000000000000, if the filter should apply
to all packets.
Src Source IP address or 0.0.0.0, if the filter should apply to all packets.
address
Source Source network mask, which determinates the source network together with the source IP
mask address, or 0.0.0.0, if the filter should apply to packets from all networks.
Q start Start source port of the packets to be filtered.
BAT54-Rail/F..
298 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Entry Description
Q end End source port of the packets to be filtered. Makes up the port range together with the start
source port, in which the filter takes effect. If start and end port are 0, then the filter is valid for
all source ports.
Dst MAC Ethernet destination address of the packet to be filtered or 000000000000, if the filter should
apply to all packets.
Dst Destination address or 0.0.0.0, if the filter should apply to all packets.
address
Dst mask Destination network mask, which determinates the destination network together with the desti-
nation IP address, or 0.0.0.0, if the filter should apply to packets to all networks.
Z start Start destination port of the packets to be filtered.
Z end Destination port of the packets to be filtered. Makes up the port range together with the start
destination port, in which the filter takes effect. If start and end port are 0, so the filter is valid for
all destination ports.
Action Into this column, the "main action" is unveiled as a text, which will be executed when the first
limit has been exceeded. The first limit can be also an implicit limit, e.g. if only one limit for the
restriction of the throughput was configured. Then an implicit limit - linked with an "accept"
action - is inserted. In this case, "accept" is unveiled as main action.
You can see the complete actions under the command show filter.
Linked Indicates whether it concerns a "first Match" rule (linked = no). Only with linked rules in the
case of applying of this rule, also further rules are evaluated.
Prio Priority of the rule having generated the entry.
BAT54-Rail/F..
Release 7.54 06/08 299
Firewall 8.3 The BAT Firewall
BAT54-Rail/F..
300 Release 7.54 06/08
Firewall 8.3 The BAT Firewall
Address, protocol and port of a destination station are filed in the port block
list, if blocking of the destination port on the destination station was selected
as a filters packet action. This table is likewise a sorted semi-dynamic table.
Sorting is done according to address, protocol and port. The table contains
the following elements:
The address of a station is filed in the host block list, if blocking of the sender
was selected in a filters packet action. This table is a sender address sorted
semi-dynamic table and contains the following elements:
BAT54-Rail/F..
Release 7.54 06/08 301
Firewall 8.4 Intrusion Detection
U IP Spoofing
BAT54-Rail/F..
302 Release 7.54 06/08
Firewall 8.4 Intrusion Detection
U Portscan Detection
Apart from the maximum number of port inquiries, fragment action and the
possible registration mechanisms, also these reactions are possible:
D The connection will be cut off.
BAT54-Rail/F..
Release 7.54 06/08 303
Firewall 8.5 Denial of Service
U SYN Flooding
SYN Flooding means that the aggressor sends in short distances TCP pack-
ets with set SYN flag and with constantly changing source ports on open
ports of its victim. The attacked computer establishes as a result a TCP con-
nection, replies to the aggressor a packet with set SYN and ACK flags and
waits now in vain for the confirmation of the connection establishment. Hun-
dreds of "half-open" TCP connections are staying thereby, and just consume
resources (e.g. memory) of the attacked computer. This procedure can go
that far that the victim can accept no more TCP connection or crashes due to
the lack of memory.
BAT54-Rail/F..
304 Release 7.54 06/08
Firewall 8.5 Denial of Service
U Smurf
The Smurf attack works in two stages and paralyzes two networks at once.
In the first step a Ping (ICMP echo Request) packet with a falsified sender
address is sent to the broadcast address of the first network, whereupon all
workstations in this network answer with an ICMP echo Reply to the falsified
sender address, which is located in the second network. If the rate of incom-
ing echo requests is high enough, as well as the number of answering work-
stations, then the entire incoming traffic of the second network is blocked
during the attack and, moreover, the owner of the falsified address cannot re-
ceive normal data any more during the attack. If the falsified sender address
is the broadcast address of the second network, also all workstations are
blocked in this network, too.
In this case the DoS recognition of the BAT blocks passing packets, which
are addressed to the local broadcast address.
U LAND
The land attack is a TCP packet that is sent with set SYN flag and falsified
sender address to the victim workstation. The bottom line is that the falsified
sender address is equal to the address of the victim. With an unfortunate im-
plementation of TCP, the victim interprets the sent SYN-ACK again as SYN,
and a new SYN-ACK is sent. This leads to a continuous loop, which lets the
workstation freeze.
In a more up to date variant, the loopback address 127.0.0.1 is taken as
sender address, but not the address of the attacked workstation. Sense of
this deception is to outwit personal firewalls, which react in fact to the classi-
cal variant (sender address = destination address), but which pass through
the new form without hindrance. This variant is also recognized and blocked
by a BAT.
U Ping of Death
The Ping of Death belongs to those attacks, which use errors when fragment-
ed packets are reassembled. This functions as follows:
BAT54-Rail/F..
Release 7.54 06/08 305
Firewall 8.5 Denial of Service
In the IP header there is a field "fragment offset" that indicates in which place
the received fragment is to be assembled into the resulting IP packet. This
field is 13 bits long and gives the offset in 8 byte steps, and can form an offset
from 0 to 65528. With a MTU on the Ethernet of 1500 bytes, an IP packet can
be made up to 65528 + 1500 - 20 = 67008 bytes. This can lead to an overrun
of internal counters or to buffer overruns, and thus it can provoke the possi-
bility to the aggressor of implementing own code on the victim workstation.
In this case, the Firewall offers two possibilities:
Either, the Firewall reassembles the entire incoming packet and examines its
integrity, or solely the fragment which goes beyond the maximum packet size
is rejected. In the first case, the Firewall itself can become the victim when its
implementation was incorrect. In the second case "half" reassembled pack-
ets accumulate at the victim, which are only rejected after a certain time,
whereby a new Denial of Service attack can result thereby if the memory of
the victim is exhausted.
U Teardrop
The Teardrop attack works with overlapping fragments. After the first frag-
ment another one is sent, which overlaps completely within the first one, i.e.
the end of the second fragment is located before the end of the first. If - due
to the indolence of the IP stack programmer - it is simply counted "new end"
- "old end" when determining the number of bytes to copy for the reassembly,
then a negative value results, resp. a very large positive value, by which dur-
ing the copy operation parts of the memory of the victim are overwritten and
thereupon the workstation crashes.
The Firewall has again two possibilities:
Either the Firewall reassembles and rejects if necessary the entire packet, or
it holds only minimum offset and maximum end of the packet and rejects all
fragments, whose offset or end fall into this range. In the first case the imple-
mentation within the Firewall must be correct, so that the Firewall does not
become the victim itself. In the other case "half" reassembled packets accu-
mulate again at the victim.
BAT54-Rail/F..
306 Release 7.54 06/08
Firewall 8.5 Denial of Service
U Bonk/Fragrouter
Bonk is a variant of the Teardrop attack, which targets not at crashing the at-
tacked computer, but to trick simple port filter Firewalls, which accept also
fragmented packets and thus to penetrate into the network being protected.
During this attack, the UDP or TCP Header of the first fragment is overwritten
by skillful choice of the fragment offset. Thereby, simple port filter Firewalls
accept the first packet and the appropriate fragments while overwriting the
first packet's header by the second fragment. Thus suddenly a permissible
packet is created, which rather actually should be blocked by the Firewall.
Concerning this occurrence, the Firewall can itself either reassemble or filter
only the wrong fragment (and all following), leading to the problems already
indicated by either one of the other solutions above.
Note: By default installation all items are configured as "secure", i.e. maximal
100 permissible half-open connections by different workstations (see
SYN Flooding), at most 50 half-open connections of a single computer
(see Portscan) of fragmented packets to be reassembled.
BAT54-Rail/F..
Release 7.54 06/08 307
Firewall 8.5 Denial of Service
Note: In order to drastically reduce the susceptibility of the network for DoS
attacks in advance, packets from distant networks may be only accepted,
if either a connection has been initiated from the internal network, or the
incoming packets have been accepted by an explicit filter entry (source:
distant network, destination: local area network). This measure already
blocks a multitude of attacks.
For all permitted accesses explicitly connection state, source addresses and
correctness of fragments are tracked in a BAT. This happens for incoming
and for outgoing packets, since an attack could be started also from within
the local area network.
This part is configured centrally in order not to open a gate for DoS attacks
by incorrect configuration of the Firewall. Apart from specifying the maximum
number of half-open connections, fragment action and possible notification
mechanisms, also these more extensive possibilities of reaction exist:
D The connection will be cut off.
D The sender address will be blocked for an adjustable period of time.
D The destination port of the scan will be blocked for an adjustable period
of time.
BAT54-Rail/F..
308 Release 7.54 06/08
Firewall 8.5 Denial of Service
WEBconfig, Telnet
The behavior of the DoS detection and blocking can be configured here un-
der WEBconfig or Telnet:
BAT54-Rail/F..
Release 7.54 06/08 309
Firewall 8.5 Denial of Service
WEBconfig, Telnet
With WEBconfig or Telnet the suppression of responses can be configured
here:
BAT54-Rail/F..
310 Release 7.54 06/08
Quality of Service 9.1 Why QoS?
9 Quality of Service
This chapter dedicates itself to quality: Under the generic term Quality of Ser-
vice (short: QoS) those LCOS functions are summarized, which are con-
cerned with the guarantee of certain service availabilities.
BAT54-Rail/F..
Release 7.54 06/08 311
Quality of Service 9.2 Which data packets to prefer?
BAT54-Rail/F..
312 Release 7.54 06/08
Quality of Service 9.2 Which data packets to prefer?
U What is DiffServ?
BAT54-Rail/F..
Release 7.54 06/08 313
Quality of Service 9.2 Which data packets to prefer?
For BAT devices with VoIP functions that were already integrated or added
in with a software option, the QoS settings for SIP calls are defined auto-
matically.
For receiving bandwidth control, packets can be buffered and only belatedly
confirmed. Thus TCP/IP connections regulate themselves automatically on a
smaller bandwidth.
Each WAN interface is assigned a maximum reception bandwidth. This
bandwidth will be accordingly degraded by every QoS rule that guarantees a
minimum bandwidth of reception on this interface.
D If the QoS rule has been defined connection-related, the reserved band-
width will be unblocked immediately after releasing the connection and
the maximum available bandwidth will increase accordingly on the WAN
interface.
D If the QoS rule has been defined globally, then the reserved bandwidth
will be unblocked only after the ending of the last connection.
BAT54-Rail/F..
314 Release 7.54 06/08
Quality of Service 9.3 The queue concept
U Combination possible
BAT54-Rail/F..
Release 7.54 06/08 315
Quality of Service 9.3 The queue concept
As long as the interval for the minimum bandwidth is not exceeded (i.e.
up to the end of the current second), all packets in this queue are treated
without further special priority. All packets of this queue, of the "secured
queue" and the "standard queue" share now the existing bandwidth. The
packets are taken in order from the queues when sending in exactly the
same sequence, in which they have been placed into these queues. If
the interval runs off, all blocks, which are at this time still in the "Urgent
queue II" up to the exceeding of the in each case assigned minimum
bandwidth, are placed again into the "Urgent queue I". The rest remains
in the "Urgent queue II".
With this procedure it is guaranteed that prioritized connections do not
crush the remaining data traffic.
D Secured queue
This queue does not have a separate priority. However, packets in this
queue are never dropped (transmission guaranteed).
D Packets with ToS High Reliability
D Packets with DiffServ Assured Forwarding
D Standard queue
The standard queue contains all not classified data traffic. Packets in this
queue are dropped at first when packets cannot be delivered fast
enough.
The queue concept can, however, only work out when a traffic congestion
of data packets has been accumulated at the interface from LAN to the WAN.
Such a congestion is created when the interface within the BAT can submit
fewer data to the WAN than data are delivered in peak periods from the LAN.
This is e.g. the case, if the interface to the WAN is an integrated ADSL inter-
face with comparatively low transmission speed (upstream). The integrated
ADSL modem automatically reports back to the BAT how many data packets
it is still able to receive, and thus brakes the data stream already within the
router. As a result, the queues will automatically fill up.
n x 64 kBps
54 MBps
Internet
Queues
BAT54-Rail/F..
316 Release 7.54 06/08
Quality of Service 9.3 The queue concept
n x 64 kBps
54 MBps
Internet
dropped data
To solve this problem, the transfer rate of the BATs WAN interface will be
reduced artificially. This interface will thereby be adjusted to the transfer rate
that is available for the actual data transport towards the WAN. For a stan-
dard DSL connection, the DSL interface is thus adjusted in the BAT to the
appropriate upstream rate (e.g. 128 kbps).
Data rates indicated by providers are mostly likely net rates. The gross
data rate, which is available for the interface is a little bit higher than the net
data rate guaranteed by the provider. If you know the gross data rate of
your provider, you can enter this value for the interface and slightly in-
crease in this way the data throughput. However, with entering the net data
rate you play safe in any case!
BAT54-Rail/F..
Release 7.54 06/08 317
Quality of Service 9.4 Reducing the packet length
BAT54-Rail/F..
318 Release 7.54 06/08
Quality of Service 9.4 Reducing the packet length
The FTP transfer uses quite large data packets of 1500 byte, whereas, the
Voice over IP connection sends packets of e.g. 24 byte net in relatively short
intervals. If FTP packets are in the sending queue of the BAT just at the mo-
ment when a VoIP packet is to be transferred, then the VoIP packet can only
be sent after the line is free again. Depending on the transfer rate of the con-
nection, this may cause a noticeable delay of the speech transmission.
This annoying behavior can be compensated if all data packets, which are
not belonging to the connection preferred by QoS, do not exceed a certain
packet length. While doing so, the data packets of the FTP connection will be
divided into such small sections that the time-critical VoIP connection is able
to deliver the packets without noticeable delay within the required time slots.
A resulting delay has no disadvantageous effect to the TCP-secured FTP
transfer.
BAT54-Rail/F..
Release 7.54 06/08 319
Quality of Service 9.5 QoS parameters for Voice over IP applica-
BAT54-Rail/F..
320 Release 7.54 06/08
Quality of Service 9.5 QoS parameters for Voice over IP applica-
For BAT devices with VoIP functions that were already integrated or added
in with a software option, the QoS settings for SIP calls are defined auto-
matically.
20 %
10 %
10 ms
5%
In case of a delay of not more than 100 ms, and a packet loss of less than
5%, the quality is felt like a normal telephone connection. In case of more
than 150 ms delay and less than 10% packet loss, the telephone user per-
ceives still a very good quality. Up to 300 ms and 20%, some listeners feel
this quality like still suitable, beyond that the connection is considered as no
more suitable for voice transmission.
Apart from the average delay time, also a variation in this delay is perceived
by the human ear. Delay differences of the voice information from sender to
addressee (jitter) are still tolerated up to 10 ms, and values beyond consid-
ered as irritating.
Accordingly, a VoIP connection should be configured such that the criteria for
good speech quality are met: Packet loss up to 10%, delay up to 150 ms and
jitter up to 10ms.
D Jitter can be removed in the receiving station by an appropriate buffer. In
this buffer (jitter buffer) the packets are stored intermediately, and passed
on at a constant rate to the addressee. By this intermediate buffering, the
delay variations due to individual transmission times of the individual
packets can be removed.
D The delay is influenced by several components:
BAT54-Rail/F..
Release 7.54 06/08 321
Quality of Service 9.5 QoS parameters for Voice over IP applica-
Processing Processing
Serialization
Propagation
D Apart from the general loss by network transmission, the packet loss is
significantly influenced by the jitter buffer. If packets arrive with a larger
delay than it can be balanced by the jitter buffer, the packets will be dis-
carded and will increase the packet loss. The larger the jitter buffer, the
smaller is the loss. Conversely, the entire delay will increase with the jitter
buffer size. That means for configuration, that the jitter buffer should be
selected as small as the quality can be considered still as sufficient.
In detail, delay is determined especially by the codec used, the resulting
packet size and the available bandwidth:
150ms
D The time for processing is determined by the used codec. For a sampling
time of 20 ms, exactly each 20 ms a new packet is generated. Times for
compression can mostly be neglected.
BAT54-Rail/F..
322 Release 7.54 06/08
Quality of Service 9.5 QoS parameters for Voice over IP applica-
D The time for handing over the packet to the interface is defined by the quo-
tient of packet size and available bandwidth:
A 512 byte packet of an FTP connection occupies the line at 128 Kbps
upstream for at least 32 ms.
Besides, the packets of the VoIP connection are often much larger than
the pure net payload. The additional headers of the IP and Ethernet
packets, as well eventual IPsec headers have to be added as well. The
net load results from the product of net data rate and sampling time of
the used codec. For all codecs, each 40 bytes UDP header and at least
20 bytes for the IPSec header must be added (RTP and IPSec headers
can be larger, depending on the configuration).
The following table is an overview of bit rates for various VoIP codecs for
voice connections over VPN:
D IP payload: Voice payload + 40 byte header (12 byte RTP; 8 byte UDP;
20 byte IP header)
D IPSec payload: IP paket + padding + 2 byte (padding length & next
header) = multiple of the IPSec initialization vector
BAT54-Rail/F..
Release 7.54 06/08 323
Quality of Service 9.6 QoS in sending or receiving direction
Caution: The values in the table apply to the use of AES. With other en-
cryption methods the resulting package may vary on a minor degree.
Note: Further information on bandwidth requirements for Voice over IP with
IPSec is available in the BAT techpaper Performance Analysis of BAT
Routers.
D The time for transmission via Internet depends on the distance (about 1
ms per 200 km), and on the thereby passed routers (about 1 ms per hop).
This time can be approximated by the half average ping time to the re-
mote station.
D The jitter buffer can be adjusted directly at many IP telephones, e.g. as
fixed number of packets, which should be used for buffering. The tele-
phones load then up to 50% of the adjusted packets and begin afterwards
to replay. The jitter buffer correspond therefore to half of the entered pack-
ets multiplied with the sampling time of the codec.
D Conclusion: The total delay is composed as follows for the according
bandwidth, a ping time of 100 ms to the remote station and a jitter buffer
of 4 packets for both codecs in this example:
BAT54-Rail/F..
324 Release 7.54 06/08
Quality of Service 9.7 QoS configuration
The differences are unveiled by looking at a FTP transfer. A client of the LAN
is connected to the Internet through a BAT.
D During an active FTP session, the client sends by the PORT command
the information to the server, on which port the DATA connection is ex-
pected. As the result, the server establishes the connection to the client
and sends the data in the same direction. In this case, the logical connec-
tion as well as the real data stream over the interface go from the server
to the client, and the BAT takes both as the receiving direction.
D Different is the case of a passive FTP session. Here the client itself estab-
lishes the connection to the server. The logical connection setup thus is
from client to server, but the data transmission over the physical interface
flows in the reverse direction from server to client.
With standard settings, a BAT assumes the sending or receiving direction de-
pending on the logical connection setup. Because such a point of view may
not be easy to follow in certain application scenarios, the point of view can
alternatively be changed to the flow of the physical data stream.
Note: The differentiation between sending and receiving direction applies
only to the installation of maximum bandwidths. For a guaranteed mini-
mum bandwidth, as well as for fragmentation and PMTU reduction always
the physical data transfer via the respective interface applies as the direc-
tion!
LANconfig
For configuration with LANconfig, select the configuration field 'IP router'. Ad-
just on index card 'General' whether the 'Type of service field' or alternatively
the 'DiffServ field' is to be observed for prioritization of data packets. When
both options are turned off, the ToS/DiffServ field will be ignored.
BAT54-Rail/F..
Release 7.54 06/08 325
Quality of Service 9.7 QoS configuration
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, your decision for the evaluation
of the ToS or DiffServ fields are entered at the following places:
The code points from the DiffServ field can be evaluated by Firewall rules for
further control of QoS parameters such as minimum bandwidth or PMTU re-
duction.
LANconfig
The parameters for evaluating the DiffServ fields are adjusted when defining
the QoS rule in LANconfig:
BAT54-Rail/F..
326 Release 7.54 06/08
Quality of Service 9.7 QoS configuration
According to your selection of the DSCP type (BE, CS, AF, EF) the valid val-
ues can be adjusted in additional drop down lists. Alternatively, the DSCP
decimal value can be entered directly. A table listing valid values can be
found under What is DiffServ? page 313.
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the parameters are entered at
the following places into a new Firewall rule:
BAT54-Rail/F..
Release 7.54 06/08 327
Quality of Service 9.7 QoS configuration
D The option 'Action only for default route' limits the rule to those pack-
ets, which are sent or received via default route.
BAT54-Rail/F..
328 Release 7.54 06/08
Quality of Service 9.7 QoS configuration
D The option 'Action only for VPN route' limits the rule to those packets,
which are sent or received via VPN tunnel.
D The option 'Forced' defines a static reservation of bandwidth. Band-
width reserved in this way cannot be used for any other connections,
even while the preferred connection is inactive.
D The option 'Per connection' resp. 'Globally' specifies, whether the min-
imum bandwidth set here is valid for each single connection corre-
sponding to this rule (per connection), or, if this should be the upper
limit for the sum of all connections together (globally).
D Like for other Firewall rules, index cards 'Stations' and 'Services' deter-
mine for which stations in the LAN / WAN and for which protocols this rule
applies.
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the minimum resp. maximum
bandwidths are entered into a new Firewall rule at the following places:
BAT54-Rail/F..
Release 7.54 06/08 329
Quality of Service 9.7 QoS configuration
LANconfig
Data rate restrictions for Ethernet, DSL and DSLoL interfaces are entered in
LANconfig under configuration field 'Interfaces' on index card 'WAN' within
the settings for the different WAN interfaces:
WEBconfig, Telnet
Under WEBconfig or Telnet the restrictions of data transfer rates for Ether-
net, DSL and DSLoL interfaces are entered at the following places:
Note: Only upstream and downstream rates are indicated by Kbps, external
overhead in bytes/packet.
BAT54-Rail/F..
330 Release 7.54 06/08
Quality of Service 9.7 QoS configuration
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the interpretation of the data
transfer direction is specified at the following places in a new Firewall rule by
parameters R for receive, T for transmit (send) and W for reference to
the WAN interface:
BAT54-Rail/F..
Release 7.54 06/08 331
Quality of Service 9.7 QoS configuration
D The reduction refers to all packets, which will be sent to the interface and
which do not correspond to the rule.
D Not packets of certain protocols are reduced, rather than all packets glo-
bally on that interface
For BAT devices with VoIP functions that were already integrated or added
in with a software option, fragmentation and PMTU reduction can be set
separately for SIP calls.
LANconfig
The length reduction of the data packets is set in LANconfig when defining
the QoS rule:
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the reduction is entered at the
following places in a new Firewall rule by parameter P for PMTU reduction
(Path MTU, MTU = Maximum Transmission Unit) and F for the fragment
size:
BAT54-Rail/F..
332 Release 7.54 06/08
Quality of Service 9.8 QoS for WLANs (IEEE 802.11e)
Note: PMTU reduction and fragmentation refer always to the physical con-
nection. Indicating parameter W for WAN sending direction is not re-
quired here and hence will be ignored if existing.
The following example shows a setting for Voice over IP telephony:
This rule defines the minimum bandwidth for sending and receiving to 32
Kbps, forces and reduces the PMTU while sending and receiving to packets
of 256 byte size. For the TCP connection, the maximum segment size of the
local workstation is determined to 216, so that the server will send packets of
maximum 256 byte (reduction of the PMTU in sending and receiving direc-
tion).
BAT54-Rail/F..
Release 7.54 06/08 333
Quality of Service 9.8 QoS for WLANs (IEEE 802.11e)
A BAT access point can activate 802.11e for each of its physical WLAN net-
works separately.
BAT54-Rail/F..
334 Release 7.54 06/08
Virtual LANs (VLANs) 10.1 What is a Virtual LAN?
BAT54-Rail/F..
Release 7.54 06/08 335
Virtual LANs (VLANs) 10.2 This is how a VLAN works
D Data traffic of certain logical units should be transmitted with a specific pri-
ority compared to other network users.
An example to clarify: A switch is connected to a hub within a LAN, which
connects four stations from the marketing department to the network. One
server and two stations of the accounting department are directly connected
to the switch. The last section is the base station of a wireless network, where
four WLAN clients reside from the sales department.
The stations from marketing and sales should be able to communicate with
each other. Additionally, they should be able to access the server. The ac-
counting department needs also access to the server, but should otherwise
be shielded against the other stations.
Hub WLAN
base station
Switch
BAT54-Rail/F..
336 Release 7.54 06/08
Virtual LANs (VLANs) 10.2 This is how a VLAN works
D VLAN ID: A unique number describes the virtual LAN. This ID defines the
belonging of data packets a logical (virtual) LAN. With this 12 bit value it
is possible to define up to 4094 different VLANs (VLAN IDs 0 and 4095
are reserved resp. inadmissible).
Note: VLAN ID 1 is used by many devices as the Default VLAN ID. Con-
cerning unconfigured devices, all ports belong to this Default VLAN. How-
ever, this assignment can also be changed by configuration. (The port
table page 341).
D Priority: The priority of a VLAN-tagged data packet is indicated by a 3 bit
value. 0 represents the lowest priority, 7 the highest one. Data packets
without VLAN tag are treated with priority 0.
This additional field makes the MAC frames longer than actually allowed.
These overlong packets can only be recognized and evaluated by VLAN-
capable stations and switches. Frame tagging incidentally leads to the de-
sired behavior for network users without VLAN support:
D Switches without VLAN support simply pass on these data packets and
ignore the additional fields within the MAC frame.
D Stations without VLAN support are not able to recognize the protocol type
due to the inserted VLAN tag and discard the packets silently.
Note: Older switches in the LAN are perhaps not able to pass on correctly
the overlong frames between the individual ports and will reject the
tagged packets.
BAT54-Rail/F..
Release 7.54 06/08 337
Virtual LANs (VLANs) 10.2 This is how a VLAN works
Data packet without VLAN tag Data packet with VLAN ID=3
BAT54-Rail/F..
338 Release 7.54 06/08
Virtual LANs (VLANs) 10.2 This is how a VLAN works
VLAN ID=3
By setting up a virtual LAN between the base stations and the administrators
switch, management data is shielded against all public traffic on the LAN.
The flexibility of the modern world of work raises new challenges for admin-
istrators concerning planning and maintenance of network structures. The
occupation of the rooms by leaseholders changes permanently in public of-
fice buildings, and also inside of a company, teams are often newly assem-
bled. In both cases, the individual units must have an independent, protected
LAN. But this task is very burdensome to realize by hardware changes, or
even not at all, because e.g. only one single central cabling exists in the office
building.
BAT54-Rail/F..
Release 7.54 06/08 339
Virtual LANs (VLANs) 10.3 Configuration of VLANs
Company Company A,
A, sales accounts dep.
VLAN ID=3, 5, 11
Virtual LANs enable to perform this task in a very smart way. Also when de-
partments or companies change at a later time inside of the building, the net-
work structure can be easily adjusted.
All network users in this example use the central Ethernet, which is, like the
connected devices, supervised by a service provider. Company A has three
departments on two floors. The sales department can communicate with the
administration department via VLAN ID 3, the accounts department with the
administration via VLAN ID 5. The networks of accounts department and
sales do not see each other. Company B is also shielded by VLAN ID 11
against all other networks, only the service provider can access all devices
for maintenance purposes.
10.3Configuration of VLANs
Note: VLAN technology functions are presently only supported by BAT
Router devices.
BAT54-Rail/F..
340 Release 7.54 06/08
Virtual LANs (VLANs) 10.3 Configuration of VLANs
The configuration of BAT Router devices within the VLAN realm has to per-
form two important tasks:
D Defining virtual LANs and assigning them a name, a VLAN ID and the af-
fected interfaces.
D Defining for the interfaces how to proceed with data packets with or with-
out VLAN tags.
BAT54-Rail/F..
Release 7.54 06/08 341
Virtual LANs (VLANs) 10.3 Configuration of VLANs
BAT54-Rail/F..
342 Release 7.54 06/08
Virtual LANs (VLANs) 10.3 Configuration of VLANs
The button Port table opens a drop down list where a VLAN port can be se-
lected for editing:
BAT54-Rail/F..
Release 7.54 06/08 343
Virtual LANs (VLANs) 10.3 Configuration of VLANs
BAT54-Rail/F..
344 Release 7.54 06/08
Virtual LANs (VLANs) 10.4 Configurable VLAN Protocol ID
BAT54-Rail/F..
Release 7.54 06/08 345
Virtual LANs (VLANs) 10.5 Configurable VLAN IDs
BAT54-Rail/F..
346 Release 7.54 06/08
Virtual LANs (VLANs) 10.6 VLAN tags on layer 2/3 in the Ethernet
BAT54-Rail/F..
Release 7.54 06/08 347
Virtual LANs (VLANs) 10.6 VLAN tags on layer 2/3 in the Ethernet
D Routing method
D Normal: TOS/DiffServ field is ignored.
D Type-Of-Service: The TOS/DiffServ field is regarded as a TOS field;
the bits 'low delay' and 'high reliability' will be evaluated.
D DiffServ: The TOS/DiffServ field is regarded as a DiffServ field. After
evaluating the precedence, packets with the code points 'AFxx' are
saved and packets with the code points 'EF' receive preferential treat-
ment. All other packets are transmitted as normal.
D Layer2-Layer3 tagging
The setting for Layer2-Layer3 tagging regulates the behavior when a
data packet is received.
D Off: VLAN tags are ignored.
D On: Priority bits in the VLAN tag are always copied to the precedence
of the DSCP.
D Automatic: Priority bits in the VLAN tag are only copied to the DSCP
precedence if this is '000'.
BAT54-Rail/F..
348 Release 7.54 06/08
Virtual LANs (VLANs) 10.7 VLAN tags for DSL interfaces
D Layer2-Layer3 tagging
The setting for Layer3-Layer2 tagging regulates the behavior when a
data packet is transmitted.
D Off: VLAN tags are not generated.
D On: VLAN tags with priority bits originating from the DSCP precedence
will be generated if the recipient has sent at least one tagged packet.
D VLAN ID
ID used to explicitly identify the VLAN over the DSL connection.
D Default: 0
With VLAN ID '0' only untagged packets are accepted; with any other
VLAN ID only packets with the corresponding tag are accepted.
BAT54-Rail/F..
Release 7.54 06/08 349
Virtual LANs (VLANs) 10.8 VLAN Q-in-Q tagging
D Tagging mode
Controls the processing and assignment of VLAN tags at this port.
D Never: Outbound packets are not given a VLAN tag at this port. Incom-
ing packets are treated as though they have no VLAN tag. If incoming
packets have a VLAN tag, it is ignored and treated as though it were
part of the packet's payload. Incoming packets are always assigned to
the VLAN defined for this port.
D Unconditional: Outgoing packets at this port are always assigned with
a VLAN tag, irrespective of whether they belong to the VLAN defined
for this port or not. Incoming packets must have a VLAN tag, otherwise
they will be dropped.
D Mixed: Allows mixed operation of packets with and without VLAN tags
at the port. Packets without a VLAN tag are assigned to the VLAN
defined for this port. Outgoing packets are given a VLAN tag unless
they belong to the VLAN defined for this port.
D Ingress-mixed: Arriving (ingress) packets may or may not have a
VLAN tag; outbound (egress) packets are never given a VLAN tag.
D Default: Ingress mixed
BAT54-Rail/F..
350 Release 7.54 06/08
Virtual LANs (VLANs) 10.8 VLAN Q-in-Q tagging
D Allow all VLANs (allows packets from other VLANs to enter this port)
This option defines whether tagged data packets with any VLAN ID should
be accepted, even if the port is not a "member" of this VLAN.
D Values: On, off
D Default: On
D Port VLAN ID
This port ID has two functions:
D Untagged packets received at this port in 'Mixed' or 'Ingress-mixed'
mode are assigned to this VLAN, as are all ingress packets received
in 'Never' mode.
D In the 'Mixed' mode, this value determines whether outgoing packets
receive a VLAN tag or not: Packets assigned to the VLAN defined for
this port are given no VLAN tag; all others are given a VLAN tag.
D Values: 1 to 4094
D Default: 1
BAT54-Rail/F..
Release 7.54 06/08 351
Virtual LANs (VLANs) 10.8 VLAN Q-in-Q tagging
BAT54-Rail/F..
352 Release 7.54 06/08
Routing and WAN connections 11.1 General information
This chapter describes the most important protocols and configuration en-
tries used for WAN connections. It also shows ways to optimize WAN con-
nections.
11.1General information
WAN connections are used for the following applications.
D Internet access
D LAN to LAN coupling
D Remote access
WAN connections over highspeed ports (e.g. DSL connections) use the IP
standard for transmitting packets. Devices with an ISDN interface provide be-
side IP additionally IPX.
BAT54-Rail/F..
Release 7.54 06/08 353
Routing and WAN connections 11.1 General information
DSL/ISDN/
ADSL Internet
BAT
Provider
BAT54-Rail/F..
354 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
11.2IP routing
An IP router works between networks which use TCP/IP as the network pro-
tocol. This only allows data transmissions to destination addresses entered
in the routing table. This section explains the structure of the IP routing table
of an Hirschmann router, as well as the additional functions available to sup-
port IP routing.
BAT54-Rail/F..
Release 7.54 06/08 355
Routing and WAN connections 11.2 IP routing
You also use the IP routing table to tell the router the length of this route's
path so that it can select the most suitable route in conjunction with IP RIP
where there are several routes to the same destination. The default setting
for the distance to another router is 2, i.e. the router can be reached directly.
All devices which can be reached locally, such as other routers in the same
LAN or workstation computers connected via proxy ARP are entered with the
distance 0. The quality level of this route will be reduced if the entry ad-
dressed has a higher distance (up to 14). Unfavorable routes like this will
only be used if no other route to the remote station in question can be found.
BAT54-Rail/F..
356 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
The router transmits the appropriate data packets to the IP address and
network mask to this remote station.
D If the remote station is a router in another network or an individual
workstation computer the name of the remote station.
D If the router on the network cannot address the remote station itself,
then the IP address of another router which knows the path to the des-
tination network is entered.
The router name indicates what should happen with the data packets
that match the IP address and network mask.
D Routes with the entry '0.0.0.0' identify exclusion routes. Data packets
for this zero route are rejected and are not routed any further. That
way routes which are forbidden on the Internet (private address spac-
es, e.g. '10.0.0.0'), for example, are excluded from transmission.
D If an IP address is input as router name, this is a locally available rout-
er, which is responsible for transfer of the relevant data packets.
D Distance
Number of routers between your own and the destination router. This
value is often equated with the cost of the transmission and used to dis-
tinguish between inexpensive and expensive call paths for wide-area
connections. The distance values entered are propagated as follows:
D All networks which can be reached while a connection exists to a des-
tination network are propagated with a distance of 1.
D All non-connected networks are propagated with the distance entered
in the routing table (but with a minimum distance of 2) as long as a free
transmitting channel is still available.
D The remaining networks are propagated with a distance of 16
(= unreachable) if there are no longer any channels available.
D Remote stations connected using proxy ARP are an exception to this.
These proxy hosts are not propagated at all.
D Masquerading
Use the 'Masquerade' option in the routing table to inform the router
which IP addresses to use when transferring packets from local net-
works.
For further information see the section IP masquerading page 369.
BAT54-Rail/F..
Release 7.54 06/08 357
Routing and WAN connections 11.2 IP routing
Firewall rule
work Destination: all
Destination: all Port: 80
Data packet with Port: 80 Action: Transfer Data packet rout-
target address in Action: Transfer ed to the Internet
Internet Tag: 1 Tag: 0
D With load balancing, the data traffic for selected protocols is diverted over
a certain DSL port that uses an additional external ADSL modem.
D A server in the local network is only supposed to be accessible from the
WAN via a fixed IP address; this is routed via a certain WAN interface.
D VPN traffic is forwarded to a VPN tunnel with dynamic end points by using
the routing tag '0'; the company's remaining Internet traffic is diverted to
another firewall by means of another suitable routing tag.
Suitable entries can be made in the firewall to select channels according to
information other than just the destination IP address. These entries are sup-
plemented with a special routing tag that is used to control the channel se-
lection with the routing table. For example, a rule adds the routing tag '2' to
the entire data traffic for a local group of computers (defined by an IP address
range). Alternatively, certain protocols receive a different supplementary
routing tag.
The diagram demonstrates the application of policy-routing with load balanc-
ing:
BAT54-Rail/F..
358 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
IP router
D Internal services implicitly use the default tag. If the user wishes to direct
the default route through a VPN tunnel with a dynamic tunnel endpoint,
for example, then the VPN module uses the default route with the routing
tag "0" as standard.
To direct the default route through the VPN tunnel anyway, create a sec-
ond default route with routing tag "1" and the VPN remote station as
router names. With the appropriate firewall rule you can transfer all ser-
vices from all source stations to all destination stations with routing tag
"1".
D Routing tags and RIP: The routing tag is also transmitted in RIP packets
for processing upon reception, so that, for example, the change in dis-
tances in the proper route can be changed.
BAT54-Rail/F..
Release 7.54 06/08 359
Routing and WAN connections 11.2 IP routing
Routing tags are used on the BAT in order to evaluate criteria relevant to the
selection of the target route in addition to the IP address. In general, routing
tags are added to the data packets using special firewall rules. However, in
some cases, it is desirable to assign the tags directly.
D Routing tags for VPN connections
The VPN name list can be used to enter the routing tag for every VPN con-
nection. The routing tag is used in order to determine the route to the remote
gateway (default '0').
In addition, every gateway can be assigned a specific routing tag in the gate-
way table. The tag 0 has a special function in this table: If the tag is set at 0
on a gateway, then the tag from the VPN name list table is used.
The VPN routing tag parameters can be found under Setup/VPN/VPN Peers
or Setup/VPN/Additional Gateways and under LANconfig in the configuration
area 'VPN' on the 'General' tab by clicking on 'Connection List' and 'Other re-
mote gateways' in the list.
D Routing tags for PPTP connections
In the PPTP table, a routing tag can be entered in addition to the IP address
of the PPTP server. Using this routing tag, two or more DSL modems that use
a single IP address can be operated on different DSL ports.
BAT54-Rail/F..
360 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
Using these settings and the corresponding entry in the load balancing table,
load balancing can be performed that would also work in Austria.
By default, the router sends the computer a response with the address of the
router which knows the route to the destination network (this response is
known as an ICMP redirect). The workstation computer then accepts this ad-
dress and sends the data packet straight to the other router.
Certain computers, however, do not know how to handle ICMP redirects. To
ensure that the data packets reach their destination anyway, use local rout-
ing. In this way you instruct the router itself in your device to send the data
packet to other routers. In addition, in this case no more ICMP redirects will
be sent. The setting is made under:
Local routing can be very helpful in isolated cases, however, it should also
only be used in isolated cases. For local routing leads to a doubling of all data
packets to the desired target network. The data is first sent to the default rout-
er and is then sent on from here to the router which is actually responsible in
the local network.
BAT54-Rail/F..
Release 7.54 06/08 361
Routing and WAN connections 11.2 IP routing
A router uses the IP RIP information to inform the other routers in the network
of the routes it finds in its own static table. The following entries are ignored
in this process:
D Rejected routes with the '0.0.0.0' router setting.
D Routes referring to other routers in the local network.
D Routes linking individual computers to the LAN by proxy ARP.
Although the entries in the static routing table are set manually, this informa-
tion changes according to the connection status of the router and so do the
RIP packets transmitted.
D If the router has established a connection to a remote station, it propa-
gates all the networks which can be reached via this route in the RIPs with
the distance '1'. Other routers in the LAN are thus informed by these
means that a connection to the remote station has been established on
this router which they can use. The establishment of additional connec-
tions by routers with dial-up connections can be prevented, thus reducing
connection costs.
D If this router cannot establish a further connection to another remote sta-
tion, all other routes are propagated with the distance '16' in the RIPs. The
'16' stands for This route is not available at the moment. A router may
be prevented from establishing a connection in addition to the present one
may be due to one of the following causes:
D Another connection has already been established on all the other
channels (also via the LANCAPI).
D Y connections for the S0 port have been explicitly excluded in the in-
terface table.
D The existing connection is using all B channels (channel bundling).
D The existing connection is a leased-line connection. Only a few ISDN
providers enable a dial-up connection to be established on the second
B channel in addition to a permanent connection on the first B channel.
BAT54-Rail/F..
362 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
When the router receives such IP RIP packets, it incorporates them in its dy-
namic routing table, which looks something like this:
IP address and network mask identify the destination network, the distance
shows the number of routers between the transmitter and receiver, the last
column shows which router has revealed this route. This leaves the 'Time'.
The dynamic table thus shows how old the relevant route is. The value in this
column acts as a multiplier for the intervals at which the RIP packets arrive.
A '1', therefore, stands for 30 seconds, a '5' for about 2.5 minutes and so on.
New information arriving about a route is, of course, designated as directly
reachable and is given the time setting '1'. The value in this column is auto-
matically incremented when the corresponding amount of time has elapsed.
The distance is set to '16' after 3.5 minutes (route not reachable) and the
route is deleted after 5.5 minutes.
Now if the router receives an IP RIP packet, it must decide whether or not to
incorporate the route contained into its dynamic table. This is done as fol-
lows:
D The route is incorporated if it is not yet listed in the table (as long as there
is enough space in the table).
D The route exists in the table with a time of '5' or '6'. The new route is then
used if it indicates the same or a better distance.
D The route exists in the table with a time of '7' to '10' and thus has the dis-
tance '16'. The new route will always be used.
D The route exists in the table. The new route comes from the same router
which notified this route, but has a worse distance than the previous entry.
If a device notifies the degradation of its own static routing table in this
way (e.g. releasing a connection increases the distance from 1 to 2, see
below), the router will believe this and include the poorer entry in its dy-
namic table.
Note: RIP packets from the WAN will be ignored and will be rejected imme-
diately. RIP packets from the LAN will be evaluated and will not be prop-
agated in the LAN.
BAT54-Rail/F..
Release 7.54 06/08 363
Routing and WAN connections 11.2 IP routing
The router uses the static and dynamic tables to calculate the actual IP rout-
ing table it uses to determine the path for data packets. In doing so, it in-
cludes the routes from the dynamic table which it does not know itself or
which indicate a shorter distance than its own (static) route with the routes
from its own static table.
If you use several routers in a local network with IP RIP, you can represent
the routers outwardly as one large router. This procedure is also known as
scaling. As a result of the constant exchange of information between the
routers, such a router theoretically has no limits to the transmission options
available to it.
D In the field 'RIP support' (or 'RIP type') the following selection is possible:
D 'off': IP-RIP is not used (default).
D 'RIP-1': RIP-1 and RIP-2 packets are received but only RIP-1 packets
are sent.
D 'RIP-1 compatible': RIP-1 and RIP-2 packets are received. RIP-2
packets are sent as an IP broadcast.
D 'RIP-2': Similar to 'RIP-1 compatible', except that all RIP packets are
sent to the IP multicast address 224.0.0.9.
D The entry under 'RIP-1 mask' (or 'R1 mask') can be set to the following
values:
BAT54-Rail/F..
364 Release 7.54 06/08
Routing and WAN connections 11.2 IP routing
D 'class' (default): The network mask used in the RIP packet is derived
directly from the IP address class, i.e. the following network masks are
used for the network classes:
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
D 'address': The network mask is derived from the first bit that is set in
the IP address entered. This and all high-order bits within the network
mask are set. Thus, for example, the address 127.128.128.64 yields
the IP network mask 255.255.255.192.
D 'class + address': The network mask is formed from the IP address
class and a part attached after the address procedure. Thus, the
above-mentioned address and the network mask 255.255.0.0 yield the
IP network mask 255.128.0.0.
Note: Routers with RIP capabilities dispatch the RIP packets approximately
every 30 seconds.The router is only set up to send and receive RIPs if it
has a unique IP address.The IP RIP module is deselected in the default
setting using the IP address xxx.xxx.xxx.254.
BAT54-Rail/F..
Release 7.54 06/08 365
Routing and WAN connections 11.3 Configuration of remote stations
Due to the preferred handling of individual packets, the original packet order
is changed. Although TCP/IP does not ensure a certain packet order, prob-
lems may result in a few isolated applications. This only concerns applica-
tions that assume a certain order that differs from the protocol standard. In
this case the SYN/ACK speedup can be deactivated:
11.3Configuration of remote
stations
Remote stations are configured in two tables:
D In the peer list(s) all information is set that applies individually to only one
remote station.
D Parameters for the lower protocol levels (below IP or IPX) are defined in
the communication layer table.
Note: The configuration of the authentication (protocol, user name, pass-
word) is not covered in this section.Information on authentication is con-
tained in the section Establishing connection with PPP page 434.
BAT54-Rail/F..
366 Release 7.54 06/08
Routing and WAN connections 11.3 Configuration of remote stations
Note: Please note following points when editing the peer list:
BAT54-Rail/F..
Release 7.54 06/08 367
Routing and WAN connections 11.3 Configuration of remote stations
In the occasion of a DSLoL interface the same entries as for the DSL inter-
face are valid. The entries are made in the Broadband-Peers list.
In the communication layer list the common protocol combinations are al-
ready predefined. Changes or additions should only be made when remote
stations are incompatible to the existing layers. The possible options are con-
tained in the following list.
Note: Please note that the parameters located in BAT depend upon the func-
tionality of the unit. It is possible that your unit does not offer all of the op-
tions described here.
Parameter Meaning
Layer name The layer is selected in the peer list under this name.
Encapsula- Additional encapsulations can be set for data packets.
tion
'Transpar- No additional encapsulations.
ent'
'Ethernet' Encapsulation in the form of ethernet frames.
'LLC-MUX' Multiplexing via ATM with LLC/SNAP encapsulation according to RFC 2684. Sev-
eral protocols can be transmitted over the same VC (Virtual Channel).
'VC-MUX' Multiplexing with ATM by establishing additional VCs according to RFC 2684.
Layer-3 The following options are available for the switching layer or network layer:
'Transpar- No additional header is inserted.
ent'
'PPP' The connection is established according to the PPP protocol (in the synchronous
mode, i.e. bit-oriented). The configuration data are taken from the PPP table.
'Asyn- Like 'PPP', only the asynchronous mode is used. This means that PPP functions
cPPP' character-oriented.
'... with All options can be run with their own script if desired. The script is specified in the
script' script list.
'DHCP' Assignment of the network parameters via DHCP.
BAT54-Rail/F..
368 Release 7.54 06/08
Routing and WAN connections 11.4 IP masquerading
Parameter Meaning
Layer-2 In this field the upper section of the security layer (Data Link Layer) is configured. The follow-
ing options are available:
'Transpar- No additional header is inserted.
ent'
'PPPoE' Encapsulation of the PPP protocol information in ethernet frames.
'PPPoE' The PPP negotiation runs via Ethernet. The PPP packets are encapsulated in
Ethernet frames for this purpose. This process is frequently used for DSL connec-
tions.
Options Here you can activate the compression of the data to be transmitted and the bundling of chan-
nels. The selected option only becomes active when it is supported by both the ports used and
the selected Layer-2 and Layer-3 protocols.
Layer-1 In this field the lower section of the security layer (Data Link Layer) is configured. The follow-
ing options are available:
'AAL-5' ATM adaptation layer
'ETH-10' Transparent Ethernet as per IEEE 802.3.
'HDLC' Securing and synchronization of the data transfer as per HDLC (in the 7 or 8-bit
mode).
'V.110' Transmission as per V.110 with a maximum of 38,400 bps.
Modem Modem transmission (requires Fax Modem option)
11.4IP masquerading
One of today's most common tasks for routers is connecting the numerous
workstation computers in a LAN to the network of all networks, the Internet.
Everyone should have the potential to access, for example, the WWW from
his workstation and be able to fetch bang up-to-date information for his work.
So that not every single computer with it's IP address in known on the entire
internet IP masquerading is used to hide all computers located in an intra-
net. IP masquerading demands two points from a router: On the one hand a
valid IP address in the local network, on the other hand a valid and public IP
address in the internet (static or assigned by the provider).
Because these two addresses are not allowed to exist in one logical net, the
router must have two IP addresses:
D the intranet IP address to communicate with computers in the LAN
D the public IP address to communicate with remote stations in the Internet
The computers in the LAN use the router as a gateway but are recognizable
themselves. The router divides the intranet from the internet.
BAT54-Rail/F..
Release 7.54 06/08 369
Routing and WAN connections 11.4 IP masquerading
Source: 10.0.0.100
Target: 80.123.123.123
Source IP Port
10.0.0.100 3456
The response to this new packet is now sent to the IP address of the router
with the new sender port number. The entry in the internal table allows the
router to assign this response to the original sender again.
BAT54-Rail/F..
370 Release 7.54 06/08
Routing and WAN connections 11.4 IP masquerading
Source: 80.123.123.123
Target: 10.0.0.100
Source: 80.123.123.123
Target: 80.146.74.146, Port 3456
IP: 10.0.0.100
Internet
internal IP: 10.0.0.1
public IP: 80.146.74.146
Source IP Port
10.0.0.100 3456
IP masquerading for all IP protocols that are based on TCP, UDP, or ICMP
and communicate exclusively through ports. One example of this type of un-
complicated protocol is the one the World Wide Web is based on: HTTP.
Individual IP protocols do use TCP or UDP, but do not, however communi-
cate exclusively through ports. This type of protocol calls for a corresponding
special procedure for IP masquerading. Among the group of protocols sup-
ported by IP masquerading in the BAT are:
D FTP (using the standard ports)
D H.323 (to the same extent as used by Microsoft Netmeeting)
D PPTP
D IPSec
D IRC
BAT54-Rail/F..
Release 7.54 06/08 371
Routing and WAN connections 11.4 IP masquerading
U Configuration of IP masquerading
The use of IP masquerading is set individually for each route in the routing
table. The routing table can be reached as follows:
BAT54-Rail/F..
372 Release 7.54 06/08
Routing and WAN connections 11.4 IP masquerading
Source: 80.123.123.123
Target: 80.146.74.146, Port 21
Internet
IP: 10.0.0.10
Ports Target IP
20 to 21 10.0.0.10
BAT54-Rail/F..
Release 7.54 06/08 373
Routing and WAN connections 11.4 IP masquerading
BAT54-Rail/F..
374 Release 7.54 06/08
Routing and WAN connections 11.4 IP masquerading
BAT54-Rail/F..
Release 7.54 06/08 375
Routing and WAN connections 11.4 IP masquerading
BAT54-Rail/F..
376 Release 7.54 06/08
Routing and WAN connections 11.4 IP masquerading
Intranet
(LAN)
DMZ-IP:
192.168.2.1
DMZ
The option Masq. in the Service list informs the router, if the local intranet or
DMZ addresses should be hidden behind the IP address of the router:
D IP Masquerading switched off: No masquerading is performed. This
variation is for internet accesses with several static IP addresses (enter
under DMZ IP address and DMZ netmask) to link only servers to the in-
ternet or e.g. to link two intranet subnets via VPN.
D masking Intranet and DMZ (default): This setting has the effect, that all
local addresses are masked. Additionally to the Intranet (LAN) a second
local net with private addresses can be linked to the Internet.
D masking Intranet only: This setting is especially for the internet access
with several static IP addresses. The difference to the case 'IP Masquer-
ading switched off' is that besides the DMZ the intranet address section
with masked private IP addresses is available in the LAN.
The DMZ and the intranet addresses of the BAT are set as follows:
BAT54-Rail/F..
Release 7.54 06/08 377
Routing and WAN connections 11.4 IP masquerading
DMZ IP Meaning/use
address
123.45.67.0 network address
123.45.67.1 BAT as a gateway for the Intranet
123.45.67.2 Device in the LAN which is to receive unmasked access to the Internet, e.g. web server con-
nected at the DMZ port
123.45.67.3 broadcast address
All computers and devices in the Intranet have no public IP address, and
therefore appear with the IP address of the BAT (123.45.67.1) on the Inter-
net.
BAT54-Rail/F..
378 Release 7.54 06/08
Routing and WAN connections 11.5 Demilitarized Zone (DMZ)
D With a Deny All strategy (see Set-up of an explicit "Deny All" strategy
page 283): Allow access from "All stations in local network" to
123.45.67.2
BAT54-Rail/F..
Release 7.54 06/08 379
Routing and WAN connections 11.5 Demilitarized Zone (DMZ)
BAT54-Rail/F..
380 Release 7.54 06/08
Routing and WAN connections 11.5 Demilitarized Zone (DMZ)
BAT54-Rail/F..
Release 7.54 06/08 381
Routing and WAN connections 11.6 Advanced Routing and Forwarding
11.6.1 Introduction
Up until LCOS version 6.30, BAT Routers supported two local networks only:
The intranet and the DMZ. For some applications, however, it may be desir-
able to realize more than one intranet and one DMZ with a BAT Router, for
example to provide multiple IP networks with Internet access via a central
router. As of LCOS version 7.00, BAT Routers support up to 64 different IP
networks, depending on the model.
Various scenarios are possible when realizing multiple IP networks:
D One network per interface.
D Multiple networks per interface.
D Multiple VLANs per interface; one or more networks per VLAN (which cor-
responds with a combination of the first two scenarios).
The realization of these scenarios is facilitated by Advanced Routing and
Forwarding (ARF), which provides very flexible options in the definition of IP
networks and the assignment of these networks to the interfaces. The dia-
gram below illustrates the network/interface assignment at various levels.
The configuration options applied here are described in the following chap-
ters.
BAT54-Rail/F..
382 Release 7.54 06/08
Routing and WAN connections 11.6 Advanced Routing and Forwarding
WLAN-1-1 WLAN-1-1
to VLAN-ID
Multi-SSID, P2P
WLAN-1 P2P-1-6 10
P2P-1-6
WLAN-2-1
WLAN-2-1 VLAN-ID
WLAN-2 to 19
P2P-2-6
LAN bridge
P2P-2-6
BRG-1
BRG-8 Network 64
BAT54-Rail/F..
Release 7.54 06/08 383
Routing and WAN connections 11.6 Advanced Routing and Forwarding
D For devices supporting VLAN, multiple VLANs can be defined for each
logical interface simply by using VLAN-IDs. Although the data traffic
for the various VLANs flows via a common logical interface, the VLAN-
ID ensures that the different VLANs remain strictly separated. From
the perspective of the BAT Router the VLANs are completely separate
interfaces, meaning that a single logical interface becomes multiple
logical interfaces for the BAT Router, and each of these interfaces can
be addressed individually.
D For devices with WLAN modules, the individual logical interfaces can
be grouped together. This is handled by the LAN bridge which regu-
lates data transfer between the LAN and WLAN interfaces. The forma-
tion of bridge groups (BRG) allows multiple logical interfaces to be
addresses at once and they appear as a single interface to the BAT
Routerin effect achieving the opposite of the VLAN method.
D In the final stage, the ARF forms a connection between the logical inter-
faces with VLAN tags and the bridge groups on the one side, and the IP
networks on the other. For this reason, an IP network is configured with a
reference to a logical network (with VLAN-ID, if applicable) or to a bridge
group. Furthermore, for each IP network an interface tag can be set, with
which the IP network can be separated from other networks without hav-
ing to use firewall rules.
The definition of routing tags for IP networks as described above is one of the
main advantages of Advanced Routing and Forwarding. This option allows
"virtual routers" to be realized. By using the interface tag, a virtual router uses
only a part of the routing table for an IP network, and in this way controls the
routing specifically for that one IP network. This method allows, for example,
several default routes to be defined in the routing table, each of which is giv-
en a routing tag. Virtual routers in the IP networks use the tags to select the
default route which applies to the IP network with the appropriate interface
tag. The separation of IP networks via virtual routers even permits multiple IP
networks with one and the same address range to be operated in parallel in
just one BAT Router without problem.
For example: Within an office building, a number of companies have to be
connected to the Internet via a central BAT Router, even though each of
these companies has its own Internet provider. All of the companies want to
use the popular IP network '10.0.0.0' with the netmask '255.255.255.0'. To
implement these requirements, each company is given an IP network
'10.0.0.0/255.255.255.0' with a unique name and a unique interface tag. In
the routing table, a default route with the corresponding routing tag is created
BAT54-Rail/F..
384 Release 7.54 06/08
Routing and WAN connections 11.6 Advanced Routing and Forwarding
for each Internet provider. This allows the clients in the different company
networks, all of which use the same IP addresses, to access the Internet via
their own provider. Employing VLANs enables logical networks to be sepa-
rated from one another even though they use the same physical medium
(Ethernet).
U The differences between routing tags and interface tags
BAT54-Rail/F..
Release 7.54 06/08 385
Routing and WAN connections 11.6 Advanced Routing and Forwarding
IP network:
Company A
10.0.0.0/255.255.255.0
Interface tag 1
Provider A
Provider B
IP network:
Company B
10.0.0.0/255.255.255.0
Interface tag 2
Routing table
BAT54-Rail/F..
386 Release 7.54 06/08
Routing and WAN connections 11.6 Advanced Routing and Forwarding
The networks are defined in a table. A unique name for the networks is set
along with definitions for the address range and interface assignment. The
network name allows the identification of networks in other modules (DHCP
server, RIP, NetBIOS, etc.) and to enable control over which services are
available in which networks.
D Network name
Unique name (16 characters) for referencing the network from other mod-
ules (DHCP server, RIP, NetBIOS, etc.).
D By default the networks 'Intranet' and 'DMZ' are preset.
Note: If a network is deleted or renamed, all references to this network have
to be corrected (e.g. DHCP, RIP, NetBIOS).
D IP address
BAT Router's IP address in this network
D Netmask
Corresponding netmask.
D Network type
The type of network decides the the masking of IP addresses if packets
are received over the corresponding interface. Intranets are often
masked; the private IP addresses used in this network are translated into
the BAT Router's public IP address at the transition to the Internet. In a
DMZ, fixed public IP addresses are often used as no masking takes place.
For each remote station, the IP routing table can be used to set whether
BAT54-Rail/F..
Release 7.54 06/08 387
Routing and WAN connections 11.6 Advanced Routing and Forwarding
masking should take place for the intranet area only or for the DMZ as
well.
Apart from masking, network type also influences the automatic genera-
tion of VPN rules. These rules are automatically generated for intranets
only, and not for 'DMZ' type networks.
Networks can be marked as 'Intranet' or as 'DMZ' to enable control over
these options.
D Disabled: The network is disabled.
D Intranet: The network is an intranet.
D DMZ: The network is a DMZ.
Note: Networks of the type 'DMZ' are visible to all other networks, indepen-
dent of any interface tagsthis is useful as the DMZ often hosts public
servers such as web servers, etc. The DMZ networks themselves can
only see networks with the same interface tag (and any other DMZ net-
works, of course).
D VLAN ID
VLAN ID for the network.
Several separate networks can be operated over a single logical inter-
face. Each network is assigned with its own VLAN-ID. The physical inter-
face of the BAT Router for data streams from networks with different
VLAN-IDs as one; these streams are separated for their virtual networks
by a VLAN-capable switch.
For each network marked by a VLAN ID, the BAT Router has an IP
address in that network so that it can be access via IP. The VLAN-ID
ensures the correct assignment of IP networks and VLANs.
Note: In certain cases the BAT Router does not need an IP address, such
when a VLAN is only used as a bridge between WLAN and LAN. On oc-
casion it can even be undesirable for the BAT Router to be accessible
within this VLAN.
For example: A central BAT Router provides connectivity to an access
point with three logical WLANs for intranet, guest access and Voice over
IP. The intranet remains untagged, the guest access is given VLAN ID 1
and VoIP is given VLAN ID 2. Based on the VLAN IDs, the central router
permits users in the intranet to access the Internet and via VPN to the
headquarters; visitors in the guest WLAN only have access to the Inter-
net.
BAT54-Rail/F..
388 Release 7.54 06/08
Routing and WAN connections 11.6 Advanced Routing and Forwarding
WLAN "Guest"
VLAN-ID 1
D Values: 0 to 4094
D 0: Untagged
D Default: 0
A packet with a VLAN tag arriving at the interface is assigned to its corre-
sponding network. Conversely, the BAT Router sends packets from this
network via the interface with the corresponding VLAN tag. Consequently
the network is only accessible for packets which originate from the same
VLAN.
Note: By configuring the wrong VLAN-ID, an administrator who does not
have access to that VLAN can lock him/herself out of the BAT Router!
Note: Up until LCOS version 6.30, a BAT Router could only be accessed
from the network with the "device VLAN-ID". From LCOS version 7.00 a
dedicated network with its own VLAN-ID can be set up exclusively for con-
figuring the BAT Router; this network can be protected from general ac-
cess with an appropriate firewall rule. During an upgrade to LCOS version
7.00, any device VLAN-IDs which were in use will be entered into all of
the networks. This is for compatibility reasons.
D Interface assignment
Logical interface that this network is assigned to.
D Values: LAN-1 to LAN-4, WLAN-1-1 to WLAN-2-8, P2P-1-1 to P2P-2-
6, BRG-1 to BRG-8, any (depending on the availability of logical inter-
faces in the respective model). A logical interface which is assigned to
a network in this way is referred to as a "bonded" interface.
D Any: The network is valid for all logical interfaces.
BAT54-Rail/F..
Release 7.54 06/08 389
Routing and WAN connections 11.6 Advanced Routing and Forwarding
D Default: Any
Note: Using the bridge groups (Assigning logical interfaces to bridge groups
page 413) is an important aspect of network security. Many applica-
tions demand that an intranet is valid for several logical interfaces, for ex-
ample so that clients in the LAN and in the WLAN can communicate with
one another easily; only certain logical interfaces are reserved for the
DMZ. By grouping certain logical interfaces (e.g. LAN-1 to LAN-3 and all
WLANs) to a bridge group and assigning the intranet to this group, the
network for the DMZ (LAN-4) can be kept separate from the intranet.
Bridge groups are only available on devices with a WLAN module.
To bond several networks to one logical interface, the corresponding
number of entries are added (with different network names and different
IP addresses or netmasks) and all of these are assigned to the same
interface.
Note: Loopback addresses are not defined with the IP network's table, but in
a separate table instead (Named loopback addresses page 159). The
routing tag defined at the same time controls which networks can "see"
the loopback address.
D Source check
This option determines how to react to a packet received over this inter-
face.
D Loose: All source addresses are accepted if the BAT Router itself is
being addressed; no return route has to be available.
D Strict: A return route has to be explicitly available; otherwise an IDS
alarm is triggered.
D Interface tag
All packets received at the interface are marked with this interface tag.
This tag enables the separation of routes which are valid for this network
even without explicit firewall rules. This tag also has an influence on the
routes propagated by RIP and on the hosts and groups visible to the Net-
BIOS proxy. The interface tag also influences automatic VPN rule gener-
ation: If a routing tag is defined for a VPN route, then automatic VPN rules
are only generated for IP networks with the same interface tag. The net-
work type must also be set to 'Intranet'.
D Values: 0 to 65,535
D Default: 0
D Particular values: 0 (untagged).
BAT54-Rail/F..
390 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
Note: Untagged networks with the interface tag '0' can see all other net-
works. Tagged networks, on the other hand, can only see networks with
the same interface tag.
Networks of the type 'DMZ' are visible to all other networksirrespective
of the interface tag being used. Because the networks generally host web-
servers, for example, any limitation on accessibility would be senseless.
D Comment
Comment on the defined network (64 characters)
BAT54-Rail/F..
Release 7.54 06/08 391
Routing and WAN connections 11.7 Changes in other services
The DHCP server can be separately activated or deactivated for each logical
interface.
BAT54-Rail/F..
392 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
DHCP settings can be made for any IP network which has been defined al-
ready:
D Network name
The name of the network which the DHCP server settings apply to.
D DHCP server operating
DHCP server operating mode in this network. Depending on the operating
mode, the DHCP server can enable/disable itself. The DHCP statistics
show whether the DHCP server is enabled.
D No: DHCP server is permanently switched off.
BAT54-Rail/F..
Release 7.54 06/08 393
Routing and WAN connections 11.7 Changes in other services
D Automatic: With this setting, the device regularly searches the local
network for other DHCP servers. The LAN-Rx/Tx LED flashes briefly
when this search is in progress.
If another DHCP server is discovered the device switches its own
DHCP server off. If the BAT Router is not configured with an IP
address, then it switches into DHCP client mode and queries the LAN
DHCP server for an IP address. This prevents unconfigured devices
being introduced to the network from unintentionally assigning
addresses.
If no other DHCP server is discovered the device switches its own
DHCP server on. If another DHCP server is activated later, then the
DHCP server in the BAT Router will be deactivated.
D 'Yes': DHCP server is permanently switched on. When this value is
entered the server configuration (validity of the address pool) is
checked.
If the configuration is correct then the device starts operating as a
DHCP server in the network.
Errors in the configuration (e.g. invalid pool limits) will cause the
DHCP server to be deactivated.
Note: Only use this setting if you are certain that no other DHCP server is
active in the LAN.
D 'Client mode': The DHCP server is deactivated, the device behaves as
a DHCP client and obtains its address from another DHCP server in
the LAN.
Note: Only use this setting if you are certain that another DHCP server is in
the LAN and actively assigning IP addresses.
D 'Relay requests': The DHCP server is active and receives requests
from DHCP clients in the LAN. The device does not respond to
requests, but forwards them to a central DHCP server elsewhere in the
network (DHCP relay agent mode).
D Default: Automatic.
D Broadcast bit check
This setting decides whether the broadcast bit from clients is to be
checked. If the bit is not checked then all DHCP messages are sent as
broadcasts.
D Default: Off.
BAT54-Rail/F..
394 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
The start and end addresses define the address pool which is available to the
clients.
When a client is activated in the network and requests an IP address by DH-
CP, the device with an activated DHCP server will offer to issue an address.
This address is selected from the pool of valid IP addresses. A computer
which received an IP address in the past requests this address again and,
assuming the DHCP server has not assigned this number to another comput-
er in the meantime, it will attempt to issue this address again.
The DHCP server also checks the LAN to confirm that the selected address
is free. Once the address is confirmed as unique, then it is assigned to the
requesting computer.
Note: The factory settings include the IP networks 'Intranet' and 'DMZ', al-
though there are no settings for IP addresses and netmasks. The device
is in a special operating mode. It then uses the IP address '172.23.56.254'
and the address pool '172.23.56.253' for assigning IP addresses to the
network.
D Start address
The first IP address in the pool available to the clients. If no address is
entered here the DHCP takes the first available IP address from the net-
work (as determined by network address and netmask).
D Default: 0.0.0.0
D End address
The last IP address in the pool available to the clients. If no address is
entered here the DHCP takes the last available IP address from the net-
work (as determined by network address and netmask).
D Default: 0.0.0.0
D Netmask
Corresponding netmask for the address pool available to the clients. If no
address is entered here the DHCP server uses the netmask from the cor-
responding network.
D Default: 0.0.0.0
D Broadcast
As a rule broadcast packets in a local network have an address which
results from the valid IP addresses and the netmask. In special cases
(e.g. when using subnets for a selection of workstations) it may be neces-
sary to use a different broadcast address. In this case the broadcast
address is entered into the DHCP module.
BAT54-Rail/F..
Release 7.54 06/08 395
Routing and WAN connections 11.7 Changes in other services
The addresses for the name servers for this network are defined here.
D DNS default
IP address of the DNS name server for the forwarding of DNS requests.
D Default: 0.0.0.0
The IP address of the BAT Router in this network is communicated as
the DNS server if the DNS server is activated for this network.
The the DNS server is not active for this network, then the IP address
in the global TCP/IP settings is communicated as the DNS server.
D DNS backup
IP address of the backup DNS name server for the forwarding of DNS
requests, in the event that the first nameserver should fail.
D Default: 0.0.0.0
The IP address from the global TCP/IP settings is communicated as
the backup DNS server.
D NBNS default
IP address of the NetBIOS name server for the forwarding of NetBIOS
requests.
D Default: 0.0.0.0
The IP address of the BAT Router in this network is communicated as
the NBNS server if the NetBIOS proxy is activated for this network.
The the NetBIOS proxy is not active for this network, then the IP
address in the global TCP/IP settings is communicated as the NBNS
server.
D NBNS backup
IP address of the backup NBNS name server for the forwarding of NBNS
requests, in the event that the first nameserver should fail.
BAT54-Rail/F..
396 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
D Default: 0.0.0.0
The IP address from the global TCP/IP settings is communicated as
the backup NBNS server.
D Server address
This is where the IP address for the superordinate DHCP server is
entered when the mode 'Relay requests' is selected.
D Caching of server responses
This option allows the responses from the superordinate DHCP server to
be stored in the BAT Router. Subsequent requests can then be answered
by the BAT Router itself.
This option is useful if the superordinate DHCP server can only be
reached via a connection which incurs costs.
D Adaption of server responses to the local network
This option allows the responses from the superordinate DHCP server to
be adapted to the local network. When activated, the BAT Router adapts
the responses from the superordinate DHCP server by replacing the fol-
lowing entries with its own address (or local configured addresses):
D Gateway
D Netmask
D Broadcast address
D DNS server
D NBNS server
D Server ID
This option is worthwhile if the superordinate DHCP server does not per-
mit the separate configuration for DHCP clients in another network.
With the configuration of IP and DHCP networks, multiple networks with dif-
ferent DHCP settings can be active at a logical interface. In this case, the
DHCP settings for the first suitable network are applied. A prioritization of net-
works may be necessary here.
BAT54-Rail/F..
Release 7.54 06/08 397
Routing and WAN connections 11.7 Changes in other services
The DNS server considers the interface tags when resolving names learned
via DHCP, i.e. the only names to be resolved are those which were learned
from a network with the same interface tag as the requesting computer. If the
request arrives from an untagged network, then all names are resolved, in-
cluding those that were learned via tagged networks. Similarly, all names that
were learned from untagged networks are visible for tagged networks.
Names learned from relay agents are handled as though they were learned
from an untagged network, i.e. these names are visible to all networks.
BAT54-Rail/F..
398 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
D Network name
Name of the network that the NetBIOS proxy is to be activated for.
D NetBIOS proxy operating for the network
This option defines if the NetBIOS proxy is active for the selected network
or not.
D Workgroup
The workgroup or domain used by the network clients. With multiple work-
groups, mentioning one workgroup suffices.
Note: In the default setting 'Intranet' and 'DMZ' are entered into this table; the
NetBIOS proxy is activated for the intranet and deactivated for the DMZ.
As soon as a network has an interface tag, then the only names (hosts and
groups) visible from this network are those in a network with the same tag, or
which are accessible via a suitably tagged (with the same tag) WAN route.
An untagged network sees all names. Similarly, all names learned from un-
tagged networks are visible to all networks.
The DNS server considers the interface tags when resolving names, i.e. the
only names resolved by DNS are those learned from a network with the same
tag. The special role played by untagged networks applies here too.
The workgroup/domain enables networks to be scanned for NetBIOS names
when a device is started. The workgroup is different for every network and
has to be defined everywhere. In networks without domains, the name of the
largest workgroup should be defined here.
BAT54-Rail/F..
Release 7.54 06/08 399
Routing and WAN connections 11.7 Changes in other services
11.7.4 RIP
Similar to the NetBIOS proxy, the local network structure should generally
not be propagated by RIP in the DMZ. Apart from that it is sometimes desir-
able to propagate routes to a network, but not to learn routes from that net-
work (e.g. in the WAN). For this reason, the RIP function can be configured
separately for each network.
D Network name
Name of the network that the RIP support is to be activated for.
D RIP support
RIP type for propagating own routes. Values:
D Off: No routes are propagated.
D RIP-1: Routes are propagated with RIP-1 packets.
D RIP-1 compatible: Routes are propagated in RIP-1-compatible pack-
ets (RIP-2 packets as broadcast).
D RIP-2: Routes are propagated with RIP-2 packets.
D RIP accept (from these networks)
This option defines if RIP routes are to be learned in this network.
D Propagate to other networks
This option defines whether the associated network is to be propagated
to other networks.
D Default routing tag
The standard routing tag for this interface. Routes with a routing tag set
with the interface tag are propagated by the interface with the tag config-
ured here. Routes that are received at the interface with the standard rout-
BAT54-Rail/F..
400 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
ing tag (configured here) are written to the RIP table with the interface's
tag.
Unmarked routes (tag '0') are not propagated over this interface unless
the interface itself is marked with tag '0'.
Note: The default routing tag in the list of RIP networks is different to that in
the WAN-RIP list. In the WAN, all routes set with the standard tag (0) are
propagated into the WAN with the tag configured there. In the LAN, on the
other hand, routes with the interface tag are propagated with the tag set
here. Similarly, routes with the tag configured here which are received at
the interface are internally given the interface tag. Furthermore if the in-
terface tag is set, those routes set with the default tag (0) are not propa-
gated.
D Routing tag list
Comma-separated list (max. 33 characters) of routing tags which are to
be accepted at the interface. If the list is empty all tags are accepted. If at
least one entry is in the list, then only the tags in this list are accepted. Fur-
thermore, the only routes to be propagated are those with the tags given
here. This also considers any translation via the standard routing tag.
Caution: The routing tag list in the table of RIP networks corresponds to
the one in the WAN-RIP table, with the one difference that a translation
via the standard routing tag is considered. This means for example that,
in the case of an interface tag '1' and the standard routing tag '0', the tag
'0' has to be included in the routing tag list because it is internally changed
to tag '1' when it is received. Conversely, the internal tag '1' is changed to
the external tag '0' on transmission.
The measure is necessary so that a virtualized router can also work
with routers which do not have tagging support.
The default setting has 'Intranet' and 'DMZ' in the table, whereby RIP is
deactivated for these entries.
U Timer settings
BAT54-Rail/F..
Release 7.54 06/08 401
Routing and WAN connections 11.7 Changes in other services
D Default: 30
D Holddown interval
The Holddown interval defines how many update intervals pass before a
route from router A which is no longer being propagated is replaced by an
inferior route from router B.
Until the holddown interval expires, the BAT will only accept a route from
the same router that propagated the original route. Within this time period,
the BAT only accepts a route from another router if it is better than the
former route.
D Possible values: 0 to 99 as multiples of the update interval
D Default: 4
D Invalidate interval
The invalidate interval defines the number of update intervals before a
route is marked as invalid (unavailable) when it stops being propagated
by the router that originally reported it.
If the BAT learns of an equivalent or better route from another router within
this time period, then this will be used instead.
D Possible values: 0 to 99 as multiples of the update interval
D Default: 6
D Flush interval
If a route in a router is not updated before the flush interval expires, then
the route is deleted from the dynamic routing table.
D Possible values: 0 to 99 as multiples of the update interval
D Default: 10
Note: Please note that changes to the timing may accelerate route propaga-
tion, but network load will increase at the same time.
BAT54-Rail/F..
402 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
The value set here sets the upper limit for the delaythe actual delay is
a random value between one second and the value set here.
D Possible values: 0 to 99 seconds.
D Default: 5
Other than in the LAN, WAN bandwidth limitations may make regular up-
dates every 30 seconds undesirable. For this reason, RFC 2091 requires
that routes are transmitted to the WAN once only when the connection is es-
tablished. After this, updates only are transmitted.
Because updates are explicitly requested here, broadcasts or multicasts are
not to be used for delivering RIP messages. Instead, the the subsidiary de-
vice must be statically configured with the IP address of the next available
router at the central location. Due to these requests, the central router knows
which subsidiary routers it has received update requests from; it then sends
any messages on route changes directly to the subsidiary device.
The WAN-RIP table has been extended for configuring the triggered update
in the WAN.
D RFC 2091
This setting defines whether updates should be carried out in line with
RFC 2091.
D Possible values: Yes/No
D Default: No
D Gateway
IP address for the next available router.
D Possible values: Valid IP address
D Default: 0.0.0.0
D Special values: If 0.0.0.0 is entered, the gateway address is deter-
mined from PPP negotiation.
Note: In a router at the central location, RFC 2091 can be switched off and
the gateway can remain on 0.0.0.0 because the central location always
observes the requests from the subsidiaries.
Note: The BAT automatically reverts to standard RIP if the indicated gateway
does not support RFC 2091.
BAT54-Rail/F..
Release 7.54 06/08 403
Routing and WAN connections 11.7 Changes in other services
U Poisoned reverse
Routers use RIP to propagate not only dynamic routes but statically config-
ured routes as well. Some of these static routes may not be constantly avail-
able, for example when an Internet connection or dial-up access is
temporarily unavailable.
For a static route, the setting for "Active" in the routing table defines whether
it should be propagated constantly or only when it is actually reachable.
WEBconfig: Setup IP router IP routing table
D Active
Indicates the route's status.
D Possible values:
Yes: Route is active and propagated constantly.
No: Route is inactive and is not propagated.
Semi: Route is active and is only propagated when it is reachable.
D Default: Yes
Until now routes learned from RIP could only be filtered by their routing tag.
However, it is desirable to be able to filter routes by their network address as
well. For example, "only learn routes within the network 192.168.0.0/
255.255.0.0".
BAT54-Rail/F..
404 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
Initially the filters are defined in a central table; these can then used by en-
tries in the LAN and WAN RIP table.
WEBconfig: Setup IP-router RIP Filter
D Name
Name of the filter.
D Possible values: 18 alphanumerical characters.
D Examples: LAN#1, LAN#2, WAN1, etc.
Note: The hash symbol # can be used to combine multiple entries into a sin-
gle filter. Taken together the entries LAN#1 and LAN#2 make up a filter
"LAN" that can be called from the RIP table.
D Filter
Comma-separated list of networks that are to be accepted (+) or rejected
(-).
D Example of an accepted network: +10.0.0.0/255.0.0.0
D Example of an unaccepted network: -192.168.0.0/255.255.0.0
D Possible values: 64 characters from ,+-/0123456789.
Note: The plus-sign for accepted networks is optional.
Filters defined in the filter table can be referenced in the columns for RX filter
and TX filter in the LAN RIP and WAN RIP tables. RX defines the networks
from which routes can be learned or blocked, and TX defines the networks to
which propagation should be allowed or blocked.
Caution: Filtering by routing tags is unaffected, i.e. if a tag for a route in-
dicates that it is not to be learned or propagated, then this cannot be
forced by means of the filter table.
BAT54-Rail/F..
Release 7.54 06/08 405
Routing and WAN connections 11.7 Changes in other services
Note: If a different hop count is to be used, then all devices in the network
have to use the same max. hop count figurealso in the case of RIP over
WAN connections.
BAT54-Rail/F..
406 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
BAT54-Rail/F..
Release 7.54 06/08 407
Routing and WAN connections 11.7 Changes in other services
BAT54-Rail/F..
408 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
Network name IP address Netmask VLAN ID Interface Source check Type Rtg-Tag
DEVELOP- 10.1.1.1 255.255.255 0 LAN -1 strict Intranet 2
MENT .0
SALES 10.1.1.1 255.255.255 0 LAN -2 strict Intranet 1
.0
Network name IP address Netmask VLAN ID Interface Source check Type Rtg-Tag
DEVELOP- 10.1.1.1 255.255.255 0 LAN -1 strict Intranet 0
MENT .0
SALES 10.1.1.1 255.255.255 0 LAN -2 strict Intranet 0
.0
Name Protocol Source Target Action Linked Prio (...) Rtg tag
DEVELOP- ANY %Ldevelop- ANY- %a yes 255 2
MENT ment HOST
SALES ANY %Lsales ANY- %a yes 255 1
HOST
Important for these rules is the maximum priority (255) so that these rules are
always checked first. Since filtering is still possible by services, the option
"Linked" has to be set in the firewall rule.
BAT54-Rail/F..
Release 7.54 06/08 409
Routing and WAN connections 11.7 Changes in other services
The first point influences behavior during ping blocking and also the stealth
mode as all tagged default routes are affected. In LCOS prior to version 7.00,
a WAN interface could be pinged as long as just one tagged default route re-
ferred to it and under Ping-Block the item 'default route only' was selected.
The same applies to the stealth mode.
Both points affect the behavior of session recovery. With LCOS version 6.30,
session recovery was allowed for all tagged routes as long as the item Deny
Session Recovery was restricted to the 'default route'. From LCOS version
7.00, this is prohibited even if the point mentioned above is satisfied.
Similarly, the default-router filters now take effect even if the default route is
in the LAN. Here it applies that the filter takes effect when
D A packet was received over a tagged LAN interface and is to be sent over
a default route tagged with the interface, or
D A packet from another router was received at a tagged LAN interface and
there is a default route with the interface tag to the packet's source ad-
dress, or
D A packet was received from the WAN and is to be sent to the LAN via a
default route with any tag
D Start port
D-port from (start port)
BAT54-Rail/F..
410 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
D End port
D-port to (end port)
D Peer
Remote station which applies for this entry. If no peer is entered then the
entry applies to all peers.
D Intranet address
Internet address that a packet within the port range is forwarded to.
D Map port
Port used for forwarding the packet.
D Protocol
Protocol which applies for this entry.
D Values: TCP, UDP TCP+UDP
D Default: TCP+UDP
D WAN address
WAN address which applies for this entry. If the device has more than one
static IP address, then this allows port forwarding to be limited to certain
connections.
D Values: Valid IP address
D Default: 0.0.0.0
D Particular values: With the IP address 0.0.0.0 the address assigned to
the connection will be used automatically.
D Entry active
Switches the entry on or off.
D Comment
Comment on the defined entry (64 characters)
BAT54-Rail/F..
Release 7.54 06/08 411
Routing and WAN connections 11.7 Changes in other services
11.7.10IPX router
The IPX router can only handle a LAN, and so this has to be assigned explic-
itly by entering the interface and the VLAN-ID.
D Network
Netware network number of the local network.
D Default: 00000000
The setting '00000000' means that the network number is determined
automatically as long as a Novell server exists in the network.
D Binding
The Ethernet packet format for the local network.
D Automatic: Sets the packet format automatically if possible.
D II
D 802.3
D 802.2
D SNAP
D Interface assignment
Logical interface that this network is assigned to.
D Values: LAN-1 to LAN-n, WLAN-1-1 to WLAN-2-8, P2P-1-1 to P2P-2-
6, BRG-1 to BRG-8, any (depending on the availability of logical inter-
faces in the respective model). A logical interface which is assigned to
a network in this way is referred to as a "bonded" interface.
D Any: The network is valid for all logical interfaces.
BAT54-Rail/F..
412 Release 7.54 06/08
Routing and WAN connections 11.7 Changes in other services
D Default: Any
Note: Binding to all logical interfaces with the setting 'any' is only possible for
devices with a LAN bridge.
D VLAN ID
ID of the VLAN with the active IPX router.
D Default: 0
D Active
This option activates or deactivates the logical interface.
D Bridge group
Assigns the logical interface to a bridge group to enable bridging from/to
this logical interface via the LAN bridge. If assigned to a common bridge
group, several logical interfaces can be addressed at once and they
appear to the BAT Router to be a single interface. This can then be used
for Advanced Routing and Forwarding, for example.
D Values: BRG-1 to BRG-8, none
D Default: BRG-1
D Special significance: If the interface is removed from all bridge groups
by setting 'none', then there is no communication between the LAN
and WLAN via the LAN bridge (isolated mode). With this setting, LAN/
WLAN data transfers over this interface are only possible via the
router.
BAT54-Rail/F..
Release 7.54 06/08 413
Routing and WAN connections 11.7 Changes in other services
Note: A requirement for data transfer from/to a logical interface via the LAN
bridge is the deactivation of the global "isolated mode" which applies to
the whole of the LAN bridge. Furthermore, the logical interface must be
assigned to a bridge group. With the setting 'none', no transfers can be
made via the LAN bridge.
D Priority
Sets the priority for the logical interface where the spanning-tree protocol
is being used. Where multiple connections are available, the interface
with the highest priority is used. The smaller the value, the higher the pri-
ority. If priorities are the same then the interface with lower transmission
fees is chosen or, alternatively, the interface which is highest in the table.
D Values: 0 to 255
D Default: 128
D DHCP limit
D Number of clients which can be handled by DHCP. If the limit is
exceeded, the oldest entry is dropped. This feature can be used in
combination with the protocol filer table to limit access to just one log-
ical interface.
D Values: 0 to 255
D Special significance: A limit of '0' means there is no limit.
11.7.12Remote bridge
The remote bridge couples two remote networks as if they were physically
connected. They are completely independent of the employed network pro-
tocols.
BAT54-Rail/F..
414 Release 7.54 06/08
Routing and WAN connections 11.8 Load balancing
D Remote site:
Name of the remote site which the remote bridge is connected to
D Bridge aging
The time lapse between learning a MAC address and deleting it again
D Interface assignment
Logical interface that this remote bridge is assigned to.
D Values: LAN-1 to LAN-n (depending on the availability of logical inter-
faces in the model in question).
Note: WLANs cannot be selected during interface assignment because the
WAN bridge is only available in devices without WLAN. For this reason,
the interface assignment "Any" is not possible.
D VLAN ID
ID of the VLAN with the active remote bridge.
D Default: 0
11.7.13PPPoE Servers
The PPPoE server can be separately activated or deactivated for each logi-
cal interface:
11.8Load balancing
Despite the ever increasing bandwidth of DSL connections, they remain the
communications bottle-neck. In some cases it can be advisable to combine
multiple DSL connections. There are a number of possibilities to realize this,
some of which need active support from the Internet provider:
D DSL channel bundling (Multilink-PPPoE MLPPPoE)
The availability of direct bundling depends on the Internet provider's
product range. If available, the user has access to the sum of the band-
widths of all of the bundled channels. Multilink-PPPoE can also be used
for bundling PPP connections.
BAT54-Rail/F..
Release 7.54 06/08 415
Routing and WAN connections 11.8 Load balancing
Note: This version of channel bundling provides bandwidths that are a mul-
tiple of the smallest bundled channel. This means that it is especially effi-
cient when channels are all of the same bandwidth. The direct bundling of
different bandwidths means that the channels with the higher data rates
suffer from a loss in effective bandwidth.
When bundling MLPPPoE for DSL channels behaves in the same way
as the well known MLPPP for ISDN channel bundling.
External ADSL
modem
D Load balancing
Load balancing involves the dynamic division of TCP connections
between independent DSL connections. The user has access to the sum
of the bandwidths of the bundled channels, but the individual TCP con-
nections are limited to the bandwidth offered by the DSL connection allo-
cated to it.
External ADSL
modem
Note: Unlike direct channel bundling, load balancing offers the true sum of
all bundled bandwidths. This version is thus highly effective for combining
different bandwidths.
BAT54-Rail/F..
416 Release 7.54 06/08
Routing and WAN connections 11.8 Load balancing
Depending on the mode, devices with an integrated switch can enable some
of the LAN ports to be used as additional WAN ports for connecting to exter-
nal DSL modems. These ports are listed in the interface table as separate
DSL interfaces (DSL-1, DSL-2, etc.). The DSL ports are activated as DSL in-
terfaces in teh WAN interfaces list, configured with the up- and downstream
rates and allocated to the switch ports in the LAN interfaces list (example:
BAT Wireless 1811DSL):
BAT54-Rail/F..
Release 7.54 06/08 417
Routing and WAN connections 11.8 Load balancing
The allocation of DSL ports to the Ethernet ports can be chosen freely. An
effective solution is to allocate the DSL ports in the reverse order to the ports
at the switch (for example: BAT Wireless 1811 DSL):
Antenna Aux AC12V LAN4 LAN3 LAN2 LAN1 WAN ISDN S0 Config(COM) Reset Antenna Main
10/100Mbit/s
LAN4 DSL-2
LAN3 DSL-3
LAN2 DSL-4
LAN1 LAN-1: This port remains reserved for the LAN.
WAN DSL-1: (dedicated WAN port for the device)
If the device is equipped with more than one DSL port, the DSL port to be
used is entered in the DSL-Broadband-Peers list:
D If no port is defined (or port "0"), the BAT selects the port after the one
chosen for the connection's communication layer.
D If Layer-1 is set with 'AAL-5', then the ADSL interface is chosen.
D If Layer-1 is set with 'ETH', then the first DSL port (i.e. DSL-1) is cho-
sen.
D If a particular port is defined (not "0"), then it will be used for the connec-
tion.
Note: Observe that the communication layer set for the connection over this
port in Layer 1 is set to 'ETH'.
BAT54-Rail/F..
418 Release 7.54 06/08
Routing and WAN connections 11.8 Load balancing
BAT54-Rail/F..
Release 7.54 06/08 419
Routing and WAN connections 11.8 Load balancing
BAT54-Rail/F..
420 Release 7.54 06/08
Routing and WAN connections 11.8 Load balancing
U Connection establishment
Two basic methods are available for balancing the data load:
D If the channel's bandwidth is known, then the connections will be as-
signed to the channel with the lowest workload (in percent).
D If the bandwidth is not known, then a differentiation is made according to
the type of connection required; a TCP connection; or VPN or PPTP con-
nections from the BAT.
D If a TCP connection requests a channel, then the one with the lowest
absolute workload will be chosen.
D If a VPN or PPTP connection requests a channel, then the connec-
tions will be equally spread between all available channels.
Note: For the most effective use of load balancing, the bandwidth should be
entered into the list of WAN interfaces under LANconfig in the configura-
tion area 'Interface' on the 'WAN' tab under the button Interface settings
(Telnet: /Setup/Interfaces/DSL, WEBconfig: Expert configuration
Setup Interfaces DSL).
BAT54-Rail/F..
Release 7.54 06/08 421
Routing and WAN connections 11.8 Load balancing
U Policy-based routing
The following method is for the configuration of channel bundling via PPPoE:
V Assign the DSL ports to the required Ethernet ports, in LANconfig via In-
terfaces LAN Ethernet-Ports.
Telnet: /Setup/Interfaces/Ethernet-ports
WEBconfig: Expert configuration Setup Interfaces Ethernet
ports
V Activate the additional DSL interfaces in LANconfig via Interfaces WAN
Interface settings. Enter the data rates for up- and downstream.
Telnet: /Setup/Interfaces/DSL
WEBconfig: Expert configuration Setup Interfaces DSL
BAT54-Rail/F..
422 Release 7.54 06/08
Routing and WAN connections 11.8 Load balancing
V For the required remote station, enter the DSL ports that are to be used
in LANconfig via Communication Remote sites Remote sites
(DSL).
Telnet: /Setup/WAN/DSL-broadband-peers
WEBconfig: Expert configuration Setup WAN DSL-broadband-
peers
V Actitivate channel bundling for the relevant layers in LANconfig via Com-
munication General Communication layers.
Telnet: /Setup/WAN/Layer
WEBconfig: Expert configuration Setup WAN Layer
The first step in setting up dynamic load balancing is to define the Internet
accesses, e.g. 'INET1' and 'INET2', with the aid of the LANconfig Wizard.
V To distribute Internet traffic across different DSL interfaces, the individual
remote stations are assigned to different DSL ports in LANconfig under
Communication Remote sites Remote sites (DSL).
Telnet: /Setup/WAN/DSL-broadband-peers
WEBconfig: Expert configuration Setup WAN DSL-broadband-
peers
BAT54-Rail/F..
Release 7.54 06/08 423
Routing and WAN connections 11.8 Load balancing
V The two DSL remotes are the assigned to a new virtual remote site 'IN-
TERNET' in the load balancing list in LANconfig via IP router Routing
Load balancing.
Telnet: /Setup/IP-router/Load-balancer
WEBconfig: Expert configuration Setup IP router Load balancer
V The virtual remote site is entered into the routing table as the router for
the default route in LANconfig via IP router Routing Routing table.
Telnet: /Setup/IP-router/IP-routing-table
WEBconfig: Expert configuration Setup IP router IP routing ta-
ble
Note: The virtual remote site 'INTERNET' is now to be used for Internet ac-
cess. When data are routed over this connection, the load balancing table
will cause the "real" DSL connections to be established and the data will
be transmitted over the selected DSL ports.
V Routing tags can be used for the application-dependent direction of data
traffic to specific DSL ports. If, for example, outgoing e-mail traffic is to be
routed over a certain DSL interface with a certain IP address, then the ap-
propriate firewall rule must be created that transmits e-mail data traffic
from all local stations to the mail server and sets the routing tag to '1'; do
this with LANconfig via Firewall/QoS Rules.
Telnet: /Setup/IP-router/Firewall/Rules
WEBconfig: Expert configuration Setup IP router Firewall
Rules.
BAT54-Rail/F..
424 Release 7.54 06/08
Routing and WAN connections 11.9 N:N mapping
11.9N:N mapping
Network Address Translation (NAT) can be used for several different mat-
ters:
D for better utilizing the IP4 addresses ever becoming scarcer
D for coupling of networks with same (private) address ranges
D for producing unique addresses for network management
In the first application the so-called N:1 NAT, also known as IP masquerading
(IP masquerading page 369) is used. All addresses (N) of the local net-
work are mapped to only one (1) public address. This clear assignment of
data streams to the respective internal PCs is generally made available by
the ports of the TCP and UDP protocols. Thats why this is also called NAT/
PAT (Network Address Translation/Port Address Translation).
Due to the dynamic assignment of ports, N:1 masquerading enables only
those connections, which have been initiated by the internal network. Excep-
tion: an internal IP address is statically exposed on a certain port, e.g. to
make a LAN server accessible from the outside. This process is called in-
verse masquerading (Inverse masquerading page 372).
A N:N mapping is used for network couplings with identical address ranges.
This transforms unambiguously multiple addresses (N) of the local network
to multiple (N) addresses of another network. Thereby, an address conflict
can be resolved.
Rules for this address translation are defined in a static table in the BAT.
Thereby new addresses are assigned to single stations, parts of the network,
or the entire LAN, by which the stations can contact other networks then.
BAT54-Rail/F..
Release 7.54 06/08 425
Routing and WAN connections 11.9 N:N mapping
Some protocols (FTP, H.323) exchange parameters during their protocol ne-
gotiation, which can have influence on the address translation for the N:N
mapping. For a correct functioning of the address translation, the connection
information of these protocols are tracked appropriately by functions of the
firewall in a dynamic table, and are additionally considered to the entries of
the static table.
Note: The address translation is made outbound, i.e. the source address is
translated for outgoing data packets and the destination address for in-
coming data packets, as long as the addresses are located within the de-
fined translation range. An inbound address mapping, whereby the
source address is translated (instead of the destination address), needs
to be realized by an appropriate outbound address translation on the re-
mote side.
U Network coupling
Gateway Gateway
VPN tunnel
Target: 192.168.2.1
BAT54-Rail/F..
426 Release 7.54 06/08
Routing and WAN connections 11.9 N:N mapping
Remote maintenance and control of networks become more and more impor-
tance because of the possibilities given by VPN. With the use of the nearly
ubiquitous broadband Internet connections, the administrator of such man-
agement scenarios is no longer dependent of the different data communica-
tion technologies or expensive leased lines.
BAT54-Rail/F..
Release 7.54 06/08 427
Routing and WAN connections 11.9 N:N mapping
el
nn
tu
N
VP
Customer A, office 2: Customer B, office 2:
Gateway Gateway
Service provider:
172.16.10.x,
255.255.255.0
BAT54-Rail/F..
428 Release 7.54 06/08
Routing and WAN connections 11.9 N:N mapping
Traps from the networks report to the service provider whether e. g. a VPN
tunnel has been build up or cut, if an user has been tried to log in three times
with a wrong password, if an user has been applied for a hot spot, or if some-
where a LAN cable has been pulled out of a switch.
Note: A complete list of all SNMP traps supported by BAT can be found in
the appendix of this user manual configuration (SNMP Traps
page 523).
Routing of these different networks reaches very fast its limiting factors, if two
or more clients use same address ranges. Additionally, if some clients use
the same address range as the service provider as well, further address con-
flicts are added. In this example, one of the hot spots of client C has got the
same address as the gateway of the service provider.
There are two different variants to resolve these address conflicts:
Loopback:
decentralized
1:1 mapping
D In the decentralized variant, alternative IP addresses for communicating
with the SNMP addressee are assigned to each of the monitored devices
by means of an 1:1 mapping. This address is in technical language also
known as loopback address, the method accordingly as loopback
method.
Note: The loopback addresses are valid only for communication with certain
remote stations on the connections belonging to them. Thus a BAT is not
generally accessible via this IP address.
Alternative:
central
N:N mapping
D Even more appealing is the solution of a central mapping: instead of con-
figuring each single gateway in the branch networks, the administrator
configures solely one central address translation in the gateway of the
head office. On this occasion, also all subnetworks located behind the
head office are supplied with the needed new IP addresses.
In this example, the administrator of the service provider selects 10.2.x.x as
central address translation for the network of client B, so that both networks
with actual same address range looks like two different networks for the gate-
way of the service provider.
The administrator selects the address ranges 192.168.2.x and 192.168.3.x
for client C and D, so that the addresses of these networks do differ from the
own network of the service provider.
BAT54-Rail/F..
Release 7.54 06/08 429
Routing and WAN connections 11.9 N:N mapping
In order to enable the gateway of the provider to monitor the networks of cli-
ents C and D, the administrator sets up an address translation to 192.168.1.x
also for the own network.
11.9.2 Configuration
U Setting up address translation
Note: Please notice that the N:N mapping functions are only effective when
the firewall has been activated. (Firewall/QoS enabled page 265)!
BAT54-Rail/F..
430 Release 7.54 06/08
Routing and WAN connections 11.9 N:N mapping
By setting up address translation in the NAT table, the networks and work-
stations become only visible under another address at first in the higher net-
work compound. But for a seamless routing of data between the networks
some further settings are still necessary:
D Entries in the routing tables for packets with new addresses to find the
way to their destination.
D DNS forwarding entries, in order that inquiries about certain devices in the
respective other networks can be resolved into mapped IP addresses
(DNS forwarding page 474).
D The firewall rules of the gateways must be adjusted such that (if neces-
sary) authorized stations resp. networks from the outside are permitted to
set up connections.
D VPN rules for loopback addresses in order to transmit the newly assigned
IP addresses through an according VPN tunnel.
Note: The IP address translation takes place in the BAT between firewall and
IP router on one hand, and the VPN module on the other hand. All rules
related to the own network use therefore the unmapped original ad-
dresses. The entries of the remote network use the mapped addresses
of the remote side, valid on the VPN connection.
BAT54-Rail/F..
Release 7.54 06/08 431
Routing and WAN connections 11.9 N:N mapping
Target address
Source address
WAN interfaces
MAC/protocol filter
Virtual LANs (VLAN)
DHCP client / PPP
802.11i/WPA/
Encryption:
WLAN-1-8
IP router
ADSL WLAN-2-1
to
WLAN-2-8
IP-Redirect
DSL
IP masquerading
DMZ
ISDN Configuration &
management:
Filter
Filter
WEBconfig, Telnet,
TFTP
IPX router
IPX over PPTP/VPN
LANCAPI
LANconfig
With LANconfig you adjust the address translation for the configuration range
IP router on register card 'N:N-Mapping':
BAT54-Rail/F..
432 Release 7.54 06/08
Routing and WAN connections 11.9 N:N mapping
WEBconfig, Telnet
Under WEBconfig and Telnet you find the NAT table for configuration of N:N
mapping at the following positions of the menu tree:
When starting a new entry under WEBconfig, the NAT table shows up as fol-
lows:
BAT54-Rail/F..
Release 7.54 06/08 433
Routing and WAN connections 11.10 Establishing connection with PPP
11.10Establishing connection
with PPP
Hirschmann routers also support the point-to-point protocol (PPP). PPP is a
generic term for a whole series of WAN protocols which enable the interac-
tion of routers made by different manufacturers since this protocol is support-
ed by practically all manufacturers.
Due to the increasing importance of this protocol family and the fact that PPP
is not associated with any specific operating mode of the routers, we will be
introducing the functions of the devices associated with the PPP here in a
separate section.
11.10.1The protocol
U What is PPP?
BAT54-Rail/F..
434 Release 7.54 06/08
Routing and WAN connections 11.10 Establishing connection with PPP
BAT54-Rail/F..
Release 7.54 06/08 435
Routing and WAN connections 11.10 Establishing connection with PPP
After the password has been successfully transmitted, the IPCP and/or
IPXCP network layer can be established.
IP and/or IPS packets can be transferred from the router modules to the
opened line if the negotiation of parameters is successful for at least one
of the network layers.
D Terminate phase
In the final phase the line is cleared, when the logical connections for all
protocols are cleared.
BAT54-Rail/F..
436 Release 7.54 06/08
Routing and WAN connections 11.10 Establishing connection with PPP
Note: The LCP request behavior is configured in the PPP list for each indi-
vidual connection. The intervals at which LCP requests should be made
are set by the entries in the 'Time' and 'Retr.' fields, along with the number
of retries that should be initiated without a response before the line can be
considered faulty. LCP requests can be switched off entirely by setting the
time at '0' and the retries at '0'.
U Examples
D Remote access
Address assignment is made possible by a special entry in the IP routing
table. 255.255.255.255 is specified as the network mask as the IP
address to be assigned to the remote site in the 'Router-name' field. In
this case, the router name is the name, with which the remote site must
identify itself to the BAT.
In addition to the IP address, the addresses of the DNS and NBNS serv-
ers (Domain Name Server and NetBIOS Name Server) including the
backup server from the entries in the TCP/IP module are transmitted to
the remote station during this configuration.
So that everything functions properly, the remote site must also be
adjusted in such a way that it can obtain the IP address and the name
server from the BAT. This can be accomplished with Windows dial-up
networking through the settings in the 'TCP settings' under 'IP address'
and 'DNS configuration'. This is where the options 'IP address assigned
by server' and 'Specify name server addresses' are activated.
D Internet access
BAT54-Rail/F..
Release 7.54 06/08 437
Routing and WAN connections 11.10 Establishing connection with PPP
If Internet access for a local network is realized via the BAT, the assign-
ment of IP addresses can occur in a reverse manner. Configurations are
possible in which the BAT does not have a valid IP address in the Inter-
net and is assigned one by the Internet provider for the duration of the
connection. In addition to the IP address, the BAT also receives informa-
tion via the DNS server of the provider during the PPP negotiation.
In the local network, the BAT is only known by its internal valid intranet
address. All workstations in the local network can then access the same
Internet account and also reach e.g. the DNS server.
Windows users are able to view the assigned addresses via LANmonitor. In
addition to the name of the remote station, the current IP address as well as
the addresses of DNS and NBNS servers can be found there. Options such
as channel bundling or the duration of the connection are also displayed.
The PPP list may have up to 64 entries and contain the following values:
BAT54-Rail/F..
438 Release 7.54 06/08
Routing and WAN connections 11.11 DSL Connection with PPTP
U Configuration of PPTP
As soon as the internet access over PPTP is selected the BAT enquires all
needed PPTP parameters with the Internet Access Wizard. Additionally to
the entries for PPPoE access the IP address of the gateway must be speci-
fied. A PPTP gateway is often a DSL modem. Detailed information is avail-
able from your DSL provider.
The PPTP list for editing the configuration can be reached as follows:
BAT54-Rail/F..
Release 7.54 06/08 439
Routing and WAN connections 11.12 Extended connection for flat rates
D 'IP address'IP address of the PPTP gateway, often the address of the
DSL modem.
D 'Port'IP port the PPTP protocol runs on. For conformity with the protocol
standard enter the port '1.723'.
11.13Callback functions
The BAT supports automatic callback via its ISDN port.
BAT54-Rail/F..
440 Release 7.54 06/08
Routing and WAN connections 11.13 Callback functions
U No callback
For this setting, the callback entry must be set to 'off' when configuring via
WEBconfig or in the console.
For this setting the callback entry must be set to 'Call back the remote site
after name verification' (or must have the value 'Name' in WEBconfig or in the
console). In the peer list no telephone number may be specified.
BAT54-Rail/F..
Release 7.54 06/08 441
Routing and WAN connections 11.13 Callback functions
For this setting the callback entry must be set to 'Call back the remote site
after name verification' (or must be set to the value 'Name' in WEBconfig or
in the console). In the peer list one telephone number must be specified.
Some Windows versions (especially Windows 98) prompt the user to confirm
the callback to the telephone number stored in the BAT ('Administrator Spec-
ified') with an input window. Other Windows versions only inform the user that
the PC is waiting for the callback from the BAT.
11.13.2Fast callback
This fast process is ideal if two BAT are to communicate with one another via
callback.
D The caller who may wish to be called back can activate the function 'Wait
for callback from remote site' in the peer list (or 'Looser' when configuring
via WEBconfig, terminal program or Telnet).
D The callback party selects 'Call back the remote site (fast procedure)' in
the peer list and enters the calling number ('fast' when configuring via
WEBconfig, terminal program or Telnet).
Note: For fast callback using this method, the number list for answering calls
must be kept up to date at both ends.
BAT54-Rail/F..
442 Release 7.54 06/08
Routing and WAN connections 11.13 Callback functions
U Configuration
For callback as per PPP you select the option 'Call back the remote site' in
LANconfig or 'Auto' with configuration via WEBconfig, terminal program or
Telnet.
Note: For callback as per PPP the number list for answering calls in the BAT
must be up to date.
BAT54-Rail/F..
Release 7.54 06/08 443
Routing and WAN connections 11.14 serial interface
Note: The setting 'Name' offers the greatest security when an entry is made
into the number list as well as the PPP list. The setting 'fast' offers the fast-
est callback method between two Hirschmann routers.
Note: With Windows remote stations, the 'Name' setting must be selected.
11.14serial interface
Note: This section refers only to devices with a serial configuration interface.
11.14.1Introduction
Internationally, analog telephone connections are just as common in the
business world as the predominant ISDN connections in Germany. The op-
eration of international networks thus places particular demands on remote
maintenance options and for high-availability of the gateways and thus re-
quires different interfaces than the ISDN common in Germany. Apart from
conventional analog telephone lines, mobile telephone networks such as
GSM or GPRS may, in certain cases, represent the only way of providing re-
mote maintenance without broadband or other cabled access.
In response to these requirements, most models with a serial interface can
be extended with an additional WAN interface with the use of analog mo-
dems, GSM or GPRS. The following functions are available with a suitable
modem in combination with the Modem Adapter Kit:
D Internet access via modem with all of the router functions such as firewall,
automatic connection establishment and termination, etc.
D Remote maintenance (e.g. dial-in to international sites)
D Backup connection (e.g. high-availability through GSM/GPRS modem
connection)
BAT54-Rail/F..
444 Release 7.54 06/08
Routing and WAN connections 11.14 serial interface
Internet provider
Headquarters
DSL DSL
VPN
Modem (analogue)
GSM/
GPRS
Modem (GSM/GPRS)
11.14.2System requirements
The following are required to set up a backup connection over the serial in-
terface:
D BAT with serial configuration interface and support for BAT modem adapt-
er kit.
D LANconfig or alternatively a web browser or Telnet
D Serial configuration cable (supplied with the device)
D Analog modem, Hayes compatible, with access to a suitable analog tele-
phone connection
D BAT modem adapter kit to connect the modem over the serial configura-
tion cable
11.14.3Installation
The installation simply involves the connection of the modem with the BAT
Modem Adapter Kit with the serial configuration interface of the BAT.
Note: Please do not use any other adapters than the original BAT Modem
Adapter Kit! The contact assignment of the BAT Modem Adapter Kit dif-
fers from other commercial adapters like null modem cables or the like.
The use of uncompliant accessories will cause serious damage on the
BAT and/or the modem. For further details please refer to the Contact as-
signment of BAT modem adapter kit page 453.
BAT54-Rail/F..
Release 7.54 06/08 445
Routing and WAN connections 11.14 serial interface
BAT54-Rail/F..
446 Release 7.54 06/08
Routing and WAN connections 11.14 serial interface
Note: As long as the BAT is set to modem mode, a terminal program oper-
ating over the serial interface will display the AT commands that the BAT
device transmits while attempting to identify a connected modem. In the
terminal program, press the return key repeatedly until the modem identi-
fication is interrupted and start the configuration session.
BAT54-Rail/F..
Release 7.54 06/08 447
Routing and WAN connections 11.14 serial interface
Note: The modem parameters are set with values that should suit most mo-
dems. Thus changes are generally not necessary. Refer to the documen-
tation for your modem for settings that vary from these.
BAT54-Rail/F..
448 Release 7.54 06/08
Routing and WAN connections 11.14 serial interface
For a GPRS dial-up, the initialisation strings require the entry of inverted
commas and equal signs. Certain special characters can be correspond-
ingly marked with a leading backslash:
D *
D "
D =
D space
D Example: +cgdcont\=1,\IP\,\internet.t-d1.de\
As an alternative, the entire command sequence can be enclosed within in-
verted commas. In this case, those inverted commas which are inside the
surrounding inverted commas must be preceded by a backslash.
D Example: +cgdcont=1,\IP\,\internet.t-d1.de\
BAT54-Rail/F..
Release 7.54 06/08 449
Routing and WAN connections 11.14 serial interface
11.14.7Statistics
Statistics about activities of the serial interface can be accessed with a termi-
nal program or Telnet under:
Status/Modem Status
The statistics show the following states:
D the type of modem identified
D the status of its last connection, e.g. the transfer rate, the transfer protocol
used or the error-detection method used
D internal state of modem management, e.g.
D device detection
D interface deactivated
D modem initialization
D modem ready
D connection establishment
D modem in data mode
These messages may be very helpful for debugging purposes.
11.14.8Trace output
The command
D trace + serial
allows you to start the trace output for the serial interface in a Telnet session
when a BAT has a modem connected. The output shows all messages ex-
changed up until the establishment of data transfer between the modem and
the BAT.
BAT54-Rail/F..
450 Release 7.54 06/08
Routing and WAN connections 11.14 serial interface
D Hold time: This time defines how long a connection is kept active even if
no more data is being transferred. If a zero is entered, the connection will
not be interrupted automatically. A hold time of "9999" means that the
connection is permanently held open. If it is interrupted, then the connec-
tion will be actively opened up again. This behavior is known as keep
alive.
D 2. Hold time: Is ignored.
D Layer name: The layer 'V.24_DEF' is selected for the connection over the
serial WAN interface. The layer is preset and does not need further con-
figuration. The layer 'V.24_DEF' uses the following settings:
D Encapsulation: Transparent
D Layer 3: APPP (asynchronous PPP)
D Layer 2: Transparent
D Options: none
D Layer 1: SERIAL (shows that the serial interface is being used for con-
nections via the layer 'V.24_DEF')
The remote site list with the remote sites for the modem at the serial interface
can be found under the following paths:
BAT54-Rail/F..
Release 7.54 06/08 451
Routing and WAN connections 11.14 serial interface
Once an entry in the remote site list has been generated for the WAN inter-
face, this remote station can be used just like any other for routing and WAN
connections.
BAT54-Rail/F..
452 Release 7.54 06/08
Routing and WAN connections 11.15 Manual definition of the MTU
BAT54-Rail/F..
Release 7.54 06/08 453
Routing and WAN connections 11.16 WAN RIP
11.15.1Configuration
WEBconfig, Telnet or terminal program
Under WEBconfig, Telnet or a terminal program, you will find the MTU list for
a maximum of 16 entries under the following paths:
11.15.2Statistics
Under Status WAN-statistics you will find the MTU statistics recorded for
all current connections. The table is partially dynamic and begins with 16 en-
tries. Like the MTU list under Setup WAN it contains two columns with the
remote name and the MTU.
Note: MTU lists and MTU statistics are only available for devices with a DSL
or ADSL interface.
11.16WAN RIP
In order for routes learned from RIP to be broadcast across the WAN, the re-
spective remote stations can be entered into the WAN RIP table. The WAN
RIP table contains the following values:
BAT54-Rail/F..
454 Release 7.54 06/08
Routing and WAN connections 11.16 WAN RIP
D Remote site: The name of the remote station is listed in the 'Remote site'
column:
D RIP type: The column RIP type details the RIP version with which the lo-
cal routes are propagated
D RIP accept: The column RIP accept lists whether RIP from the WAN is to
be accepted. The RIP type must be set for this.
D Masquerade: The column Masquerade lists whether or not masquerad-
ing is performed on the connection and how it is carried out. This entry
makes it possible to start WAN RIP even in an empty routing table. The
following values are possible:
D Auto: The masquerade type is taken from the routing table (value: 0).
If there is no routing entry for the remote station, then masquerading
is not performed.
D On: All connections are masqueraded (value: 1).
D Intranet: IP masquerading is used for connections from the intranet,
connections from the DMZ pass through transparently (value: 2).
D Default tag: The column Default tag lists the valid "Default touting tag" for
the WAN connection. All untagged routes are tagged with this tag when
sent on the WAN.
D Routing tags list: The column Routing tags list details a comma-separat-
ed list of the tags that are accepted on the interface. If this list is empty,
then all tags are accepted. If at least one tag is in the list, then only the
tags in this list are accepted. When sending tagged routes on the WAN,
only routes with valid tags are propagated.
All learned routes from the WAN are treated internally as untagged
routes and propagated on the LAN with the default tag (0). In the WAN,
they are propagated with the tag with which they were learned.
Configuration with LANconfig
The WAN RIP table can be found in the LANconfig in the configuration area
'IP router' on the 'General' tab.
BAT54-Rail/F..
Release 7.54 06/08 455
Routing and WAN connections 11.17 The rapid spanning tree protocol
BAT54-Rail/F..
456 Release 7.54 06/08
Routing and WAN connections 11.17 The rapid spanning tree protocol
BAT54-Rail/F..
Release 7.54 06/08 457
Routing and WAN connections 11.17 The rapid spanning tree protocol
U General parameters
BAT54-Rail/F..
458 Release 7.54 06/08
Routing and WAN connections 11.17 The rapid spanning tree protocol
Note: RSTP is compatible with STP. Network components which only sup-
port classical STP continue to be supported where RSTP is operational.
D Default: Classic
D Path Cost Computation
D Classic: Uses the classical STP method to compute path costs.
D Rapid: Uses the RSTP method to compute path costs.
D Default: Classic
D Bridge priority
Defines the priority of the bridge in the LAN. This can influence which
bridge should preferably be made root bridge by the Spanning Tree Pro-
tocol.
D Values: 0 to 65535, where a higher value means a lower priority.
D Default: 32.768
Note: So as to maintain compatibility with RSTP, this value should only be
adjusted in steps of 4096 owing to the fact that RSTP uses the lower 12-
bits of this 16-bit value for other purposes.
D Maximum Age
This value defines the time (in seconds) after which a bridge drops mes-
sages received through Spanning Tree as 'outdated'. This parameter
defines how quickly the Spanning Tree algorithm reacts to changes, for
example due to failed bridges.
D Values: 0 to 65535.
D Default: 20
D Hello Time
This parameter defines (in seconds) in which intervals a device selected
to be the root bridge sends Spanning Tree information into the LAN.
D Default: 2
D Forward-Delay
This time (in seconds) determines how much time must pass at a mini-
mum before a Spanning Tree port can change the status (listening, learn-
ing, forwarding).
D Default: 6
Note: When using RSTP the forwarding delay often has no effect because
RSTP has suitable mechanisms of its own to prompt a rapid switching into
the forwarding state.
BAT54-Rail/F..
Release 7.54 06/08 459
Routing and WAN connections 11.17 The rapid spanning tree protocol
Note: Modifying any of these three time values is only recommended for
those with exact knowledge of the Spanning Tree protocol. An adjustment
can be useful in order to optimize reaction times after topology changes
or to achieve stable performance in networks with many 'bridge hops'.
D Transmit-Hold-Count
Number of BPDUs which can be transmitted by RSTP before a one sec-
ond pause commences.
D Default: 6
Note: When using classical STP the transmit-hold count has no effect.
U Port Table
The port table can be used to set the following values separately for all avail-
able ports (LAN, wireless LAN, point-to-point connections).
D Mark as edge port
Marks the port as an edge port which is not connected to any further
bridges but to workstations or servers only. Edge ports switch immediately
into the forwarding state.
D Default: Off
Note: Edge ports continue to be monitored by RSTP. If a port of this type re-
ceives BPDUs, then its status as an edge port is removed.
D Priority
Defines the priority of the port. In the case of multiple network paths with
identical path costs, the priority value decides which port is used. If priority
values are identical then the port to be taken is the first in the list.
D Values: 0 to 255, where a higher value means a lower priority.
D Default: 128
Note: So as to maintain compatibility with RSTP, this value may only be ad-
justed in steps of 16 owing to the fact that RSTP uses only the upper 4-
bits of this 16-bit value.
D Path-Cost-Override
This parameter controls the priority of paths with equal value. The value
set here is used to make the selection instead of the computed path costs.
D Particular values: 0 switches path-cost override off.
D Default: 0
BAT54-Rail/F..
460 Release 7.54 06/08
Routing and WAN connections 11.17 The rapid spanning tree protocol
D Bridge ID
This is the ID for the device that is being used by the Spanning Tree algo-
rithm. It is composed of the user-defined priority (upper 16 bits) and the
device MAC address (lower 48 bits).
D Root Bridge
The ID for the device that is currently elected root bridge.
D Root Port
The port that can be used to reach the root bridge from this device. If the
device itself is the root bridge, it is displayed with the special value '255'.
D Root Path Cost
The path costs of all hops added together in order to reach the root bridge
from this device.
D Protocol version
The protocol version currently set for determining network topology.
D Path Cost Computation
The protocol version currently set for computing path cost.
D Bridge Priority
Current setting for bridge priority.
The port table can be used to inspect the following values for all available
ports (LAN, wireless LAN, point-to-point connections).
D Priority
The priority of this port taken from the port configuration
D State
The current status of the port:
BAT54-Rail/F..
Release 7.54 06/08 461
Routing and WAN connections 11.17 The rapid spanning tree protocol
Transfer technology Costs of Classic Spanning Tree Costs of Rapid Spanning Tree
Ethernet 10 MBit 100 2000000
Ethernet 100 MBit 19 200000
Ethernet 1000 MBit 4 200000
WLAN 2 MBit 500 12500000
WLAN 11 MBit 140 4000000
WLAN 54 MBit 35 900000
WLAN 108 MBit 25 450000
Note: If path costs for a port were manually entered, then the configured val-
ue appears in this column.
The RSTP port table can be used to inspect the following values for all avail-
able ports (LAN, wireless LAN, point-to-point connections).
BAT54-Rail/F..
462 Release 7.54 06/08
Routing and WAN connections 11.17 The rapid spanning tree protocol
D Role
Root or Non-root bridge
D Learning
Port in learning state.
D Forwarding
Port in forwarding state.
D Edge port
Port defined as an edge port.
D Protocol version
Classic or Rapid
D Costs
Setting for this port's cost
BAT54-Rail/F..
Release 7.54 06/08 463
Routing and WAN connections 11.17 The rapid spanning tree protocol
BAT54-Rail/F..
464 Release 7.54 06/08
More services 12.1 Automatic IP address administration with
12 More services
An BAT offers a number of services for the PCs in the LAN. These are central
functions that can be used by workstation computers. They are in particular:
D Automatic address administration with DHCP
D Name management of computers and networks with DNS
D Logging of network traffic with SYSLOG
D Recording of charges
D Office communications functions with LANCAPI
D Time server
12.1Automatic IP address
administration with DHCP
In order to operate smoothly in a TCP/IP network, all the devices in a local
network must have unique IP addresses.
They also need the addresses of DNS-servers and NBNS-servers as well as
that of a default gateway through which the data packets are to be routed
from addresses that are not available locally.
In a smaller network, it is still conceivable that these addresses could be en-
tered manually in all the computers in the network. In a larger network with
many workstation computers, however, this would simply be too enormous
of a task.
In such situations, the DHCP (Dynamic Host Configuration Protocol) is the
ideal solution. Using this protocol, a DHCP server in a TCP/IP-based LAN
can dynamically assign the necessary addresses to the individual stations.
The BAT devices have a build in DHCP server, which assigns the IP address-
es in the LAN. If a DHCP server already exists in the local network, the device
in DHCP client mode can alternatively get the required address information
from the other DHCP server.
BAT54-Rail/F..
Release 7.54 06/08 465
More services 12.1 Automatic IP address administration with
D network mask
D broadcast address
D standard gateway
D DNS server
D NBNS server
D period of validity for the parameters assigned
The DHCP server takes the IP addresses either from a freely defined ad-
dress pool or determines the addresses automatically from its own IP ad-
dress (or intranet address).
In DHCP mode, a completely unconfigured device can even automatically
assign IP addresses to itself and the computers in the network.
In the simplest case, all that is required is to connect the new device to a net-
work without other DHCP servers and switch it on. The DHCP server then in-
teracts with LANconfig using a wizard and handles all of the address
assignments in the local network itself.
BAT54-Rail/F..
466 Release 7.54 06/08
More services 12.1 Automatic IP address administration with
D The device then enables its own DHCP server if no other DHCP serv-
ers are found. If at a later point of time a further DHCP server is
switched on in the LAN, the device automatically changes back into
the DHCP client mode.
D 'client': The DHCP server is switched off, the device acts like a DHCP cli-
ent and obtains the address information from a different DHCP server in
the LAN.
Note: Only use this setting if assured, that a further DHCP server is active in
the LAN and takes over the assigned IP address information.
D 'forwarding': The DHCP server is active and the device accepts the re-
quests from the DHCP clients in the local network. The device does not
respond to these requests itself, but forwards them to a central DHCP
server.
Whether the DHCP server is active or not can be seen in the DHCP statistics.
The default setting for this condition is 'auto'.
Before the DHCP server can assign IP addresses to the computers in the
network, it first needs to know which addresses are available for assignment.
Three options exist for determining the available selection of addresses:
D The IP address can be taken from the address pool selected (start ad-
dress pool to end address pool). Any valid addresses in the local network
can be entered here.
BAT54-Rail/F..
Release 7.54 06/08 467
More services 12.1 Automatic IP address administration with
BAT54-Rail/F..
468 Release 7.54 06/08
More services 12.1 Automatic IP address administration with
U Netmask assignment
The network mask is assigned in the same way as the address. If a network
mask is entered in the DHCP module, this mask is used for the assignment.
Otherwise, the network mask from the TCP/IP module is used. The order is
the same as during the assignment of the addresses.
Normally, an address yielded from the valid IP addresses and the network
mask is used for broadcast packets in the local network. In special cases,
however (e.g. when using subnetworks for some of the workstation comput-
ers), it may be necessary to use a different broadcast address. In this case,
the broadcast address to be used is entered in the DHCP module.
Note: The default setting for the broadcast address should be changed by
experienced network specialists only. Incorrect configuration of this sec-
tion can result in the undesired establishment of connections subject to
connect charges!
The device always assigns the requesting computer its own IP address as a
gateway address.
If necessary, this assignment can be overwritten with the settings on the
workstation computer.
BAT54-Rail/F..
Release 7.54 06/08 469
More services 12.1 Automatic IP address administration with
If no server is specified in the relevant fields, the router passes its own IP ad-
dress as a DNS address. This address is determined as described under 'IP
address assignment'. The router then uses DNS-forwarding (also see 'DNS-
forwarding'), to resolve DNS or NBNS requests from the host.
The addresses assigned to the computer are valid only for a limited period of
time. Once this period of validity has expired, the computer can no longer use
these addresses. In order for the computer to keep from constantly losing its
addresses (above all its IP address), it applies for an extension ahead of time
that it is generally sure to be granted. The computer loses its address only if
it is switched off when the period of validity expires.
For each request, a host can ask for a specific period of validity. However, a
DHCP server can also assign the host a period of validity that differs from
what it requested. The DHCP module provides two settings for influencing
the period of validity:
D Maximum lease time in minutes
Here you can enter the maximum period of validity that the DHCP server
assigns a host.
If a host requests a validity that exceeds the maximum length, this will
nevertheless be the maximum available validity!
The default setting is 6000 minutes (approx. 4 days).
D Default lease time in minutes
Here you can enter the period of validity that is assigned if the host
makes no request. The default setting is 500 minutes (approx. 8 hours).
In the default configuration, almost all the settings in the Windows network
environment are selected in such a way that the necessary parameters are
requested via DHCP. Check the settings by clicking Start Settings Con-
trol Panel Network. Select the TCP/IP entry for your network adapter and
open Properties.
Check the various tabs for special entries, such as for the IP address or the
standard gateway. If you would like all of the values to be assigned by the
DHCP server, simply delete the corresponding entries.
On the 'WINS configuration' tab, the 'Use DHCP for WINS Resolution' option
must also be selected if you want to use Windows networks over IP with
name resolution using NBNS servers. In this case, the DHCP server must
also have an NBNS entry.
BAT54-Rail/F..
470 Release 7.54 06/08
More services 12.1 Automatic IP address administration with
The DHCP table provides a list of the IP addresses in the LAN. This table
contains the assigned or used IP address, the MAC address, the validity, the
name of the computer (if available) and the type of address assignment.
The 'Type' field specifies how the address was assigned. This field can as-
sume the following values:
D 'new'
The computer has made its initial request. The DHCP server verifies the
uniqueness of the address that is to be assigned to the computer.
D 'unknown'
While verifying uniqueness, it was determined that the address has al-
ready been assigned to another computer. Unfortunately, the DHCP serv-
er has no means of obtaining additional information on this computer.
D 'static'
A computer has informed the DHCP server that it has a fixed IP address.
This address can no longer be used.
D 'dynamic'
The DHCP server assigned the computer an address.
BAT54-Rail/F..
Release 7.54 06/08 471
More services 12.2 Vendor Class and User Class Identifier on
BAT54-Rail/F..
472 Release 7.54 06/08
More services 12.3 DNS
12.3DNS
The domain name service (DNS) is responsible in TCP/IP networks for asso-
ciating computer names and/or network (domains) and IP addresses. This
service is required for Internet communications, to return the correct IP ad-
dress for a request such as 'www.hirschmann.com' for example. However,
it's also useful to be able to clearly associate IP addresses to computer
names within a local network or in a LAN interconnection.
BAT54-Rail/F..
Release 7.54 06/08 473
More services 12.3 DNS
When processing requests for specific names, the DNS server takes advan-
tage of all of the information available to it:
D First, the DNS server checks whether access to the name is not prohibited
by the filter list. If that is the case, an error message is returned to the re-
questing computer stating that access to the address has been denied.
D Next, it searches in its own static DNS table for suitable entries.
D If the address cannot be found in the DNS table, it searches the dynamic
DHCP table. The use of DHCP information can be disabled if required.
D If no information on the name can be located in the previous tables, the
DNS server then searches the lists of the NetBIOS module. The use of
the NetBIOS information can also be disabled if necessary.
D Finally, the DNS server checks whether the request to another DNS serv-
er is to be forwarded to another DNS server via a WAN interface (special
DNS forwarding via the DNS destination table).
If the requested name cannot be found in any of the information sources
available to it, the DNS server sends the request to another serverthat of
the Internet provider, for exampleusing the general DNS forwarding mech-
anism, or returns an error message to the requesting computer.
With special DNS forwarding name areas can be defined for the resolution
of which specified DNS server are addressed.
A typical application for special DNS forwarding results for a home worksta-
tion: The user wants to be able to connect to the company intranet and direct-
ly to the Internet at the same time. The requests sent into the intranet must
be routed to the company DNS server, and all other requests to the DNS
server of the provider.
BAT54-Rail/F..
474 Release 7.54 06/08
More services 12.3 DNS
All DNS requests that cannot be resolved in another way are forwarded to a
DNS server. This DNS server is determined according to the following rules:
D Initially the router checks whether a DNS server has been entered in its
own settings. If it is successful there, it obtains the desired information
from this server. Up to two higher-level DNS servers can be specified.
WEBconfig Operating
Terminal/Telnet set operating on
BAT54-Rail/F..
Release 7.54 06/08 475
More services 12.3 DNS
V Enter the domain in which the DNS server is located. The DNS server
uses this domain to determine whether the requested name is located in
the LAN. Entering the domain is optional.
WEBconfig Domain
Terminal/Telnet set domain yourdomain.com
V Specify whether information from the DHCP server and the NetBIOS
module should be used.
WEBconfig DHCP-usage
NetBIOS-usage
Terminal/Telnet set DHCP-usage yes
set NetBIOS-usage yes
V The main task of the DNS server is to distinguish requests for names in
the Internet from those for other remote stations. Therefore, enter all com-
puters in the Host names table,
D for which you know the name and IP address,
D that are not located in your own LAN,
D that are not on the Internet and
D that are accessible via the router.
BAT54-Rail/F..
476 Release 7.54 06/08
More services 12.3 DNS
With the following commands you add stations to the Host names table:
For example, if would like to access the mail server at your headquarters
(name: mail.yourdomain.com, IP: 10.0.0.99) via the router from a branch
office, enter:
When entering the name areas, the wildcards '?' (for individual charac-
ters) and '*' (for multiple characters) may be used.
To reroute all domains with the ending '.intern' to a DNS server in the
LAN of the remote station 'COMPANY', create the following entry:
BAT54-Rail/F..
Release 7.54 06/08 477
More services 12.3 DNS
Note: The DNS server may either be specified by the remote site name (for
automatic setting via PPP), or by an explicit IP address of the according
name server.
The index '001' in the console command can be selected as desired and
is used only for clarity.
Note: When entering the domains, the wildcards '?' (represents exactly one
character) and '*' (for any number of characters) are permitted.
To only block the access of a certain computer (e.g. with IP 10.0.0.123)
to COM domains, enter the following values:
BAT54-Rail/F..
478 Release 7.54 06/08
More services 12.3 DNS
If your LAN uses subnetting, you can also apply filters to individual
departments by carefully selecting the IP addresses and subnet masks.
The IP address '0.0.0.0' stands for all computers in the network, and the
subnet mask '0.0.0.0' for all networks.
All Dynamic DNS provider support a set of client programs, which can deter-
mine the current assigned WAN IP address of a BAT via different methods
, and transfer this address - in case of a change - to their respective Dy-
namic DNS server .
The current WAN IP address of a BAT can be picked under the following ad-
dress:
http://<address of Device>/config/1/6/8/3/
BAT54-Rail/F..
Release 7.54 06/08 479
More services 12.3 DNS
Alternatively the BAT can directly transmit the present WAN IP to the
DynDNS provider.
BAT
Internet
The required settings can be changed comfortably with the Setup Wizard:
BAT54-Rail/F..
480 Release 7.54 06/08
More services 12.4 Accounting
12.4Accounting
Information on connections between clients in the local network and various
remote stations is saved in the accounting table with entries for the connec-
tion time and the transferred data volume. Using accounting snapshots, ac-
counting data can be regularly saved at specific times for later evaluation.
BAT54-Rail/F..
Release 7.54 06/08 481
More services 12.4 Accounting
U Configuring accounting
BAT54-Rail/F..
482 Release 7.54 06/08
More services 12.4 Accounting
D Sort according to
Select here whether the data should be sorted in the accounting table
according to connection times or data volume.
U Snapshot configuration
When configuring the snapshot, the interval is set in which the accounting
data are temporarily saved into a snapshot:
Caution: The snapshot function can only be used when the device is set
with the correct system time.
BAT54-Rail/F..
Release 7.54 06/08 483
More services 12.5 The SYSLOG module
D Minute
The minute in which caching will take place:
D '0' to '59'
V Start LANconfig. Under 'Management', select the 'Log & Trace' tab.
V Turn the module on and click SYSLOG clients.
V In the next window click Add....
V First enter the IP address of the SYSLOG client, and then set the sources
and priorities.
BAT54-Rail/F..
484 Release 7.54 06/08
More services 12.5 The SYSLOG module
SYSLOG comes from the UNIX world, in which specified sources are
predefined. BAT assigns its own internal sources to these predefined
SYSLOG sources, the so-called facilities.
The following table provides an overview of the significance of all news
sources that can be set in the BAT. The last column of the table also
shows the alignment between the internal sources of the BAT and the
SYSLOG facilities.
BAT54-Rail/F..
Release 7.54 06/08 485
More services 12.6 Time server for the local net
The eight priority stages defined initially in the SYSLOG are reduced to
five stages in the BAT. The following table shows the relationship of
alarm level, significance and SYSLOG priorities.
V After you have set all the parameters, confirm the entries with OK. The
SYSLOG client is then entered with its parameters into the SYSLOG ta-
ble.
U Facilities
All messages from BAT can be assigned to a facility with the Facility map-
ping button and then are written to a special log file by the SYSLOG client
with no additional input.
Example
All facilities are set to 'local7'. Under Linux in the file /etc/syslog.conf the entry
local7.* /var/log/bat.log
writes all outputs of the BAT to the file /var/log/bat.log.
BAT54-Rail/F..
486 Release 7.54 06/08
More services 12.6 Time server for the local net
With these settings only the BAT applies the time from public time servers.
To provide the real time for the remaining device enable the local time server
under the tab 'Time Server'. Furthermore activate the broadcast mode and
enter the broadcast interval.
BAT54-Rail/F..
Release 7.54 06/08 487
More services 12.6 Time server for the local net
BAT54-Rail/F..
488 Release 7.54 06/08
More services 12.6 Time server for the local net
BAT devices work internally with the coordinated world time (UTC). For pro-
tocol displays and time-related settings (e.g. cron jobs), the local time is tak-
en as calculated from the defined time zone. To take local daylight-saving
time into account, settings can be configured according to requirements.
D Daylight-saving time
D Off: The system time will not be adjusted to daylight-saving time.
BAT54-Rail/F..
Release 7.54 06/08 489
More services 12.6 Time server for the local net
User-defined values can be set for the beginning and the end of the automat-
ic daylight-saving time change.
D Index
D First, second, third, fourth, last, second to last, third to last, fourth to
last: The time change will take place on this recurring day of the month.
D Day of week
D Monday to Sunday: The day on which the change will take place.
D Month
D January to December: The month on which the change will take place.
D Hour
D 0 to 23: The hour in which the change will take place.
D Minute
D 0 to 59: The minute in which the change will take place.
BAT54-Rail/F..
490 Release 7.54 06/08
More services 12.7 Scheduled Events
D Time type
D Local standard time or UTC: Defines the time zone the data refers to.
Caution: In the last hour of daylight-saving time or the first hour that fol-
lows in standard time, it is possible for time entries to be ambiguous. If the
time is acquired via ISDN or set manually during this time, then it is always
assumed that the time entry is in daylight-saving time.
12.7Scheduled Events
BAT54-Rail/F..
Release 7.54 06/08 491
More services 12.7 Scheduled Events
BAT54-Rail/F..
492 Release 7.54 06/08
More services 12.7 Scheduled Events
D Entry active
Activates or deactivates the entry.
D Default: Active
D Time base
The 'Time base' field determines whether time control is based on real
time or on the device's operating time.
D Real time: These rules evaluate all time/date information.
D Operation time: These rules only evaluate the minutes and hours since
the last time the device was started.
D Default: Real time
BAT54-Rail/F..
Release 7.54 06/08 493
More services 12.7 Scheduled Events
D Minutes
D Hours
D Week days
D Month days
D Months
The values 'minutes' to 'months' define the times when a command is to
be executed. With no value entered, it is not included in the controlling.
For each parameter, a comma-separated list of values can be entered, or
alternatively a range of minimum and maximum values.
The syntax of the 'Week day' field corresponds with the usual CRON inter-
pretation:
D 0: Sunday
D 1: Monday
D 2: Tuesday
D 3: Wednesday
D 4: Thursday
D 5: Friday
D 6: Saturday
D Command
The command to be executed or a comma-separated list of commands.
Any BAT command-line function can be executed.
D Owner
An administrator defined in the device can be designated as owner of the
CRON job. If an owner is defined, then the CRON job commands will be
executed with the rights of the owner.
D Default: root
D Variation
This parameter specifies the maximum delay in minutes for the start of the
CRON job after the set start time. The actual delay time is determined ran-
domly and lies between 0 and the time entered here.
D Default: 0
D Values: 0 to 65535 seconds.
D Particular values: With the variation set to zero the CRON job will be
executed at the set time.
BAT54-Rail/F..
494 Release 7.54 06/08
More services 12.8 PPPoE Servers
Note: Real-time based rules can only be executed if the device has a time
from a relevant source, e.g. via NTP.
12.8PPPoE Servers
12.8.1 Introduction
In accordance with the widespread availability of DSL, PPPoE clients have
now been widely integrated into all operating systems. These can be used to
"log on to the network" as well as to manage access rights to services such
as the Internet, e-mail or remote stations.
BAT54-Rail/F..
Release 7.54 06/08 495
More services 12.8 PPPoE Servers
To prevent users from bypassing the authentication, a DENY ALL rule is de-
fined in the firewall to stop local connections from being established.
The user 'Purchasing' is then entered into the PPP list (LANconfig Commu-
nication Protocols) without a user name but with a password which is to be
used by all staff members in the department, and authentication (encrypted)
is set up as CHAP. Both IP routing and NetBIOS (Windows Networking) are
to be activated for this PPP user:
BAT54-Rail/F..
496 Release 7.54 06/08
More services 12.8 PPPoE Servers
BAT54-Rail/F..
Release 7.54 06/08 497
More services 12.8 PPPoE Servers
12.8.3 Configuration
Configuration with LANconfig
The settings for the PPPoE server can be found in LANconfig in the configu-
ration area 'Communication' on the 'General' tab.
BAT54-Rail/F..
498 Release 7.54 06/08
More services 12.8 PPPoE Servers
D Operating: The 'Operating' button switches the server on or off. The de-
fault value is 'Off'.
D Service: The name of the service offered is entered under 'Service'. This
enables a PPPoE client to select a certain PPPoE server that is entered
for the client.
D Session limit: The 'Session limit' specifies how often a client can be
logged on simultaneously with the same MAC address. Once the limit has
been reached, the server no longer responds to the client queries that are
received. Default value is '1', maximum value '99'. A Session limit of '0'
stands for an unlimited number of sessions.
BAT54-Rail/F..
Release 7.54 06/08 499
More services 12.9 RADIUS
D Name list: Different parameters (such as shorthold time and MAC ad-
dress) can be assigned to users in the name list:
Note: A MAC address of '000000000000' means that the user may log on
with any MAC address. If a MAC address is entered, then the PPP nego-
tiation is terminated if the user logs on from a different MAC address. The
user's shorthold time is set after the logon. If no entry exists, then the time
belonging to user 'DEFAULT' is used.
In addition to this table, an entry has to be made in the PPP table in
which the password, the rights (IP, IPX,NetBIOS) and other PPP param-
eters (LCP polling) are entered. The user can therefore also be authenti-
cated using a RADIUS server.
12.9RADIUS
RADIUS stands for "Remote Authentication Dial-In User Service and is re-
ferred to as a "triple-A" protocol. The three "A"s stand for
D Authentication
D Authorization
D Accounting (billing)
This protocol allow you to grant users access to a network, to assign them
certain rights and to track their actions. Where necessary, the RADIUS serv-
er can also be used in the billing of user services such as WLAN hot spots.
For every action performed by the user, the RADIUS server can run an au-
thorization procedure releasing or blocking access to network resources on
a per user basis.
3 different devices are required for RADIUS to work.
D Client: This is a device (PC, notebook etc.) from which the user wishes to
dial in to the network.
D Authenticator: A network component positioned between network and cli-
ent and which forwards on the authorization. This task can be performed
by an BAT Access Point for example. The authenticator is referred to as
the Network Access Server (NAS).
RADIUS server
Client
Authenticator
BAT54-Rail/F..
500 Release 7.54 06/08
More services 12.9 RADIUS
Client
Authenticator
Client
Authenticator
RADIUS server
Client
Authenticator
BAT54-Rail/F..
Release 7.54 06/08 501
More services 12.9 RADIUS
User ID User ID
Accept Accept
User ID User ID
Challenge Challenge
BAT54-Rail/F..
502 Release 7.54 06/08
More services 12.9 RADIUS
U General settings
General settings apply to all RADIUS applications. Default values have been
selected such that they need not usually be changed.
BAT54-Rail/F..
Release 7.54 06/08 503
More services 12.9 RADIUS
U RADIUS accounting
Accounting for a logical WLAN network can be enabled from a RADIUS serv-
er by enabling the "RADIUS Accounting" option in the logical WLAN settings
for the network.
BAT54-Rail/F..
504 Release 7.54 06/08
More services 12.9 RADIUS
BAT54-Rail/F..
Release 7.54 06/08 505
More services 12.9 RADIUS
BAT54-Rail/F..
506 Release 7.54 06/08
More services 12.9 RADIUS
D CLIP password
Password for return call control.
Note: The generic values for retry and timeout must also be configured (see
Configuration of RADIUS as authenticator or NAS page 502). They
are under PPP on the same page as PPP parameters.
When using a RADIUS server for the authentication of WLAN clients, the RA-
DIUS server uses the MAC address to check client authorizations.
Note: To use the RADIUS functionality for WLAN clients, the option "Transfer
data from the listed stations, authenticate all others via RADIUS or filter
them out must be selected for the "Filter stations" parameter.
BAT54-Rail/F..
Release 7.54 06/08 507
More services 12.9 RADIUS
D Server IP address
Specify here the IP address of your RADIUS server from which users are
managed centrally.
D Server port [default: 1.812]
Specify here the port used for communication to your RADIUS server.
D Key (shared secret)
Specify here the key to be used for coding data. The key must also be
configured on the RADIUS server.
D Backup server IP address [default: 1.812]
Specify here the IP address of your backup RADIUS server from which
users are managed centrally.
D Backup server port
Specify here the port used for communication to your backup RADIUS
server.
D Backup key
Specify here the key to be used for coding data. The key must also be
configured on the backup RADIUS server.
Note: The generic values for retry and timeout must also be configured (see
Configuration of RADIUS as authenticator or NAS page 502).
WLAN clients can use the 802.1x protocol for network registration. The BAT
access point can use this protocol to forward the registration to the RADIUS
server. The MAC address is used for user identification.
Note: Please refer to EAP and 802.1x page 37 for further information on
the 802.1 x protocol.
BAT54-Rail/F..
508 Release 7.54 06/08
More services 12.9 RADIUS
D Name
In this table, each RADIUS server needs a unique name. The name
'DEFAULT' is reserved for all WLAN networks that use an authentication
process in line with IEEE 802.1x and that have not specified their own
RADIUS server.
By using the name defined in the 'Key 1/passphrase' field, each WLAN
network using authentication in line with IEEE 802.1x can be assigned its
own RADIUS server.
D Server IP address
Specify here the IP address of your RADIUS server from which users are
managed centrally.
D Server port
Specify here the port used for communication to your RADIUS server.
D Key (shared secret)
Specify here the key to be used for coding data. The key must also be
configured on the RADIUS server.
D Backup server
Name of the backup server from the list of RADIUS servers configured
so far.
Note: The generic values for retry and timeout must also be configured (see
Configuration of RADIUS as authenticator or NAS page 502).
WLAN clients must be entered as follows on the RADIUS server:
The user name is the MAC address in the format AABBCC-DDEEFF.
The password for all users is identical to the key (shared secret) for
the RADIUS server.
BAT54-Rail/F..
Release 7.54 06/08 509
More services 12.9 RADIUS
512 WLAN clients, all able to register with the BAT access point, may be en-
tered in the access list. When operating in RADIUS server mode, this list can
also be used to check on RADIUS clients wanting to register at other access
points. In an installation having several access points, client access authori-
zations can be maintained centrally.
BAT54-Rail/F..
510 Release 7.54 06/08
More services 12.10 Extensions to the RADIUS server
BAT54-Rail/F..
Release 7.54 06/08 511
More services 12.10 Extensions to the RADIUS server
D MS-CHAP: The NAS passes the user name, the MS-CHAP challenge and
the MS-CHAP password characteristics. The method continues in the
same way as CHAP, although the responses are computed with the MS-
CHAP algorithm (RFC 2433).
D MS-CHAPv2: The NAS passes the user name, the MS-CHAP challenge
and the MS-CHAPv2 response. The method continues in the same way
as CHAP and MS-CHAP, although the responses are computed with the
MS-CHAPv2 algorithm (RFC 2759). Furthermore the RADIUS server
transmits an MS-CHAPv2 confirmation once the authentication was suc-
cessful. This confirmation contains the server's response to the client's
challenge, so enabling a mutual authentication.
D EAP: The NAS passes the user name and an EAP message. Unlike the
methods outlined above, EAP is not stateless, i.e. in addition to sending
an access accept or access reject, the RADIUS server issues its own
challenge before authentication is completed. EAP itself is a modular au-
thentication protocol that accommodates various methods of authentica-
tion.
12.10.2EAP authentication
EAP is not a specific authentication mechanism, it is more like a framework
for various authentication methods. The LCOS RADIUS server supports a
range of EAP methods:
D EAP/MD5, defined in RFC 2284. EAP/MD5 is a simple challenge/re-
sponse protocol. It does not cater for mutual authentication nor does it of-
fer a dynamic key such as those required for 802.1x authentication in
wireless networks (WLANs). Thus it is only used for the authentication of
non-wireless clients or as a tunneled method as a part of TTLS.
D EAP/MSCHAPv2, defined in draft-kamath-pppext-eap-mschapv2-01.txt.
As opposed to EAD/MD5, EAP/MSCHAPv2 does supports mutual au-
thentication but does not support dynamic keys, making it just as prone to
dictionary attacks as EAP/MD5. This method is usually used within PEAP
tunnels.
D EAP/TLS, defined in RFC2716. The use of EAP/TLS requires the use of
a root certificate, a device certificate and a private key in the device. EAP/
TLS provides outstanding security and the dynamic keys necessary for
wireless connections; its implementation is complex, however, because
each individual client requires a certificate and a private key.
Note: Please note that the TLS implementation in LCOS does not support
certificate chains or certificate revocation lists (CRLs).
BAT54-Rail/F..
512 Release 7.54 06/08
More services 12.10 Extensions to the RADIUS server
12.10.3RADIUS forwarding
In the case of multi-layer EAP protocols such as TTLS or PEAP, the actual
"internal" authentication can be carried out by a separate RADIUS server.
Thus an existing RADIUS server can continue to be operated to provide user
tables, even though it is not EAP(/TLS) capable itself. In this situation the
TLS/TTLS/PEAP tunnel is managed from the LCOS RADIUS server.
The configuration of multi-layer protocols of this type is an element of a gen-
eral method for the forwarding of RADIUS requests, whereby a LCOS RADI-
US server can also be used as a RADIUS proxy. The concept of "realms" is
the basis for request forwarding and the proxy function. A realm is a charac-
ter string which defines the validity of a range of user accounts. Once de-
fined, the realm is a suffix to the user name separated by an @ character as
follows:
user@realm
The realm can be seen as a pointer to the RADIUS server where the user
account is managed. The realm is removed from the string prior to the search
of the RADIUS server's user table. Realms allow entire networks which are
mutually trustworthy to work with common RADIUS servers located in part-
ner networks, and to authenticate users who move between these networks.
BAT54-Rail/F..
Release 7.54 06/08 513
More services 12.10 Extensions to the RADIUS server
The LCOS RADIUS server stores any connected RADIUS servers along with
their associated realms in a forwarding table. The realm is searched for in this
table in connection with the communicated user name. If no entry is found,
the request is answered with an access reject. An empty realm is treated as
a local request, i.e. the LCOS RADIUS server searches its own user tables
and generates its response accordingly.
To support the processing of realms the LCOS RADIUS server uses two spe-
cial realms:
D Default realm: This realm is used where a realm is communicated for
which no specific forwarding server has been defined. Importantly, a cor-
responding entry for the default realm itself must be present in the for-
warding table.
D Empty realm: This realm is used when no realm is communicated, but the
user name only.
In the default state the forwarding table has no entries, i.e. the default and
empty realms are empty. This means that all requests are treated as local re-
quests and any realms which are communicated are ignored. To operate the
LCOS RADIUS server purely as a forwarding server or RADIUS proxy, the
default and empty realms must be set to a value that corresponds with a serv-
er defined in the forwarding table.
Please note that the forwarding of RADIUS requests does not alter the user
name. No realm is added, changed or removed. The next server may not be
the last one in the forwarding chain, and the realm information may be re-
quired by that server to ensure that forwarding is carried out correctly. Only
the active RADIUS server which processes the request resolves the realm
from the user name, and only then is a search made of the table containing
the user accounts. Accordingly the LCOS RADIUS server resolves the realm
from the user name for processing requests locally.
The processing of tunneled EAP requests using TTLS and PEAP makes use
of a special EAP tunnel server, which is also in the form of a realm. Here you
select a realm that will not conflict with other realms. If no EAP tunnel server
is defined then the LCOS RADIUS server forwards the request to itself,
meaning that both the internal and the external EAP authentications are han-
dled by the LCOS RADIUS server itself.
BAT54-Rail/F..
514 Release 7.54 06/08
More services 12.10 Extensions to the RADIUS server
U RADIUS clients
The client table can contain up to 16 clients that can communicate with the
RADIUS server.
D IP address
Enter the IP address of the client that may communicate with the
RADIUS server in the BAT access point.
D Secret
Password required by the client for access to the RADIUS server in the
BAT access point.
Note: In addition to the configuration of the RADIUS server, the user infor-
mation source must also be defined .
BAT54-Rail/F..
Release 7.54 06/08 515
More services 12.10 Extensions to the RADIUS server
U RADIUS user
Up to 64 users can be entered into the user table, and these can be authen-
ticated by the RADIUS server without reference to other databases. This
user table is used for local requests to the RADIUS server, i.e. for requests
with user name but no realm.
D User name
User name.
D Password
User password.
D Limit auth. methods
This option allows you to place limitations on the authentication methods
permitted for the user.
D Values: PAP, CHAP, MSCHAP, MSCHAPv2, EAP, All
D Default: All
U Forwarding server
BAT54-Rail/F..
516 Release 7.54 06/08
More services 12.11 RADSEC
12.11RADSEC
RADIUS has become established as the standard for server-based authen-
tication, authorization and billing. RADIUS is now being used for applications
outside of its original design purpose, for example in combination with EAP/
802.1x, and a number of deficits have become apparent:
D RADIUS operates via UDP and thus offers no native procedure for pack-
et-loss detection. Although this is no problem in a LAN environment, it is
becoming increasingly important over WAN connections or on the Inter-
net.
D RADIUS is equipped only with simple procedures for authentication by
means of a "shared secret" and a low level of confidentiality.
RADSEC is an alternative protocol that transmits RADIUS packets through a
TLS-encrypted tunnel. TLS is based on TCP, thus providing a proven mech-
anism for monitoring packet loss. Furthermore, TLS is highly secure and it
features a method of mutual authentication by means of X.509 certificates.
BAT54-Rail/F..
Release 7.54 06/08 517
More services 12.11 RADSEC
If a BAT operates as a RADIUS server, the RADSEC port for receiving logins
can be set up. In addition to that, the protocol to be used (RADIUS, RADSEC
or all) can be set for each of the RADIUS clients in the client list. This allows,
for example, RADIUS to be used for LAN-based clients and the more robust
RADSEC via TCP to be used for registrations arriving over the Internet.
BAT54-Rail/F..
518 Release 7.54 06/08
Appendix 13.1 Error messages in LANmonitor
13 Appendix
13.1Error messages in
LANmonitor
It is possible to read out VPN error messages over the LANmonitor.
BAT54-Rail/F..
Release 7.54 06/08 519
Appendix 13.1 Error messages in LANmonitor
BAT54-Rail/F..
520 Release 7.54 06/08
Appendix 13.1 Error messages in LANmonitor
BAT54-Rail/F..
Release 7.54 06/08 521
Appendix 13.1 Error messages in LANmonitor
BAT54-Rail/F..
522 Release 7.54 06/08
Appendix 13.2 SNMP Traps
13.2SNMP Traps
MIB2 Traps Explanation
coldstart Device was restarted by switching power off and on.
warmstart LCOS was restarted, for instance by a software reboot
authentication failed Login failed during access to the configuration
(= console login failed)
BAT54-Rail/F..
Release 7.54 06/08 523
Appendix 13.3 Radio channels
13.3Radio channels
BAT54-Rail/F..
524 Release 7.54 06/08
Appendix 13.3 Radio channels
D Band 1: 5150 - 5350 MHz (channels 36, 40, 44, 48, 52, 56, 60 and 64)
D Band 2: 5470 - 5725 MHz (channels 100, 104, 108, 112, 116, 120, 124,
128, 132, 136 and 140)
D Band 3: 5725 - 5875 MHz (channels 147, 151, 155, 167)
Note: Please note that frequency ranges an radio channels in band 3 are re-
served for operation in UK only!
The following overview shows which channels are allowed in different re-
gions.
BAT54-Rail/F..
Release 7.54 06/08 525
Appendix 13.3 Radio channels
Further details to the restrictions for the use of wlan adapters within the EU
can be found in the internet:
BAT54-Rail/F..
526 Release 7.54 06/08
Appendix 13.3 Radio channels
Note: Please inform yourself about the current radio regulations of the coun-
try you want to operate a Wireless LAN device.
BAT54-Rail/F..
Release 7.54 06/08 527
Appendix 13.4 RFCs supported
13.4RFCs supported
RFC Title
1058 Routing Information Protocol
1331 The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-
to-Point Links
1334 PPP Authentication Protocols
1389 RIP Version 2 MIB Extensions
1483 Multiprotocol Encapsulation over ATM Adaptation Layer 5
1542 Clarifications and Extensions for the Bootstrap Protocol
1552 The PPP Internetworking Packet Exchange Control Protocol (IPXCP)
1577 Classical IP and ARP over ATM
1631 The IP Network Address Translator (NAT)
1877 PPP Internet Protocol Control Protocol Extensions for Name Server Addresses
1974 PPP Stack LZS Compression Protocol
2284 Extensible Authentication Protocol
2104 HMAC: Keyed-Hashing for Message Authentication
2131 Dynamic Host Configuration Protocol
2132 DHCP Options and BOOTP Vendor Extensions
2225 Classical IP and ARP over ATM
2364 PPP Over AAL5
2401 Security Architecture for the Internet Protocol
2402 IP Authentication Header
2403 The Use of HMAC-MD5-96 within ESP and AH
2404 The Use of HMAC-SHA-1-96 within ESP and AH
2405 The ESP DES-CBC Cipher Algorithm With Explicit IV
2406 IP Encapsulating Security Payload (ESP)
2407 The Internet IP Security Domain of Interpretation for ISAKMP
2408 Internet Security Association and Key Management Protocol (ISAKMP)
2409 The Internet Key Exchange (IKE)
2410 The NULL Encryption Algorithm and Its Use With IPsec
2412 The OAKLEY Key Determination Protocol
2451 The ESP CBC-Mode Cipher Algorithms
2516 A Method for Transmitting PPP Over Ethernet (PPPoE)
2684 Multiprotocol Encapsulation over ATM Adaptation Layer 5
3280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Pro-
file
BAT54-Rail/F..
528 Release 7.54 06/08
Appendix 13.5 Glossary
13.5Glossary
802.11 Wireless LAN specification of the IEEE; data rate up to 2 Mbps; in 2.4 GHz ISM band;
FHSS and DSSS; infrared spectrum communications also planned
802.11a Extension to 802.11; data rate up to 54 Mbit/s; in 5 GHz band; OFDM
802.11b Extension to 802.11; data rate up to 11 Mbit/s; in 2.4 GHz band; high market penetration;
DSSS/CCK
802.11g Extension to 802.11; data rate up to 54 Mbit/s; in 2.4 GHz band; OFDM and DSSS
802.11h 802.11a customization, data rate up to 54 Mbit/s; in 5 GHz band; in area of transmission
power and frequency management; for use in Europe; OFDM
802.11i Future 802.11 extension with additional security features
802.1x Specification of a port-based authentication mechanism from the IEEE
AES Advanced Encryption Standard
Access point Base station in a wireless LAN; independent LAN-WLAN bridge; connects stations of a
LAN (local network) with a WLAN (wireless network) in a point-to-multipoint mode; con-
nects two networks over a wireless network in point-to-point mode
Access router Active network component for connection of a local network to the Internet or a company
network
ADSL Asymmetrical Digital Subscriber Line - transmission process for high-speed data trans-
mission over normal telephone lines. With ADSL, transmissions (downstream) of up to 6
Mbps can be implemented over normal telephone lines; for bidirectional transmission
there is a second frequency band with transmission speeds of up to 640 kbps (upstream)
- hence the name "asymmetric".
Bandwidth Data rate with which a user can surf the Internet; the higher the bandwidth, the faster the
connection
Broadband Service which provides high bandwidth; e.g.: DSL or WLAN
Bridge Transport protocol-independent, transparent network component; transmits all packets
which are identified as "not local" and only understands the difference between "local"
and "remote". Works on Layer 2 of the OSI model
Broadcast Broadcasts are packets to all stations of a local network; bridges transmit broadcasts;
routers do not transmit broadcasts
BSS Basic Service Set
CAPI Common ISDN Application Programming Interface - CAPI is a standard for control of
ISDN adapters
CCK Code Complementary Keying; type of modulation used by DSSS
Client Any computer equipped with a wireless LAN adapter (wireless LAN card), which uses
services provided by other participants in the wireless network
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance; access procedure to the radio
channel used under 802.11
CRC Cyclic Redundancy Check; process for detecting bit errors
Data throughput Speed at which you can surf on the Internet; depends on the bandwidth and the number
of users
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Service - computers communicate with computers in remote networks
using IP addresses; DNS servers translate names into IP addresses; without DNS serv-
ers, you would have to remember all IP addresses and couldn't work with names (e.g.
www.hirschmann.com)
BAT54-Rail/F..
Release 7.54 06/08 529
Appendix 13.5 Glossary
BAT54-Rail/F..
530 Release 7.54 06/08
Appendix 13.5 Glossary
BAT54-Rail/F..
Release 7.54 06/08 531
Appendix 13.5 Glossary
SDSL Single Line Digital Subscriber Line - downstream and upstream with 2.048 Mbit/s (two-
strand wire)
Server Computer which provides services over the network (e.g. files, news, email, WWW
pages)
SINA Secure Inter-Network Architecture
SMTP Simple Mail Transfer Protocol - SMTP protocol is the Internet standard for distribution of
electronic mail; the protocol is based on the TCP protocol
SNMPv3 Simple Network Management Protocol Version 3
SSID Service Set Identity; network name" of the wireless LAN
SSL Secure Socket Layer
Splitter The splitter is comparable with an audio frequency filter; in an ADSL connection, the split-
ter separates the ISDN signals from the DSL signals; the ISDN signals go to the NTBA
and the DSL signals go to the DSL modem
Switch A central distributor in a star-shaped network; each station has the entire bandwidth
available; if a station fails, the rest of the network is not affected; is used for collision pre-
vention; increases the overall throughput of the network; switches are cascadable
TAE Telephone connection unit used in Germany. Plug for the connection of analog devices
like a telephone or modem into the telephone network.
TCP/IP Transmission Control Protocol/Internet Protocol; family of protocols (ARP, ICMP, IP, UDP,
TCP, HTTP, FTP, TFTP) used mainly in the Internet, although it is making headway in
intranets as well
TKIP Temporal Key Integrity
TLS Transport Layer Security
TPC Transmission Power Control
Upload/ Upload / upstream denotes the direction of dataflow in a WAN; upstream is the direction
Upstream from the node connected to the network to the head end/Internet
Chaining Concatenation of bit sequences
VPN Virtual Private Network - a VPN is a network consisting of virtual connections over which
non-public or company internal data can be transmitted securely, even if public network
infrastructures are used
WAN Wide Area Network - network connection over long distances (e.g. over ISDN with a BAT
router)
WECA Wireless Ethernet Compatibility Alliance; alliance of manufacturers of wireless LAN com-
ponents based on IEEE 802.11; renamed the WiFi Alliance
WEBconfig Web-based configuration interface for BAT devices.
WEP Wired Equivalent Privacy
WiFi Wireless Fidelity; marketing concept generated by the WECA
WiFi-Alliance Alliance of manufacturers of wireless LAN components based on IEEE 802.11; formerly
the WECA
WLAN Wireless Local Area Network - local radio network
WPA WiFi Protected Access; name for security mechanisms beyond IEEE 802.11; generated
by the WiFi Alliance
WISP Wireless Internet Service Provider
xDSL xDSL stands for the family of Digital Subscriber Line technologies
XOR Logical operation "exclusive OR"
BAT54-Rail/F..
532 Release 7.54 06/08
Index
14 Index
Numerics
1:1 mapping 429
802.11i 33
PMK caching 43
VoIP 43
802.11x
Rekeying 39
A
AAL-5 369
Access Control List 54
Access point 529
Access points 215
Access protection
via TCP/IP 240
Access router 529
Address administration
IP address administration 465
Address pool 467
Administrators access 151
ADSL 226, 529
AES 34, 529
AES-CCM 42
Antenna gain 69
Antenna power 111
AT commands 449
ATM 226
ATM adaptation layer 369
Authentication 33, 37, 438, 442
Authentication process
TLS 39
TTLS 39
Authentication with EAP/802.1X in client mode 75
Auto reconnect 440
B
Background scanning 49
Bandwidth 529
BAT54-Rail/F..
Release 7.54 06/08 533
Index
Blowfish 34
Bonk 307
Bridge 529
Broadband 529
Broadcast 529
Brute force 239
BSS 529
C
Callback
according to RFC 1570 443
for Microsoft CBCP 441
Callback procedure
fast callback 442
Capability 473
CAPI 529
CCK 529
Chaining 532
Client 529
Client mode 31, 71, 93, 95
Collision domain 335
Command line interface 134
Command line reference 134
Computer names 473
Configuration 439
procedure 125
SNMP 138
Configuration files 142
Configuration interface 125
configuration updates 181
CRC 529
CRON
service 491
CSMA/CA 529
D
D channel 226
Data throughput 529
Denial of Service Attacks
Bonk 307
Fragrouter 307
LAND 305
BAT54-Rail/F..
534 Release 7.54 06/08
Index
BAT54-Rail/F..
Release 7.54 06/08 535
Index
rate 318
DS 530
DSCP 313
DSL 530
DSSS 23, 530
Dynamic DNS 479, 530
Dynamic Host Configuration
Protocol (DHCP) 465
Dynamic routing 355
E
EAP 37, 530
Process of a session secured by EAP 37
RADIUS server 38
EAP/802.1x 39, 517
Master Secret 39
EAP-MD5 530
EAP-TLS 530
EAP-TTLS 530
EIRP 530
E-mail virus 283
Encapsulation 368
Encryption 34
asymmetric 34
symmetric 34
Encryption methods
AES-CCM 42
End address 467
Enterprise specific Traps 523
ESS 530
ESSID 530
ETH-10 369
Ethernet 530
Exclusion routes 357
Exposed host 378
Extensible Authentication Protocol 37, 83
F
Fail 439
FHSS 530
Firewall 28, 291, 530
FirmSafe 143
BAT54-Rail/F..
536 Release 7.54 06/08
Index
Firmware 137
Firmware updates 173
Firmware-upload 145
with LANconfig 145
with terminal program 146
with TFTP 147
with WEBconfig 146
Flash No mode 183
Flash ROM memory 143
Flash Yes mode 183
Flat rate 440
Fragrouter 307
Frame tagging 336
Frequency 530
Frequency band 530
Fresnel zone 110
FTP 530
active FTP 325
data transfer 318
download 312
passive FTP 325
TCP-secured transfer 319
G
Gateway 465, 530
GPRS backup connection 448
Gross data rate 317
Group configuration 196
H
HDLC 369
Hidden station 81
Host 473
Host name table 476
HotSpot 530
HTTPS 131
Hub 530
I
IAPP roaming 530
IBBS 72
IBSS 530
BAT54-Rail/F..
Release 7.54 06/08 537
Index
ICMP 284
ICMP polling 160
IDS 530
IEEE 530
IEEE 802.11 529
IEEE 802.11a 22
IEEE 802.11b 22
IEEE 802.11e 333
IEEE 802.11g 23
IEEE 802.11i 101
IEEE 802.1p 347
IEEE 802.1p/q 335
IEEE 802.1x/EAP 83
IEEE 802.3 369
Inband 125, 126
Configuration via Inband 126
with Telnet 133
Indoor function 76
Install software 143
Internet 369
Internet access 437
Intranet
IP address assignment 468
Intrusion Detection 302
IP-Spoofing 302
Inverse masquerading 372, 425
IP 530
IP address 211, 425, 437
IP broadcast 364
IP header 312
IP masquerading 28, 226, 369, 425, 530
simple masquerading 372
IP multicast 364
IP Quality of Service 531
IP routing
standard router 361
IP routing table 355
IP Spoofing 302
IP telephony 318
IPSec 33, 530
IPSec over WLAN 84
BAT54-Rail/F..
538 Release 7.54 06/08
Index
ISDN 531
ISM frequency band 531
ISP 531
K
Keep-Alive 440
L
LAN 531
Different organisations on one LAN 339
logical 337
physical 336
LANcapi 531
LANconfig 126, 128, 145, 166, 531
Columns for display 172
Download script 185
Management of multiple devices 130
LAND 305
LANmonitor 205, 208
Accounting information 206
Activity log 207
Display options 209
Firewall actions log 207
Monitor Internet connection 210
System information 209
Traces 212
VPN connections 206
LANtools 531
Layer-2 369
Layer-2-switch 335
Layer-3 368
LCOS 16, 531
LCP echo
reply 436
request 436
LLC-MUX 368
Logging table 295
Logical LAN 337
Logical sending direction 324
Logical wireless networks 52
Login 143, 239
Login barring 239
BAT54-Rail/F..
Release 7.54 06/08 539
Index
BAT54-Rail/F..
540 Release 7.54 06/08
Index
BAT54-Rail/F..
Release 7.54 06/08 541
Index
BAT54-Rail/F..
542 Release 7.54 06/08
Index
BAT54-Rail/F..
Release 7.54 06/08 543
Index
SNMPv3 532
Splitter 532
SSH access 139
SSH authentication 140
SSID 215, 532
SSL 532
Start address 467
Stateful Inspection 28
Static routing 355
Switch 532
SYN Flooding 304
SYN/ACK speedup 365
SYSLOG 229, 484
T
TAE 532
TCP 311
TCP control packets 315
TCP Stealth mode 267
TCP/IP 355, 532
TCP/IP networks 473
TCP-Stealth-Modus 267
Teardrop 306
Telnet
Ausgabe der SNMP-ID 135
Temporal Key Integrity Protocol 40
Term 439
Terminal program 145
TFTP 137
Time 439
Time server 486
TKIP 532
TLS 517, 532
ToS 312, 313
High Reliability 312
IPSec 312
Low Delay 312, 315
Priority 313
TPC 532
Trace
examples 228
BAT54-Rail/F..
544 Release 7.54 06/08
Index
BAT54-Rail/F..
Release 7.54 06/08 545
Index
BAT54-Rail/F..
546 Release 7.54 06/08
Index
Ad-hoc 26
operation modes 25
Wireless bridge 29
Wireless LANs
Infrastructure network 26
Wireless Multimedia Extension 333
WISP 532
WLAN 532
Access point density 70
ACL 54
ad-hoc mode 26
ARP handling 63
Authentication with EAP/802.1X in client mode 75
Background scanning 49
Bands scanned 95
bridge mode 26
Broken link detection 63
Channel number 66
Client mode 95
client mode 26, 71
Client-Bridge-Untersttzung 73
Closed network mode 79
Compatibility mode 68
Country setting 62
DFS method 66
Frequency band 66
IBBS 72
Indoor function 76
infrastructure network 26
IPSec over WLAN 84
Keep client connection alive 72
Maximum distance 70
Multi-SSID 26
Network settings 79
Network types 72
Operation mode 65
Point-to-point connections 70
Point-to-Point mode 26
Protocol filter 55
Protocol filters 87
Radio settings 66
BAT54-Rail/F..
Release 7.54 06/08 547
Index
Redirect 82, 91
Roaming 49
Rogue AP detection 49, 217
Rogue client detection 217
Scan bands 72
Signal-quality display via LEDs 77
Subband 66
Transmission power reduction 69
Turbo mode 69
WEP group keys 60
WLAN interface
logical 78
physical 64
WLAN security 33
802.11i 42
802.1x 37
AES 42
EAP 37
Sniffer tools 36
TKIP 40
WEP 35
WEPplus 37
WPA 40
WLANmonitor 214
Rogue client detection 217
WPA 33, 40, 532
Group Key 41
Handshake procedure 40
Key handshake 41
Master Secret 40
Michael 40
Pairwise Key 41
Passphrase 41
Rekeying 41
TKIP 40
X
X.509 certificate 517
xDSL 532
XOR 532
BAT54-Rail/F..
548 Release 7.54 06/08