How to Use This Manual xxvii Top Doc TOC How to Use This Manual The BANDIT Products Software Configuration and Maintenance Guide provides information on the configuration, functionality, and capabilities of the BANDIT products. The manual includes instructions for installing, operating, configuring, maintaining, and troubleshooting the BANDIT products. Its companion documents are the BANDIT Products Hardware Reference Guide, the BANDIT Products Wireless Access Guide, and the following installation guides: • BANDIT, BANDIT IP, and BANDIT Plus Installation Guide • IBR-10, BANDIT Mini, and ILR-100 Installation Guide • VSR-30 Installation Guide • RDU Installation Guide For information about the BANDIT II, the BANDIT III, or the VSR-1200, see the BANDIT II™, BANDIT III™, and VSR-1200™ Document Set. Note: Screens shown in this guide are examples; each screen for your device may vary slightly from the example shown. The options available for each screen and menu depend on the following: • The hardware features on your device’s chassis model • The version of ELIOS™ software installed on the device The BANDIT Products Software Configuration and Maintenance Guide is organized as follows: Chapter 1: Technical Overview This chapter provides an overview of the products and discusses their features. Chapter 2: Hardware Installation This chapter discusses installation of the chassis in your network. Chapter 3: Software Configuration This chapter discusses configuration and special software–hardware implementations. This chapter also provides an overview of the BANDIT’s Virtual Broadband Redundancy System (VBRS). BANDIT Products Software Configuration and Maintenance Guide xxviii How to Use This Manual Top Doc TOC Chapter 4: Port Configuration This chapter discusses configuration of the device’s ports. Chapter 5: Protocol Configuration This chapter discusses configuration of the protocols and software interfaces available for the products. Chapter 6: IP Routing and IPX Routing This chapter discusses IP routing and related considerations: IP policy, IP quality of service (including differentiated services), firewall, and Network Address Translation. This chapter also discusses configuration of IPX routing. Chapter 7: Routing with Frame Relay, X.25, and SNA This chapter discusses Frame Relay, X.25, and SNA routing and related considerations. Chapter 8: Virtual Private Networks This chapter discusses use of the BANDIT devices in virtual private networks. It also discusses Selection Layer Encryption™, Encore Networks’ proprietary solution for maintaining both security of VPNs and performance of transmissions over satellite networks. Chapter 9: BANDIT Statistics This chapter discusses the use of statistics to monitor a device’s performance. Chapter 10: System Management This chapter provides instructions for using the BANDIT menus to operate and control the device after it has been installed and configured for the network. Chapter 11: SNMP and Port Data Capture This chapter discusses SNMP management of the device. It also provides instructions for using the BANDIT products’ feature Port Data Capture. Chapter 12: System Upgrade This chapter provides instructions for updating the product’s hardware and software. Appendix A: Site Planning Worksheets This appendix provides worksheets to help with the installation of the device in your network. BANDIT Products Software Configuration and Maintenance Guide Conventions xxix Top Doc TOC Appendix B: VPNC Scenario for IPsec Interoperability This appendix provides the VPN product’s configuration for scenario 1 of the VPN Consortium’s standard scenarios. Appendix C: Scenarios for Operation with a VPN Client This appendix provides the VPN product’s configuration as a VPN gateway operating with a VPN client at a remote location. Appendix D: Default Passwords This appendix provides the default passwords for your BANDIT device. Conventions The following table shows the formats used in this manual. The conventions in font and phrase allow instructions to be concise. Convention Description Procedure Heading How to (Name of Procedure Heading) Procedure Result This is the result of an action. Table Heading Table 2-1. Table 1 in Chapter 2 Figure Heading Figure 2-1. Figure 1 in Chapter 2 Note Note: Text set in this manner presents important information. Caution Warning ! Caution: Text set in this manner indicates situations in which minor damage can occur to equipment or data. Warning: Text set in this manner indicates situations in which the equipment operator can suffer bodily harm or in which serious damage can occur to equipment or data. BANDIT Products Software Configuration and Maintenance Guide xxx Top Doc Conventions TOC Convention Description Bold Words in bold type indicate fields or values. Italics Words in italics indicate variables or titles. Bold Italics Words in bold italics represent system messages. Non-Proportional Roman Words in a non-proportional roman font indicate directory names, file names, or commands. Non-Proportional Bold Words in a non-proportional bold font indicate entries you type at a system prompt. BANDIT Products Software Configuration and Maintenance Guide
© Copyright 2024