Dcbnet EtherSeries FT Manuel utilisateur

FT-S erie s
E n c rypted Eth ern et
Tunn el
User’s Guide
Revised November 6,2016
Firmware Version 2.x

FCC Statement
This device complies with the limits for a lass A digital device, pursuant to Part 15 of the F rules.
This equipment has been tested and found to comply with the limits for a lass A digital device pursuant to
Part 15 of the F Rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This equipment generates, uses,
and can radiate radio frequency energy and if not installed and used in accordance with the instruction
manual may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case the
user will be required to correct the interference at the user's own expense.
opyright 2009..2016 All rights reserved.
All trademarks and trade names are the properties of their respective owners.
RoHS
Some models of this product is available in RoHS versions.

TABLE OF CONTENTS
F Statement.........................................................i
RoHS.......................................................................i
Chapter 1
Introduction................................................................6
EtherSeries FT-6602 Applications.................................6
Other Features................................................................6
Protocols....................................................................6
DH P Protocol..........................................................7
Extensive Filtering.....................................................7
802.1q VLAN............................................................7
Upgradeable Firmware..............................................7
Security and Firewall Features...................................7
On-board Tools..........................................................7
Single-Interface operation..........................................7
Package ontents............................................................7
Software Requirements............................................7
FT-6602 Hardware.........................................................8
Introduction.............................................................8
onfiguration Options.............................................8
FT-6602 Front Panel................................................8
Rear Panel LED Indicators .....................................8
Rear Panel USB onnectors....................................8
Rear Panel RS-232 onnector................................8
Rear Panel Ethernet onnectors..............................9
Rear Panel USB onnectors....................................9
FT-6630 Specific – Two High Performance Ports.........9
Introduction.............................................................9
onfiguration Differences.......................................9
FT-6630 Front Panel................................................9
FT-6630 Front Panel LED Indicators.....................9
Chapter 2
Installation..................................................................11
Overview..................................................................11
Quick Start...............................................................11
Help Screens and Field Edits...................................11
Installation and onfiguration.......................................11
1. onfigure the Bridge’s IP address........................11
2. onnect the Ethernet able...................................13
3.Verify the IP Address onfiguration.....................13
4. Enter Your onfiguration ...................................14
5. Minimum onfiguration......................................14
i

Chapter 3
The Con iguration Process........................................15
Overview........................................................................15
Using the onfiguration Flexibility................................15
onfiguration Process Examples ...................................16
hange, test then save ............................................16
hange, save, then reset...........................................16
Restore with a saved configuration..........................16
Note regarding saved configurations........................16
Chapter 4
Con iguration..............................................................17
Overview........................................................................17
Administration................................................................17
Admin Password.............................................................18
Fields.......................................................................18
Notes........................................................................18
Admin Access ontrol....................................................19
Fields.......................................................................19
Notes........................................................................20
Set lock........................................................................21
Fields.......................................................................21
Notes........................................................................21
reate Web ertificates..................................................22
Fields.......................................................................24
Notes........................................................................24
Install ertificates...........................................................25
Fields.......................................................................26
Notes........................................................................26
Set lock........................................................................27
Fields.......................................................................27
Notes........................................................................27
Set All Defaults..............................................................28
onfiguration File..........................................................28
Fields.......................................................................29
Notes........................................................................29
Firmware Upgrade..........................................................30
Fields.......................................................................30
Notes........................................................................30
System Reboot................................................................31
Fields.......................................................................31
Notes........................................................................31
Version Information Screen............................................32
LAN 1 Ethernet Mode....................................................32
Fields.......................................................................33
Notes: ......................................................................33
ii

Introduction
Ethernet IP onfiguration..............................................33
Fields.......................................................................34
Notes: ......................................................................34
DH P Server onfiguration...........................................35
Fields.......................................................................35
Notes: ......................................................................35
Ethernet PPPoE onfiguration ......................................36
Fields.......................................................................36
Tunnel Mode..................................................................38
Fields.......................................................................38
Encrypted Tunnel onfiguration....................................39
Fields.......................................................................39
Server Mode Enabled:.......................................39
lient Mode Enabled: .......................................39
On Failure: (Optional).......................................39
Notes........................................................................40
Generate ertificate Authority Key................................41
Fields.......................................................................41
Notes........................................................................42
Generate Local Key........................................................43
Fields.......................................................................43
Notes........................................................................44
Advanced Tunnel onfiguration....................................44
Fields.......................................................................44
Notes........................................................................45
Ethernet (MA ) Address Filters Screen........................45
Fields.......................................................................46
Notes........................................................................46
IP Address Filters Screen...............................................46
Fields.......................................................................47
Notes........................................................................47
UDP Address Filters Screen...........................................48
Fields.......................................................................48
Notes........................................................................49
T P Address Filters Screen...........................................49
Fields.......................................................................49
Notes........................................................................50
Additional lient Settings..............................................50
Fields.......................................................................50
Notes........................................................................51
Ping Screen....................................................................51
Fields.......................................................................51
Notes........................................................................51
Traceroute Screen..........................................................52
Fields.......................................................................52
Notes........................................................................52
iii

Packet Sniffer Screen.....................................................53
Fields.......................................................................54
Notes........................................................................54
Interface Status Screen..................................................55
Routing Table Screen....................................................55
Store onfiguration Screen...........................................56
Activate onfiguration Screen......................................56
Tunnel Log Screen........................................................57
Tunnel Nodes Screen.....................................................58
Tunnel Addresses Screen..............................................58
DH P Status Screen.......................................................59
PPPoE Log.....................................................................60
Chapter 5
Quick-Start Guide......................................................61
Overview .......................................................................61
Step 1: Setting Initial LAN1 IP address..................61
Step 2: Accessing the Web Interface.......................62
Step 3: onfigure LAN1..........................................63
Step 4: Activate hanges.........................................63
Step 5: Store onfiguration.....................................63
Step 6: onfigure LAN2..........................................63
Step 7: onfigure LAN3..........................................64
Step 8: Tunnel – Generate A Key.........................64
Step 9: Tunnel – Generate Local Key......................64
Step 10: Tunnel – Mode..........................................65
Step 11: Tunnel – onfiguration (Server)...............65
Step 12: Tunnel – onfiguration ( lient)................65
Step 13: Activate & Store hanges.........................65
Chapter 6
Troubleshooting..........................................................67
Hardware Problems........................................................67
an't onnect via the LAN.............................................67
Other Problems...............................................................68
hecking Bridge Operation............................................68
Appendix A
Speci ications..............................................................69
FT-6602 Bridge Specifications................................69
FT-6630 Bridge Specifications................................69
RS-232 PIN Assignments – Management Port.............71
ontrol Signal Operation................................................71
D D..........................................................................71
Receive Data..............................................................71
iv

Introduction
Transmit Data............................................................71
DTR...........................................................................71
Signal Ground............................................................71
DSR...........................................................................71
RTS...........................................................................71
TS...........................................................................72
Ring Indicator............................................................72
ables.............................................................................72
To P 9-pin OM: port.....................................72
Bridge to hub or ethernet switch........................72
Appendix B
Open Source So tware In ormation..........................73
Introduction.............................................................73
Obtaining the Source ode......................................73
Appendix C
802.1Q VLAN Tagging ..............................................74
Introduction.............................................................74
VLAN onfiguration Differences...........................74
v

Chapter 1
Introduction
This chapter provides an overview of the EtherSeries FT Ethernet Tunnel Bridge’s
features and capabilities.
ongratulations on the purchase of your new EtherSeries FT Encrypted Ethernet Bridge. This is a
simple, easily configured tunneling device containing up to three Ethernet interfaces.
Two or more bridges connect using standard T P/IP using any insecure IP connection path. They tunnel
all Ethernet packets from the secure interface of each device to the other devices using a FIPS certified
encryption module and AES encryption.
The bridge transports all valid Ethernet protocols. It provides a virtual private network by bridging the
LANs with an IP tunnel that may be encrypted using the AES algorithm. Filtering is available based upon
IP or MA addresses and Protocol types. 802.1Q VLAN tagging is supported.
When used in its simplest mode, two bridges might “extend” a secure LAN segment to another physical
location via an insecure path. They may be used behind firewalls and NAT routers.
The FT includes the ability to create self-signed certificates. The certificate authority is stored on a USB
dongle, that allows the certificates to be shared between FT devices as well as web browsers used for
configuration. The FT series uses a FIPS certified encryption module.
EtherSeries FT Applications
The FT connects multiple LAN segments by using standard IP protocols between the bridges. It is
commonly used to connect a remote LAN to a central LAN. In this application, the bridges connect via any
valid T P/IP path, negotiate an encrypted link, and then bridge all non-filtered traffic between the two
LANs.
The encrypted ethernet bridge is also used to connect a single location to multiple remote sites. In this
application, remote sites may be “daisy-chained” to allow multiple locations to communicate via insecure
links.
In some applications, the FT is used to provide a path for multi-cast IP packets over a network not designed
for multi-casting. This is common for radio dispatch and VOIP applications.
Other Features
Protocols
The bridge uses the IP protocol to connect to its remote peer. It does pass IP, IPX, AppleTalk, and other
non-routable protocols through the encrypted IP tunnel.
6

Configuration
FIPS 1 0-2
The FT series uses a FIPS certified encryption module. AES is used for the bulk data encryption. SHA1 is
used for signing and RSA 2048 for key exchange and authentication. A USB memory device is used for
certificate information storage. ontact D B for current certificate information.
DHCP Protocol
The bridge supports the DH P protocol as a client or server. DH P may be served through the tunnelled
link.
Extensive Filtering
The bridge supports filtering based upon IP addresses, MA addresses, or Protocol type. Filtering may be
configured as “shall pass” or “shall deny”.
802.1q VLAN
The bridge passes 802.1Q VLAN tagged packets.
Upgradeable Firmware
Firmware upgrades may be installed using most web browsers. Internet Explorer Version 7 and newer or
the latest Firefox versions (version 2 or newer) are recommended. Older versions of web browsers may fail
due to TLS negotiation.
Security and Firewall Features
The bridge supports a number of security features. On the “insecure” side, all traffic is encrypted, including
the FT to FT negotiation. The encryption methodology is industry-standard AES using a FIPS certified
encryption module. It may be configured so only workstations on the “secure” side of a unit may be used to
configure or control it, and certificates may be required..
On-board Tools
The bridge contains diagnostic tools such as extensive logging, traceroute, ping, and a simple packet sniffer
to aid in network troubleshooting.
Single-Interface operation
The FT bridge may be configured in an "single-headed" mode. See details in the manual.
Package Contents
You should find the following items packaged with your bridge:
The FT Bridge
Power Adapter
This User’s Guide DROM
Short cable with RJ-45 connectors (Units with serial ports only)
9-pin P -direct adapter (Units with serial ports only)
9-pin Remote-P adapter (Units with serial ports only)
25-pin modem adapter (Units with serial ports only)
USB Dongle for certificate transfer
If any of the above are missing, contact your dealer immediately.
7

Software Requirements
The bridge supports IP and associated protocols such as UDP, I MP, PPPoE, DH P, multi-cast, and any
protocol built upon IP or T P/IP. It also bridges any valid Ethernet protocol. The initial IP address
may be entered using any terminal or terminal emulation software on a P .
A standard web browser ( Internet Explorer or Firefox are recommended.) may be used for configuration
once the bridge is configured with a valid IP address. Older versions of web browsers often fail due to TLS
negotiation. The use of a secure web browser connection for configuration (HTTPS://) is required.
8
Table des matières
Manuels Routeur réseau populaires d'autres marques

NETGEAR
NETGEAR FS526T - Switch Manuel utilisateur

Korenix
Korenix JetNet 5710G Series Manuel utilisateur

Automated Logic
Automated Logic ZN551 Manuel du propriétaire

Cisco
Cisco ASR 1000 Series Manuel de l'opérateur

EnGenius
EnGenius ESR-9710 Manuel utilisateur

Cisco
Cisco 805 Series Instructions d'utilisation et de sécurité











