Comtech EF Data turboIP-G2 User Manual

Page 7

Advertising
background image

turboIP-G2 Performance Enhancement Proxy Revision

2

Table of Contents

CD-TURBOIP-G2

v

3.4

 

10/100/1000 BaseT Ethernet MGT Port (1X RJ-45) .................................................. 3–3

 

3.5

 

IEC Line Input (AC Power) Connector ...................................................................... 3–3

 

CHAPTER 4.

 

CONFIGURATION AND UPDATING ................................................. 4–1

 

4.1

 

Important Configuration Notes ................................................................................... 4–1

 

4.2

 

Required Equipment .................................................................................................... 4–2

 

4.3

 

User Interfaces .............................................................................................................. 4–2

 

4.3.1

 

CONSOLE Settings .................................................................................................... 4–3

 

4.4

 

End User License Agreement (EULA) ........................................................................ 4–3

 

4.4.1

 

End User License Agreement (EULA) Copy Protection ............................................ 4–4

 

4.5

 

turboIP-G2 Configuration Wizard .............................................................................. 4–5

 

4.5.1

 

Configuration Wizard – Operational Overview .......................................................... 4–5

 

4.5.1.1

 

User Accounts / Username .................................................................................. 4–7

 

4.5.1.2

 

Password ............................................................................................................. 4–8

 

4.5.1.3

 

UTC (Coordinated Universal Time) Settings ..................................................... 4–9

 

4.5.1.4

 

DOD Warning Banner ...................................................................................... 4–11

 

4.6

 

Updating turboIP-G2 Software .................................................................................. 4–12

 

4.6.1

 

Preparing for the Software Update ........................................................................... 4–12

 

4.6.1.1

 

Verifying Communications between the User PC and CLI .............................. 4–12

 

4.6.1.2

 

Identifying the Software Version and Management IP Address ...................... 4–13

 

4.6.1.2.1

 

Identification Using the CLI ....................................................................... 4–13

 

4.6.1.2.2

 

Identification Using the Web Server Graphical User Interface (GUI) ........ 4–14

 

4.6.1.3

 

Creating and Renaming a Temporary Folder (for the Software Archive

Download) on the User PC. .............................................................................................. 4–15

 

4.6.1.4

 

Downloading the Archived Software Update File ............................................ 4–17

 

4.6.2

 

Updating Software .................................................................................................... 4–20

 

4.6.2.1

 

Updating via the Command Line Interface (CLI) ............................................. 4–20

 

4.6.2.2

 

Updating via the Web Server Graphical User Interface (GUI) ......................... 4–22

 

4.6.2.2.1

 

FTP UPDATE via the Web Server GUI ..................................................... 4–23

 

4.6.2.2.2

 

UPLOAD UPDATE via the Web Server GUI ............................................ 4–25

 

4.6.2.2.3

 

Troubleshooting the Software Update Process ........................................... 4–26

 

CHAPTER 5.

 

MANAGEMENT VIA THE CLI OR WEB SERVER GUI ..................... 5–1

 

5.1

 

Important Interface Operation Notes ......................................................................... 5–1

 

5.2

 

Command Line Interface (CLI) .................................................................................. 5–2

 

5.2.1

 

CLI Login.................................................................................................................... 5–2

 

5.2.2

 

CLI Operation using the SSH (Secure Shell) Interface .............................................. 5–3

 

5.2.2.1

 

Common Operational Features ........................................................................... 5–4

 

Advertising