User’s manual aw-hsnetappliance, Step c. configure the encryption modules – AvaLAN Wireless AW-HSNetAppliance User Manual

Page 5

Advertising
background image

PAGE 5

Technical Support (650) 384-0000

www.avalanwireless.com

User’s Manual

AW-HSNetAppliance

The login information to the AW-NetAppliance web interface. This is a default of “ad-

min” and “password.” If it has been changed and you don’t know what it is, you may

need to do a complete reinitialize.

A static IP address, netmask and gateway address for the Net Appliance at the Main

Network location. (Seek the help of the IT person for the Main Network if you do not

have direct control over this.)

MAC addresses of any devices that are allowed to use the Net Appliance’s tunnel (all

devices are allowed by default, but you can limit this to a list of up to 24 specific

devices at each end.)

We recommend writing down a list of these items before proceeding further. You will need

the answers to all of the above to complete the configuration of your secure tunnel. For your

convenience, use the form provided in the back of this manual.

Step C. Configure the Encryption Modules

To program the encryption module within the AW-HSNetAppliance, a PC must be connected to

the USB port on the end of the case:

The PC must have two critical pieces of software installed:
1. A driver that provides a virtual COM port through the USB connection. Such a driver is

already included with Windows XP, Vista or 7 and should automatically be located and

loaded when the USB connection is first made.

2. The AW140 Crypto Module Interface utility that can be downloaded from our website,

www.avalanwireless.com. Look for it on the Downloads page under the Support tab. The

file is a zip archive containing an installer for the utility. Unzip and run it to install the

utility on your PC.

If you prefer to use a computer with a non-Windows operating system, it is also possible to

program the module with a virtual COM port driver and a generic terminal emulator. Contact

AvaLAN Technical Support for help with this feature.
The person having access to the programming interface is referred to by the FIPS 140-2

Standard as the Crypto Officer. As the Crypto Officer, part of the responsibility for data secu-

rity rests with your choice of a strong login password and encryption key. Make sure you do not

lose the login passwords and encryption key because they cannot be retrieved from the Net

Appliances in any fashion.

Advertising