Operation, Overview, Administration and security – Comtech EF Data CiM-25/9000 User Manual

Page 25: Chapter 3. operation

Advertising
background image

7

Chapter 3. OPERATION

Overview 7

Administration and Security

7

HTTP Interface

10

SNMP Interface

24

Telnet Interface

26

Maintenance Interface

34

3.1 O

VERVIEW

Each CiM-25 unit is programmed in the factory to provide a custom proxy interface to
one of Comtech EF Data’s previously defined equipments. This means that a CiM-
25/9000 that is loaded to interface a SDM-9000 to the IP world will not operate with any
other piece of Comtech EF Data equipment, unless the personality is changed via a flash
upload. However every CiM-25, independent of personality, shares a large number of
common features. For instance, all CiM-25 units provide the same degree of security
features, network protocols, and administration features. The following sections will
provide a detailed description of all the features available for a specific CiM-25 (i.e.
CiM-25/9000 with SDM-9000 modem). Those areas that are common to all CiM-25
units will be expounded upon and delineated. The areas that are specific to the individual
personality (i.e. equipment parameter control) will only be briefly covered since these are
already covered in detail in the individual equipment operator manuals.

3.2 A

DMINISTRATION AND

S

ECURITY

The CiM-25 has been designed to provide a high degree of administrative flexibility to
insure that each customer can configure the device (or network of devices) in a manner
that meets his/her security needs. The primary tools provided are the Host Allow List,
PING enable/disable, and three (3) level user login. Used as a group, these three tools
provide the CiM-25 with a very high degree of security. Each of these tools is described
in more detail below:

Advertising