Siemens se5880 User Manual

Ethernet security router
Table of Contents

Advertisement

Quick Links

SIEMENS Business Class
se5880
Ethernet Security Router
User's Guide
Part No. 107-7950-001

Advertisement

Table of Contents
loading

Summary of Contents for Siemens se5880

  • Page 1 SIEMENS Business Class se5880 Ethernet Security Router User’s Guide Part No. 107-7950-001...
  • Page 2 (5) business days from the date received by Siemens Subscriber Networks. Expedited service is available at additional cost to the end user. E.Upon request from Siemens Subscriber Networks, the end user must prove the date of the original purchase of the product by a dated bill of sale or dated itemized receipt.
  • Page 3 • Siemens Subscriber Networks’s limit of liability under the limited warranty shall be the actual cash value of the product at the time the end user returns the product for repair, determined by the price paid by the end user for the product less a reasonable amount for usage.Siemens Subscriber Networks shall not be liable for any other losses or damages.
  • Page 4: Table Of Contents

    SIEMENS se5880 Ethernet Security Router User’s Guide Chapter 1 Product Specifications Front Panel... 1 Back Panel ... 1 Hardware Specifications... 2 Physical Specifications... 2 Operational Environment ... 2 Power Requirements... 2 Processor ... 2 Ethernet Interfaces... 2 Serial Interface ... 2 Software Specifications ...
  • Page 5 SIEMENS se5880 Ethernet Security Router User’s Guide Dynamic Host Configuration Protocol ... 18 Chapter 4 User Setup User Management... 20 Adding/Modifying A User Account... 21 Deleting A User Account ... 22 User Lookup... 23 Secure Mode Configuration ... 24 Configure the Radius Server... 25 Configure the TacPlus Server ...
  • Page 6 SIEMENS se5880 Ethernet Security Router User’s Guide View Dropped Packets ... 59 Configure Firewall Rules ... 60 Delete Firewall Rules ... 62 IKE/IPSec Configuration ... 63 Easy IKE/IPSec Setup ... 64 Advanced IKE/IPSec Setup ... 65 VPN Log On ... 72 Chapter 7 Monitoring Router System Summary...
  • Page 7: Chapter 1 Product Specifications

    T-RX Green Green (blinking) Back Panel The following table descrcibes the various connections on the back panel of the Siemens se5880 router. Connection Power Switch Enables and disables power to the system. Power Connector Power cord connection for internal power supply.
  • Page 8: Hardware Specifications

    SIEMENS se5880 Ethernet Security Router User’s Guide Hardware Specifications Physical Specifications • Unit Dimensions: – 8.4W x 7D x 1.7H inches – 21.3W x 17.8D x 4.3H cm • Weight: – 1.5 lbs. – .68 Kg. Power Requirements • AC Voltage:100 to 120V AC or 220 to 240V AC •...
  • Page 9: Software Specifications

    SIEMENS se5880 Ethernet Security Router User’s Guide Software Specifications Bridging • Transparent bridging including Spanning Tree protocol (IEEE 802.1D) • Bridge filters Configuration Management • Easy Setup Web Management Interface ® • Microsoft Windows configuration management via SNMP • TFTP download/upload of new software and configuration files •...
  • Page 10: Security

    SIEMENS se5880 Ethernet Security Router User’s Guide Security • Role-based management • User authentication (PAP/CHAP) with PPP (RFC 1334, RFC 1994) • Password control for Configuration Manager • SNMP password and community name reassignment • HTTP/Syslog/SNMP/Telnet port reassignment, access control list •...
  • Page 11: Chapter 2 Installation

    Installation Chapter 2 This chapter describes the steps you must take to install and configure the various components in your network to utilize the Siemens Ethernet Security Router. This includes the Internet router, configuring the PC router configuration. Before beginning installation, make sure you meet all...
  • Page 12: Hardware Installation

    Hardware Installation You may position the Siemens broadband router at any convenient location where it will be well ventilated. Do not stack it with other devices or place it on the carpet. You can connect the router to an existing Ethernet port on your computer.
  • Page 13: Pc Configuration

    SIEMENS se5880 Ethernet Security Router User’s Guide PC Configuration Your PC must be configured to use the TCP/IP protocol suite over the Internet, and to accept Dynamic Host Configuration Protocol address assignments from the router. Although this is the default settings for the PC, it is a good idea to verify that they have not been changed.
  • Page 14: Windows Nt 4

    SIEMENS se5880 Ethernet Security Router User’s Guide Windows NT 4 1. On your desktop, right click on the Network Neighborhood icon. This displays the Network window. 2. Click the Protocols tab. Select TCP/IP Protocol from the Network Protocols list. Click Properties. This displays the Microsoft TCP/IP Properties window.
  • Page 15: Windows 2000

    SIEMENS se5880 Ethernet Security Router User’s Guide Windows 2000 1. Select Start >Settings >Control Panel. This displays the Control Panel window. 2. Double-click the Network and Dial-up Connection icon. This displays the Network and Dialup Connection window. 3. Right-click Local Area Connections and select Properties.
  • Page 16: Windows Xp

    SIEMENS se5880 Ethernet Security Router User’s Guide Windows XP 1. Click Start >Control Panel. This displays the Control Panel window. 2. Double-click the Network Connections icon. This displays the Network Connection window. 3. Right-click Local Area Connection, then click Properties. This displays the Local Area Connection Properties window.
  • Page 17: Mac Os 9.X

    SIEMENS se5880 Ethernet Security Router User’s Guide Mac OS 9.x 1. Click Apple -> Control Panels -> TCP/IP. This displays the TCP/IP Control Panel window. 2. Select Ethernet from the Connect via drop-down menu. 3. Select Using DHCP Server from the Configure drop-down menu.
  • Page 18: Mac Osx

    SIEMENS se5880 Ethernet Security Router User’s Guide Mac OSX 1. Click Apple -> System Preferences. This displays the System Preferences window. 2. Double-click the Network icon under the Internet & Network section. This displays the Network window. 3. Select Ethernet from the Connect via drop-down menu.
  • Page 19: Linux

    SIEMENS se5880 Ethernet Security Router User’s Guide Linux 1. From a terminal window, run linuxconfig. This displays the Config window. 2. Click the Adaptor tab. 3. Enter any information specified by your service provider in the fields under the appropriate Adapter tab.
  • Page 20: Configuring The Router

    User’s Guide Configuring the Router The Siemens Business Class Router family of products provides two user interfaces: a Web Management Interface and a console-based Command Line Interface (CLI). The Web Management Interface uses an HTTP server housed in the router. Using this server, you can connect to and manage the router using your Web browser.
  • Page 21: Router Information Page

    SIEMENS se5880 Ethernet Security Router User’s Guide Router Information Page The Router Information Page is the first page you encounter after logging into the router. The Router Information page displays basic router information and configuration settings. On the Router Information page, the following information is presented: •...
  • Page 22: Chapter 3 Easy Setup

    • Not Using PPPoE Establishes the connection based on IP addressing. This option routes all IP packets for remote hosts to the WAN. Refer to Not Using PPPoE method. SIEMENS for instructions on providing information on this page for this...
  • Page 23: Using Pppoe

    SIEMENS se5880 Ethernet Security Router User’s Guide Using PPPoE If you selected Using PPPoE from the Untrusted Interface Configuration page, perform the following steps to configure Point-to-Point Protocol over Ethernet: 1. Enter PPPoE User Name and Password to use for authentication when establishing a WAN connection using PPoE protocol.
  • Page 24: Dynamic Host Configuration Protocol

    SIEMENS se5880 Ethernet Security Router User’s Guide Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP) provides a dynamic, “upon request,” IP address to computers and other networked devices. The router can act as a DHCP server for devices on your local network.
  • Page 25 SIEMENS se5880 Ethernet Security Router User’s Guide Trusted Interface Configuration Trusted Interface information is configured on the Trusted Interface Configuration page. To configure the Trusted Interface: 1. In IP Address, enter the network address of the router. This address must be globally unique unless NAT has been enabled.
  • Page 26: Chapter 4 User Setup

    Specify database for identifying users when logging into the router. Configure Secure Mode Configure the Radius Server Configure the Tacplus Server SIEMENS Manage user accounts. Change user password. Configure remote access to the router configuration settings. Refer to: Add or Modify A User Account...
  • Page 27: Adding/Modifying A User Account

    SIEMENS se5880 Ethernet Security Router User’s Guide Adding/Modifying A User Account User accounts are used to control access to the router and the Internet. To add a user account: 1. Click New User on the User Management page. This displays the Add/Modify User page.
  • Page 28: Deleting A User Account

    SIEMENS se5880 Ethernet Security Router User’s Guide Deleting A User Account To delete a user account: 1. Select the name of the account you want to delete in the Select User list on the User Management page, then click Delete User.
  • Page 29: User Lookup

    SIEMENS se5880 Ethernet Security Router User’s Guide User Lookup You can specify a primary and secondary database to use to identify users when logging into the router. To configure the primary and secondary databases: 1. Click User Lookup Config on the left navigation pane of the User Management page. This displays the User Lookup Configuration page.
  • Page 30: Secure Mode Configuration

    SIEMENS se5880 Ethernet Security Router User’s Guide Secure Mode Configuration You can enable secure mode to control whether an interface is trusted or untrusted. To configure Secure Mode: 1. Click Secure Mode Configuration on the left navigation pane of the User Management page. This displays the Secure Mode Configuration page.
  • Page 31: Configure The Radius Server

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure the Radius Server Remote Authentication Dial In User Service (RADIUS) is client-server based access control and authentication feature. The RADIUS client resides locally on the router and works in conjunction with a variety of RADIUS Server applications.
  • Page 32: Configure The Tacplus Server

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure the TacPlus Server Tacplus allows access control and user authentication to be managed from a remote server.To configure the Tacplus Server: 1. Click Configure Tacplus Server on the left navigation pane of the User Management page. This displays the Tacplus Server Configuration page.
  • Page 33: Management Classes

    SIEMENS se5880 Ethernet Security Router User’s Guide Management Classes All system operations, are partitioned into functional groups called management classes. Management classes group functions into the following categories. Class Functional Areas Voice Voice operations and shared network functions. Network File system, System Interfaces, SNMP, DHCP, NAT, remote commands.
  • Page 34: Change Password

    SIEMENS se5880 Ethernet Security Router User’s Guide Change Password User passwords are changed from the Change Password page. To change a user password: 1. Click Change Password from the left navigation pane on the Router Information page. This displays the Change Password page.
  • Page 35: Access Control

    SIEMENS se5880 Ethernet Security Router User’s Guide Access Control Restrict administrative control of the router to a specific set of IP addresses on the Access Control page. Each remote access method (Telnet, Web, and SNMP) can be configured separately. To set Access Control parameters: 1.
  • Page 36: Chapter 5 Advanced Setup

    Routing Table Configuration Dial Backup Switch Management Command Line Interface File Editor SIEMENS Configure unrestricted two-way communication with servers or individual users on the internet. Set the date and time on your router. View and configure the current DHCP settings.
  • Page 37: Dmz

    SIEMENS se5880 Ethernet Security Router User’s Guide One computer on your local network can be configured to allow unrestricted two-way communication with servers or individual users on the Internet. This provides the ability to run programs that are incompatible with firewalls.This feature is primarily used for gaming.
  • Page 38 SIEMENS se5880 Ethernet Security Router User’s Guide 6. To change the server status, select Enable or Disable from LAN DHCP Server Status. Disabled, the router will not act as a DHCP server. 7. To change the start and ending address range of the IP address pool, enter the starting address in First IP Address and the ending address in Last IP Address.
  • Page 39: Router Clock

    SIEMENS se5880 Ethernet Security Router User’s Guide Router Clock Use the Router Clock option to set the date and time on the router. To set the current date and time on the router: 1. Click Router Clock on the left navigation pane of the Router Information page. This displays the Current Date and Time page.
  • Page 40: Dhcp

    SIEMENS se5880 Ethernet Security Router User’s Guide DHCP DHCP (Dynamic Host Configuration Protocol), is a TCP/IP service protocol that provides dynamic leasing of IP addresses and other configuration information to client hosts on the network. The router can act as a DHCP server, automatically providing a suitable IP address and related information to each computer when the computer boots up.
  • Page 41: Qos

    SIEMENS se5880 Ethernet Security Router User’s Guide Quality of Service (QoS) actively manages network resources to sustain service levels for priority applications. To configure QoS: 1. Click QoS in the left navigation pane of the Router Information page. This displays the QoS Configuration page.
  • Page 42: Configure Qos Policy

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure QoS Policy QoS policies control how QoS manages network resources. To configure a QoS policy: 1. Click QoS Policy Page from the left navigation pane of the QoS Configuration page. This displays the QoS Policy Setting page.
  • Page 43 SIEMENS se5880 Ethernet Security Router User’s Guide 5. In Source IP, select one of the following: • From/To: Enables source address checking. Specify the source IP address or range of IP addresses that must match for this policy to be used.
  • Page 44: Reorder Qos Policies

    SIEMENS se5880 Ethernet Security Router User’s Guide Reorder QoS Policies To move a QoS policy: 1. On the QoS Policy Setting page, select the policy you want to move in the IP Policy List drop-down menu and click Move. This expands the QoS Policy Setting page.
  • Page 45: Routing Table Configuration

    SIEMENS se5880 Ethernet Security Router User’s Guide Routing Table Configuration Every host has a default routing table that it uses to determine which physical interface address to use for outgoing IP traffic. The router supports virtual routing, which allows you to define multiple routing tables for a single host.
  • Page 46: Dial Backup

    SIEMENS se5880 Ethernet Security Router User’s Guide Dial Backup Use the Dial Backup option to configure a backup connection to the Internet through an internal V.90 (model 5835 only) or an external asynchronous modem connected to the console port. This backup connection can be activated in the event of WAN service interruption.
  • Page 47: Internal Modem

    SIEMENS se5880 Ethernet Security Router User’s Guide Internal Modem The following Dial Backup Configuration page is displayed during Dial Backup configuration if you selected Internal Modem for the connection. To configure the internal modem for dial backup: 1. In Backup Failover Timeout, enter the number of minutes that must pass during a WAN link failure before switching to the backup port.
  • Page 48: External Modem

    SIEMENS se5880 Ethernet Security Router User’s Guide External Modem The following Dial Backup Configuration page is displayed during Dial Backup configuration if you selected External Modem for the connection. To configure the external modem for dial backup: 1. In Backup Failover Timeout, enter the number of minutes that must pass during a WAN link failure before switching to the backup port.
  • Page 49: Switch Management

    SIEMENS se5880 Ethernet Security Router User’s Guide Switch Management Each router provides four or eight Ethernet 10/100 switching ports for connection to the local area network (LAN). These RJ-45 ports are located on the rear panel and have individual Link Status LEDs to provide port status and link activity.
  • Page 50: Switch Mirror Configuration

    SIEMENS se5880 Ethernet Security Router User’s Guide Switch Mirror Configuration The router supports traffic mirroring on the Ethernet switch. This means that Ethernet traffic from any of the Ethernet ports is mirrored to a target port for analysis. This function facilitates the unobtrusive monitoring of source port activity.
  • Page 51: Switch Age Time

    SIEMENS se5880 Ethernet Security Router User’s Guide Switch Age Time The Switch Age Time specifies the aging time of the switch. When the age time expires, the port MAC address entry is removed from the table containing this information. To configure Switch Age Time: 1.
  • Page 52: Command Line Interface

    SIEMENS se5880 Ethernet Security Router User’s Guide Command Line Interface Use the Command Line Interface option to use the web interface to enter CLI commands. (Refer to the Command Line Interface Guide for available commands.) To execute a CLI command from the web interface: 1.
  • Page 53: File Editor

    SIEMENS se5880 Ethernet Security Router User’s Guide File Editor Use the File Editor to create and edit files stored on the router. These files contain configuration and other data used by the router. For advanced users who understand the file formats and syntax, this method may be more efficient than configuring the router with commands or the web interface, particularly when the amount of data is large or complex.
  • Page 54: Chapter 6 Security Setup

    Firewall Scripts Stateful Firewall IKE/IPSec Configuration VPN Log On SIEMENS Network Address Translation provides a level of security by hiding the private IP addresses of your LAN behind a single public IP address of your router. Simple Network Management Protocol controls message exchanges between a management client and a management agent.
  • Page 55: Nat

    SIEMENS se5880 Ethernet Security Router User’s Guide Network Address Translation (NAT) provides a level of security by hiding the private IP addresses of your LAN behind the single public IP address of your router. All connections pass through the router and are translated by NAT.
  • Page 56: Snmp

    SIEMENS se5880 Ethernet Security Router User’s Guide SNMP Simple Network Management Protocol (SNMP) exchanges messages between a management client and a management agent. Messages contain requests to get and set variables that exist in network nodes, thus allowing a management client to obtain statistics, set configuration parameters, and monitor events.
  • Page 57: Snmp Ip Filter

    SIEMENS se5880 Ethernet Security Router User’s Guide SNMP IP Filter Activating an IP Filter range will limit SNMP requests to only those that originate from the designated addresses or LAN. To activate IP filtering: 1. Click SNMP IP Filter from the SNMP Configuration page. This displays the SNMP IP Filter Configuration page.
  • Page 58: Secure Shell

    SIEMENS se5880 Ethernet Security Router User’s Guide Secure Shell Secure Shell (SSH) secures network services over an insecure network such as the public Internet. The objective of SSH is to make a secure functional equivalent for telnet. Telnet connections and commands are vulnerable to a variety of different kinds of attacks, allowing unauthorized system access, and even allowing interception and logging of traffic to and from the system including passwords.
  • Page 59: Configure Ssh

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure SSH To configure Secure Shell settings: 1. Click Configure SSH from the Secure Shell (SSH) Configuration List page. This displays the Configure Secure Shell (SSH) page. 2. For Status, select Enable or Disable to enable or disable the SSH feature. Before enabling SSH, a private/public key pair should be loaded on the router using either the 3.
  • Page 60: Load Keys

    SIEMENS se5880 Ethernet Security Router User’s Guide Load Keys Diffie-Hellman is the key exchange system used for authentication in the establishment and maintenance of SSH connections. The key exchange requires a Public Key and a Private Key. This key pair can either be loaded from a source file or generated by the router.
  • Page 61: Key Generator

    SIEMENS se5880 Ethernet Security Router User’s Guide Key Generator Diffie-Hellman is the key exchange system used for authentication in the establishment and maintenance of SSH connections. The Key exchange requires a Public key and a Private key. This key pair can either be loaded from a source file or generated by the router.
  • Page 62: Firewall Scripts

    All network security efforts, including firewall configurations, should be performed by an experienced and qualified network security technician who is familiar with the unique architecture and requirements of their network. Siemens Subscriber Networks cannot be liable for security violations due to inadequate or incorrect firewall configurations.
  • Page 63: Stateful Firewall

    SIEMENS se5880 Ethernet Security Router User’s Guide Stateful Firewall Stateful Firewall varies from the IP Filtering Firewall in that it gathers and maintains state information about each session. IP Filtering Firewall examines the packet’s header information and matches it against a set of defined rules.
  • Page 64: Configure Stateful Firewall

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure Stateful Firewall To configure the Stateful Firewall: 1. Click Stateful Firewall from the left navigation pane of the Router Information page. This displays the Stateful Firewall Configuration page. 2. For Firewall Status, select On or Off to turn Stateful Firewall on or off.
  • Page 65: View Dropped Packets

    SIEMENS se5880 Ethernet Security Router User’s Guide View Dropped Packets To view the most recent dropped packets: 1. Click Dropped Packets from the left navigation pane of the Stateful Firewall Configuration page. This displays the Firewall Dropped Packet List page.
  • Page 66: Configure Firewall Rules

    SIEMENS se5880 Ethernet Security Router User’s Guide Configure Firewall Rules To configure firewall rules: 1. Click Firewall Rules from the left navigation pane of the Stateful Firewall Configuration page. This displays the Firewall Rule Configuration page. When firewall rules are created, they are specified as Allow or Deny rules. When a packet is evaluated, the Deny rules are applied first, then the Allow rules.
  • Page 67 SIEMENS se5880 Ethernet Security Router User’s Guide 5. For Target, select one of the following to specify the characteristics a packet must have in order to match the firewall rule: • Protocol/Port Specifies the protocol or port that applies to the rule. This can be one of the following: tcp to specify TCP protocol for this rule.
  • Page 68: Delete Firewall Rules

    SIEMENS se5880 Ethernet Security Router User’s Guide Delete Firewall Rules To delete firewall rules: 1. Click Firewall Rules from the left navigation pane of the Stateful Firewall Configuration page. This displays the Firewall Rule Configuration page. 2. Click Delete. This expands the Firewall Rule Configuration page.
  • Page 69: Ike/Ipsec Configuration

    SIEMENS se5880 Ethernet Security Router User’s Guide IKE/IPSec Configuration IKE/IPSec (Internet Key Exchange/Internet Protocol Security) provides authentication and encryption of IP traffic for the authenticity, integrity and privacy of your communications. IPSec sessions are established through Security Associations (SAs) that enable secure devices to negotiate a level of security attributes needed for a Virtual Private Network (VPN).
  • Page 70: Easy Ike/Ipsec Setup

    SIEMENS se5880 Ethernet Security Router User’s Guide Easy IKE/IPSec Setup Internet Key Exchange (IKE) is a means of dynamically creating IP Security (IPSec) connections. IPSec uses encryption and authentication to virtual private networks over an insecure network. The Easy IKE/IPSec Setup form is used to create a default IKE configuration.
  • Page 71: Advanced Ike/Ipsec Setup

    SIEMENS se5880 Ethernet Security Router User’s Guide Advanced IKE/IPSec Setup The Advanced IKE/IPSec Setup page presents information about current IKE and IPSec peers, policies and proposals. To perform Advanced IKE/IPSec setup, click Advanced IKE/IPSec Setup from the left navigation pane of the IKE/IPSec Information page. This displays the Advanced IKE/IPSec Configuration page. This page shows the current configuration and includes a Create button for each category to create new IKE and IPSec definitions.
  • Page 72 SIEMENS se5880 Ethernet Security Router User’s Guide IKE Peers Definition IKE peers are those devices known to your internal modem as capable of participating in IKE connections. To define a new IKE Peer: 1. Click Create next to IKE Peers from the Advanced IKE/IPSec Setup page. This displays the IKE Peer Definition page.
  • Page 73 SIEMENS se5880 Ethernet Security Router User’s Guide IKE Proposals Definition IKE I proposals specify how packets will be encrypted/authenticated for Phase I. To define a new IKE proposal: 1. Click Create next to IKE Proposals from the Advanced IKE/IPSec Setup page. This displays the IKE Proposal Definition page.
  • Page 74 SIEMENS se5880 Ethernet Security Router User’s Guide IKE IPSec Proposals Definition IKE IPSec Proposals specify how packets will be encrypted/authenticated for the final SA. To define a new IKE IPSec proposal: 1. Click Create next to IKE IPSec Proposals from the Advanced IKE/IPSec Setup page. This displays the IKE IPSec Proposal Definition page.
  • Page 75 SIEMENS se5880 Ethernet Security Router User’s Guide 5. From the ESP Encryption Type drop-down menu, select one of the following to specify the algorithm to use to encrypt ESP IPSec packets: • DES: Encrypts using a 56-bit key. • 3DES: Encrypts using three 56-bit keys to produce 168-bit encryption.
  • Page 76 SIEMENS se5880 Ethernet Security Router User’s Guide IKE IPSec Policies Definition IPSec policies are criteria for packets that IPSec will recognize, and actions that IPSec will take upon recognition. To define a new IKE IPSec policy: 1. Click Create next to IKE IPSec Policies from the Advanced IKE/IPSec Setup page. This displays the IKE IPSec Policy Definition page.
  • Page 77 SIEMENS se5880 Ethernet Security Router User’s Guide 9. In Destination IP Address, enter the IP address of the remote private network to which your router will connect using this policy. 10. In Destination Subnet Mask, enter the subnet mask of the remote private network to which your router will connect using this policy.
  • Page 78: Vpn Log On

    SIEMENS se5880 Ethernet Security Router User’s Guide VPN Log On VPN Log On starts an IPSec session. IPSec sessions are initiated through Security Associations (SAs), which allow peers to negotiate a common set of security attributes that assures source authenticity, data integrity and confidentiality of IP packets, providing the level of security required by Virtual Private Networks (VPNs).
  • Page 79: Chapter 7 Monitoring Router

    Information page. This displays the System Summary page. From the System Summary page, you can view information for the following: • Ethernet interface • Remote connections • IP Routing • System SIEMENS View status and statistical information. Run diagnostic programs to determine potential problems.
  • Page 80: Ethernet Interface Information

    SIEMENS se5880 Ethernet Security Router User’s Guide Ethernet Interface Information Click Ethernet Info on the left navigation pane of the System Summary page to display information about the Ethernet interface. Remote Connection Information Click Remote Info on the left navigation pane of the System Summary page to display information about remote connections for all entries in the Remote Router database.
  • Page 81: Ip Routing Information

    SIEMENS se5880 Ethernet Security Router User’s Guide IP Routing Information Click IP Routing Info on the left navigation pane of the System Summary page to display information about the active interfaces in the IP routing table. System Information Click System Info on the left navigation pane of the System Summary page to display general information for select system settings.
  • Page 82: Diagnostics

    SIEMENS se5880 Ethernet Security Router User’s Guide Diagnostics The Diagnostic feature provides information about various components of your system that might help in diagnosing a problem. To run diagnostics, click Diagnostics on the left navigation pane of the Router Information page. This displays the Run Diagnostics page.
  • Page 83: Interface Information

    SIEMENS se5880 Ethernet Security Router User’s Guide Interface Information Select Interface information from the drop down menu and click Execute to display interface information. ATM Statistics Select ATM Statistics from the drop down menu and click Execute to display ATM statistics.
  • Page 84: Routing Table Information

    SIEMENS se5880 Ethernet Security Router User’s Guide Routing Table Information Select Routing Table information from the drop down menu and click Execute to display information about the configured routing tables. Files Information Select Files information from the drop down menu and click Execute to display files store on the router.
  • Page 85: Memory Usage

    SIEMENS se5880 Ethernet Security Router User’s Guide Memory Usage Select Memory usage from the drop down menu and click Execute to display memory usage information. List All Configuration Data Select List all configuration data from the drop down menu and click Execute to display configuration information.
  • Page 86: Tcp/Ip Statistics

    Chapter 7 Monitoring Router SIEMENS se5880 Ethernet Security Router Diagnostics User’s Guide TCP/IP Statistics Select TCP/IP statistics from the drop down menu and click Execute to display TCP/IP information. SIEMENS...

Table of Contents