Figure 30a: When Automatic option is chosen, the next fields are inactive (grey color).................................82
Figure 5-30b: Select Manual instead of Automatic for DSN Servers..................................................................82
Figure 5-31: Click the link “Filter List MAC” to use this feature...........................................................................83
Figure 5-32: The MAC list, which is empty in the beginning................................................................................83
Figure 5-33: Adding and editing entries in the table “Filter List MAC”................................................................83
Figure 5-34: Defining MAC entries in the table “Filter List MAC”........................................................................84
Figure 5-35: Defining MAC entries in the table “Filter List MAC”........................................................................87
Figure 5-36: Editing MAC entries in the table “Filter List MAC”...........................................................................87
Figure 5-37: The LAN page for WiFi Settings.........................................................................................................88
Figure 5-35: Select the Radio Channels of the WiFi Access Point.....................................................................91
Figure 5-38: Select and set up the WEP Security features..................................................................................92
Figure 5-39: Select and set up the advanced WPA Security features...............................................................92
Figure 5-40: Enable and configure MAC Security for WiFi...................................................................................93
Figure 5-41: 802.1x Settings, by default Disabled.................................................................................................94
Figure 5-42: Enable and configure settings for 802.1x EAPOL...........................................................................95
Figure 5-43: Embedded Help for the parameters of 802.1x authentication for EAPOL...................................96
Figure 5-44: “Bridge” configuration page, empty in the beginning......................................................................97
Figure 5-45: Edit an entry in the “Bridge” table......................................................................................................98
Figure 5-46: Several entries in the “Bridge” table..................................................................................................99
Figure 5-47: Bridges showing up in “Bridge Status”..............................................................................................99
Figure 5-48: The same bridges in the “Routes” table............................................................................................99
Figure 5-49: Details of bridges in the “Bridge Status” table...............................................................................100
Figure 5-50: The window “Interface Status” and the corresponding link present in several configuration
pages. ..................................................................................................................................................................101
Figure 5-51: The link “Test Net” at the bottom of the “Interface Status” page...............................................109
Figure 5-52: Features of the“Test Net” page........................................................................................................109
Figure 5-54: Commands available in “Network Tests” page..............................................................................114
Figure 5-55: The “VLAN” page with several virtual LANs defined.....................................................................115
Figure 5-56: The “ETH ports” page for physical configuration of Ethernet ports............................................120
Figure 5-56: The “ARP Table” with multiple entries.............................................................................................126
Figure 5-57: The “MTU” window of the LAN configuration page.......................................................................127
Figure 5-58: The WAN webpage............................................................................................................................131
Figure 5-59: Webpage for setting WAN Interface type and Failover................................................................131
Figure 5-60: Example of setting up primary and secondary WAN Interfaces, using Failover......................135
Figure 5-61: Output route via cabled Ethernet connection wan........................................................................135
Figure 5-62: Output route via wireless connection ppp1....................................................................................135
Figure 5-63: Webpage for setting up WAN Port in the WAN settings..............................................................137
Figure 5-64: Selection of address type (Automatic) for WAN Port in the page for WAN...............................137
Figure 5-65: Examples of setting Static address for WAN Eth interface in the WAN pages........................138
Figure 5-66: Setting the name servers for static IP on the ETH Interface for WAN.......................................138
Figure 5-67: Settings for PPP over Ethernet connection in webpage for WAN..............................................139
Figure 5-68: Settings for PPP link for the embedded radio modem of Bytton ICR.........................................140
Figure 5-69a: Settings for PPP link in case of Dual-SIM Bytton equipment....................................................141
Figure 5-69b: Settings for the second SIM of the PPP wireless link, in case of dual-SIM Bytton LTE device.
..............................................................................................................................................................................141
Figure 5-70: Advanced PPP Settings for the embedded modem of Bytton LTE............................................143
Figure 5-71: PPP Advanced settings –parameters for the wireless Data Link. ..............................................144
Figure 5-72: PPP Check Data Link settings Bytton LTE.....................................................................................145
Figure 5-73: Enabling the “PPP Check Data Link” feature:...............................................................................145
Figure 5-74: Example of editing settings for “PPP Check Data Link” and explanation of parameters......145
Figure 5-75: Example with values of settings for the “PPP Check Data Link” feature...................................146
Figure 5-76: Aspect of the “TUNNELS” web configuration page. ....................................................................148
Figure 5-77: Example of maximal “TUNNELS” Web page, with six sub-pages..............................................148
Figure 5-78: Aspect of GRE section of the “TUNNELS” Web page..................................................................149
Figure 5-79: Add New and Edit an entry in the GRE table of the “TUNNELS” Web page............................149
Figure 5-80: Saving a complete entry into the GRE table..................................................................................149
Figure 5-81: The IPSEC configuration table, empty............................................................................................151
Figure 5-82: Global IPSEC settings, on top of the IPSEC configuration table................................................152
Figure 5-83: Configuring the Global IPSEC settings...........................................................................................152
Figure 5-84: Specific IPSEC settings.....................................................................................................................153
Figure 5-85: Define or modify the Specific IPSEC settings................................................................................154
Figure 5-86: Using the link “Configure Authentication Keys”.............................................................................155