User’s manual aw-hsnetappliance, Step c. configure the encryption modules – AvaLAN Wireless AW-HSNetAppliance User Manual
Page 5

PAGE 5
Technical Support (650) 384-0000
www.avalanwireless.com
User’s Manual
AW-HSNetAppliance
•
The login information to the AW-NetAppliance web interface. This is a default of “ad-
min” and “password.” If it has been changed and you don’t know what it is, you may
need to do a complete reinitialize.
•
A static IP address, netmask and gateway address for the Net Appliance at the Main
Network location. (Seek the help of the IT person for the Main Network if you do not
have direct control over this.)
•
MAC addresses of any devices that are allowed to use the Net Appliance’s tunnel (all
devices are allowed by default, but you can limit this to a list of up to 24 specific
devices at each end.)
We recommend writing down a list of these items before proceeding further. You will need
the answers to all of the above to complete the configuration of your secure tunnel. For your
convenience, use the form provided in the back of this manual.
Step C. Configure the Encryption Modules
To program the encryption module within the AW-HSNetAppliance, a PC must be connected to
the USB port on the end of the case:
The PC must have two critical pieces of software installed:
1. A driver that provides a virtual COM port through the USB connection. Such a driver is
already included with Windows XP, Vista or 7 and should automatically be located and
loaded when the USB connection is first made.
2. The AW140 Crypto Module Interface utility that can be downloaded from our website,
www.avalanwireless.com. Look for it on the Downloads page under the Support tab. The
file is a zip archive containing an installer for the utility. Unzip and run it to install the
utility on your PC.
If you prefer to use a computer with a non-Windows operating system, it is also possible to
program the module with a virtual COM port driver and a generic terminal emulator. Contact
AvaLAN Technical Support for help with this feature.
The person having access to the programming interface is referred to by the FIPS 140-2
Standard as the Crypto Officer. As the Crypto Officer, part of the responsibility for data secu-
rity rests with your choice of a strong login password and encryption key. Make sure you do not
lose the login passwords and encryption key because they cannot be retrieved from the Net
Appliances in any fashion.