Allocating the device in the network, Programmes to allocate mdns devices, Network security – KLING & FREITAG K&F TOPAS User Manual
Page 21: Audio functions, 3 ip address assignment, 4 allocating the device in the network, 5 programmes to allocate mdns devices, 6 network security

User's manual
System Amplifier K&F TOPAS
KLING & FREITAG GMBH © 2014
Version 3.1
Page 21 of 65
5.4.3
IP Address Assignment
Upon delivery, all devices are set to have a sequential address assignment. If no DHCP server
can provide an IP address, the address is selected from the auto-IP address range. Thus, there
are three possibilities to assign addresses:
•
Auto-IP: With this function, the device generates and requests an IP adress on its own
from the IP range 169.254.1.0 to 169.254.254.255, with the subnet mask 255.255.0.0.
The address ranges 169.254.0.x and 169.254.255.x are reserved and may not be set.
•
DHCP: A DHCP server assigns an IP address.
•
Static IP: The user assigns a fixed IP address.
If you connect the device to the power supply first and then to a network in which a DHCP
server is present, the device stays in the Auto IP range for up to six minutes before an address
from the DHCP server is accessed. To avoid this waiting time, we recommend connecting the
device to the network first and subsequently connecting it to the power supply.
You can set the addressing mode in the web interface. (see page 37)
5.4.4
Allocating the Device in the Network
Independent of the selected IP addressing procedure, you can allocate the device in the
network via mDNS.
If not specified in the web interface mDNS name (see page 38), the amplifier generates its
own mDNS name. The self-generated mDNS name is made up of type and serial number.
For a detailed description see chapter Integrated Web Interface on page 17.
5.4.5
Programmes to Allocate mDNS Devices
If you want to access the web interface without a known IP address, one of the following
programmes must be installed on your computer:
•
STG ZeroConf Explorer: http://www.stg.com/zeroconf_explorer.html
•
Apple Bonjour: http://support.apple.com/downloads/DL999/en_EN/BonjourPSSetup.exe
with Bonjour Foxy Firefox add-on: http://dnssd.me/
•
Apple's Safari browser with built-in Bonjour, with installed Apple's Bonjour
On Apple computers, Bonjour is already installed.
5.4.6
Network Security
To prevent manipulation of the connected devices, you should follow basic security rules in
handling networks. The communication via the used protocol 'http' generally takes place
unencrypted so that attackers can intercept and see transferred data.
Preventive measures:
•
The devices must be in a closed network area that is separated by a firewall/router.
This can be a separate network hardware or a sub-network within an existing network
infrastructure.
•
Remote access into this network may only be done via a safe, strongly encrypted
connection (VPN).
•
If some parts of the network connection run as a wireless network (WLAN), you must
secure this with a strong encryption method (i.e. WPA2 with AES/TKIP), since the
communication between the devices can otherwise be tapped by packet sniffing.
•
You must prevent unauthorised persons from gaining direct access to network ports
(cables).
•
The devices' user passwords must not be trivial or easy to guess.