beautypg.com

Operation, Chapter 3. operation – Comtech EF Data CiM-25/600 User Manual

Page 27

background image

7

Chapter 3. OPERATION


3.1 O

VERVIEW

Each CiM-25 unit is programmed in the factory to provide a custom proxy interface to
Comtech EF Data’s previously defined equipment. This means that a CiM-25/600 that is
loaded to interface a CDM-600 Modem to the IP world will not operate with any other
piece of Comtech EF Data equipment, unless the personality is changed via a flash
upload. However, every CiM-25, independent of personality, shares a large number of
common features. For instance, all CiM-25 units provide the same degree of security
features, network protocols, and administration features. The following sections will
provide a detailed description of all the features available for a specific CiM-25 (i.e.,
CiM-25/600 with CDM-600 Modem). Those areas that are common to all CiM-25 units
will be expounded upon and delineated. The areas that are specific to the individual
personality (such as equipment parameter control) will only be briefly covered since
these are already covered in detail in the individual equipment operator manuals.

3.2 A

DMINISTRATION AND

S

ECURITY

The CiM-25 has been designed to provide a high degree of administrative flexibility to
ensure that each user can configure the device (or network of devices) in a manner that
meets his/her security needs. The primary tools provided are the Host Allow List, PING
enable/disable, and three (3) level user login. Used as a group, these three tools provide
the CiM-25 with a very high degree of security.