beautypg.com

Comtech EF Data CiM Quick-Start Guide User Manual

Page 5

background image

iii

Table of Contents

CHAPTER 1. GETTING STARTED ............................................................................. 1

1.1 Introduction............................................................................................................................. 1

1.2 Typpical Point-to-Point System Configuration.................................................................... 1

1.3 Equipment List........................................................................................................................ 2

1.4 Equipment Setup..................................................................................................................... 2

1.5 PC Configuration.................................................................................................................... 2

1.6 Transmit and Receive IF Configuration............................................................................... 3

1.7 Basic IP Configuration ........................................................................................................... 3

1.7.1 Main Menu......................................................................................................................... 4
1.7.2 Restoring factory Default Configuration ........................................................................... 4
1.7.3 CiM 1 Configuration.......................................................................................................... 5
1.7.4 CiM 2 Configuration.......................................................................................................... 6
1.7.5 Verification ........................................................................................................................ 7

1.8 Using Encryption .................................................................................................................... 8

1.8.1 CiM 1 Configuration.......................................................................................................... 8
1.8.2 Configuration ..................................................................................................................... 9
1.8.3 Verification ...................................................................................................................... 10

1.9 Other Configuration Items................................................................................................... 11

1.9.1 User Names & Passwords................................................................................................ 11
1.9.2 Access Lists ..................................................................................................................... 11
1.9.3 Enabling/Disabling Telnet ............................................................................................... 13

Figures


Figure 1. Typical Point-to-Point System Configuration ................................................................ 1
Figure 2. Main Menu ..................................................................................................................... 4