Viola Systems M2M solution installation

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

TROUBLESHOOTING guide
Quick Installation Guide for Hurricane8800P
Arctic IEC-104 Gateway Jari Lahti, CTO.
Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Poseidon 4002 Rack monitoring 1. Poseidon: Monitor & Control 2.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
4Gon Tel: +44 (0) Fax: +44 (0) G/3G ROUTERS GWR series Sergej Stolić, M.Sc.Geneko.
Wi-Fi Structures.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Training.
TCP/IP Protocol Suite 1 Chapter 3 Objectives Upon completion you will be able to: Underlying Technology Understand the different versions of wired Ethernet.
M2M Gateway Features Jari Lahti, CTO
Introduction to Computer Networking. Wireless Network.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
CISCO ROUTER BY Mark Sullivan Nancy Tung Xiao Yan Wu.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
1 Cabling UTP AND FIBER CABLING. 2 Structured Cabling Infrastructure Mounted and permanent Allows patching Comfort that infrastructure is OK Components:
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Geodetic Research Laboratory Department of Geodesy and Geomatics Engineering University of New Brunswick 22/02/02 Stefan.Duerauer DIPLOMA THESIS Prototype.
Arctic Control Introduction V 1.0. Arctic Control The Arctic Control is a device with integrated wireless communications for controlling medium-voltage.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Connecting LANs, (network devices) Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 5 Networks Communicating and Sharing Resources
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
| IPV-MUX-S | IP Gateway. |2|2 | IPV-MUX-S IP Gateway Line Ports | 10/100BaseT Ethernet auto-negotiation | Fiber Optic Module, 100BaseFX |1300nm Multimode.
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Click to edit Master subtitle style Assignment 3 Networking Devices Leonard Ehalt.
Computer Concepts 2014 Chapter 5 Local Area Networks.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
CSC 600 Internetworking with TCP/IP Unit 2: Client-Server Model and Sockets(Ch.2, 3, 21, 22) Dr. Cheer-Sun Yang Fall 2000.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
3/5/2002e-business and Information Systems1 Computer Networking Computer System Computer Hardware Computer Software Computer Networking.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
OmniView® Remote IP Device. OmniView® Remote IP Device – Features and Benefits Control your Server or KVM switch over LAN or WAN The OmniView SMB Remote.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
11111 Apollo Internet Monitoring Tutorial Apollo Solar, Inc. 23 F. J. Clarke Circle Bethel, CT (203)
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Communication.
1-Port Ultra PoE to 4-Port 802.3af/at Gigabit PoE Extender
Chapter 7. Identifying Assets and Activities to Be Protected
Universal connection and monitoring for M2M applications
Chapter 1: WAN Concepts Connecting Networks
Networking | Hardware Components
LRXI Industrial KVM Extender
Department of Engineering Science EE 465 (CES 440) - Intro
Presentation transcript:

Viola Systems M2M solution installation Technical Support

Installation Wireless Solutions Industry

Which VPN to use? L2TP-VPN The L2TP (layer 2 tunneling protocol) commonly tunnels PPP (point-to-point protocol) and other upper layer protocols over IP (Internet protocol). L2TP packets are sent within UDP datagrams. SSH-VPN The SSH-VPN within Viola M2M solution is implemented with Open SSH. It uses cryptographic keys for authentication and encrypted transport layer. SSH packets are encapsulated inside TCP packets, which increases the protocol overhead. OpenVPN With Arctic 3G Gateway, the OpenVPN can be used. It is recommended for high security and small protocol overhead. Which VPN to use? The decision between the three VPN technologies would be made on basis of the following arguments: • L2TP-VPN provides faster round-trip times and less overhead but no data encryption • SSH-VPN is safer with data encryption, but is also slower with more protocol overhead OpenVPN is generally recommended if available in the product.

Installation workflow

Installation checklist SIM cards for Arctics (with GPRS service enabled) PIN codes Access point name, username and password Private access point, if needed IP plan Passwords IT department for assistance, if present Manuals for every device related to the installation Cables; network, power, serial, etc. Antennas for Arctics, external antennas, if needed Power supplies and cables for each device Grounding, especially with shielded Ethernet and serial cables DIN rail mounting kits, if needed A computer for installation, e.g. laptop with Windows

Installation procedure Make sure that the previous checklist is checked through. Gather the arrived equipment into one central place Connect the cables Configure the M2M GW and Arctic Test the end-to-end connection locally (LAN connection) Test the connection with GPRS/EDGE via M2M GW’s VPN tunnel locally Place the Arctics to remote locations Test the end-to-end connection

IP planning The IP networking plan plays very important role when setting up the Viola Systems M2M solution. It is a good practice to have a ready-made IP plan before continuing setting up the devices. How many private and public IP addresses are needed depends on the number of M2M GWs and Arctics and the number of TCP/IP connected devices behind the Arctics, if any. The private IP addresses are typically used in M2M GW's LAN, in VPN peer IPs and in Arctic's LAN. To avoid overlapping the network address space (thus causing possible routing problems), it is a good practice to use different class of private IP addresses for each set of addresses.

IP planning In a simple setup, only one public, routable IP address is needed; The M2M GW's IP address. In this scenario, the M2M GW is connected directly to Internet with one public IP address via its eth0 interface. The Arctics are using the cellular operator’s public access point to connect to the internet.

IP planning - II The M2M GW is behind the firewall in a de-militarized zone (DMZ). Since the M2M GW has now a private IP address, there must be a way for connecting to it from Internet. The connection from Internet to M2M GW is implemented with D-NAT and port forwarding. Also here the Arctics are using the cellular operator’s public access point for connecting to the Internet.

IP planning - III In some solutions it is decided to use the operator’s private access point in cellular network. This will always need a special contract with cellular operator. Using the private access point has a benefit in form of fixed IP addresses for each SIM card, but they’re also more expensive solution.

Arctic’s connectors

Arctic’s cables Power supply cable The Arctic is shipped without a power supply. Viola Systems stocks suitable power supply with cable. Ethernet cable If Arctic is connected to a computer, a cross-connect cable may be needed. A connection to a switch is done with direct cable. There’s also an Arctic Accessory Kit, (power supply, null modem cable, cross connected Ethernet cable). Serial cable for console port When connecting a computer to Arctic’s console port, a cross-connected (i.e. null modem) cable is used. Serial cable for RS1 application port (Gateways) The RS1 application port is always RS-232 and switchable between the console and application (plain data) port. Serial cable for RS2 application port (Gateways) The RS2 port is configurable between RS-232 and RS-485/422 (full and half duplex are supported). Antenna cable If the Arctic is located inside a cabinet, the signal level of cellular network may not be sufficient for operation when using the standard antenna. An external antenna with FME (female) connector may be used.

Cabling the Arctic The needed cables are depending on the application and the type of Arctic used The Arctic Router products have only console serial port, where as the Gateway products have one serial port that can be switched between console or application port and one serial application port Measured power consumptions (note: add a safety coefficient for power supply, recommended power supply’s output power is 5 Watts or more at 12 VDC) Vcc/V Inom/A Imax/A Pmax/W 6 0.40 0.48 2.88 12 0.20 0.25 2.00 24 0.10 0.13 3.12

Cabling the Arctic - II Arctic’s Ethernet specifications: - 10 Base-T or 100 Base-T - Supports auto negotiation - Supports half duplex and full duplex Commonly, the unshielded twisted pair CAT5e (UTP) cable is the best solution If using shielded Ethernet connection, shield is connected to power supply ground (consider possible voltage potential differences) Max cable length 100 meters (328 feet) between two active devices

M2M GW’s connectors M2M GW’s back panel

Cabling the M2M GW There are two Ethernet connectors at the back side of M2M GW. The left one (seen from the back side), marked with number "1" stamped to the right side of the connector, is the WAN port of M2M GW. It is the eth0 interface in M2M's graphical user interface. The second Ethernet connector, marked with number "2" is the LAN port of the M2M GW. It is the eth1 interface in M2M GW's GUI. There are also connectors for local console with analog VGA connector for monitor and USB port for local keyboard (do not use PS/2 connector for keyboard). The local console is helpful in some situations (e.g. if one has locked him/herself out from the Ethernet ports by firewall), but it is not usually needed, while initially configuring the M2M GW. The power supply of M2M GW is rated for input voltages between 100-240 Volts AC. The connector in M2M GW is standard IEC 60320, type C14 that accepts the C13 plug, the wall or rack socket connector type varies country by country.