Elsa Cable User Manual
Content
ELSA Cable Modem
V
English
Content
.....................................................................1
takes the stage............................................................ 1
What does the unit look like? ............................................................................ 1
Node or hub?...................................................................................................... 3
Node or hub?...................................................................................................... 3
ELSA MicroLink Cable
.......................................................... 4
Fast Internet ....................................................................................................... 4
Internet at all times—always online ................................................................ 5
More than just Internet...................................................................................... 5
Internet at all times—always online ................................................................ 5
More than just Internet...................................................................................... 5
First Steps ............................................................................................................. 10
Quick Start: Quick configurations ......................................................................... 11
Quick Start: Quick configurations ......................................................................... 11
Preparations ..................................................................................................... 11
Configuration as a bridge ................................................................................ 11
Configuration as a router ................................................................................. 13
Configuration as a bridge ................................................................................ 11
Configuration as a router ................................................................................. 13
Requirements for inband configuration ........................................................... 17
Alternatively: addresses can be managed by the DHCP server ...................... 17
Starting inband configuration using
Alternatively: addresses can be managed by the DHCP server ...................... 17
Starting inband configuration using
..................................... 18
Configuration commands ..................................................................................... 19
What's happening on the line?............................................................................. 21
What's happening on the line?............................................................................. 21
This is how FirmSafe works............................................................................. 22
How to load new software .............................................................................. 23
Configuration using SNMP .............................................................................. 24
General............................................................................................................. 24
Accessing tables and parameters using SNMP .............................................. 25
The Management Information Base (MIB) ...................................................... 27
How to load new software .............................................................................. 23
Configuration using SNMP .............................................................................. 24
General............................................................................................................. 24
Accessing tables and parameters using SNMP .............................................. 25
The Management Information Base (MIB) ...................................................... 27
Password protection ........................................................................................ 29
Login barring .................................................................................................... 29
Access control via TCP/IP ................................................................................ 30
Login barring .................................................................................................... 29
Access control via TCP/IP ................................................................................ 30