Farallon Communications R9100 Network Card User Manual


 
Contents vii
G
How to reach us................................................... A-4
Appendix B — Understanding IP Addressing ..............................B-1
What is IP?.................................................................... B-1
About IP addressing....................................................... B-1
Subnets and subnet masks .................................. B-2
Example: Using subnets on a Class C IP internet.... B-3
Example: Working with a Class C subnet................ B-5
Distributing IP addresses ............................................... B-5
Technical note on subnet masking......................... B-6
Configuration ....................................................... B-7
Manually distributing IP addresses ........................ B-8
Using address serving.......................................... B-8
Tips and rules for distributing IP addresses............ B-9
Nested IP subnets ....................................................... B-11
Broadcasts.................................................................. B-13
Packet header types........................................... B-13
Appendix C — Understanding Netopia NAT Behavior...................C-1
Network configuration..................................................... C-1
Background................................................................... C-1
Exported services ................................................ C-5
Important notes................................................... C-6
Configuration................................................................. C-7
Summary ...................................................................... C-8
Appendix D — Binary Conversion Table......................................D-1
Appendix E — Further Reading..................................................E-1
Appendix F — Technical Specifications and Safety Information...F-1
Pinouts for Auxiliary port modem cable............................ F-1
Description.................................................................... F-2
Power requirements ............................................. F-2
Environment ........................................................ F-2
Software and protocols......................................... F-3