P-870HN-51D 802.11n Wireless VDSL2 4-port Gateway Default Login Details IP Address https://192.168.1.1 User Name admin Password 1234 Firmware Version 1.01 Edition 1, 07/2010 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the P-870HN-51D using the web configurator. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. • Support Disc Refer to the included CD for support documents.
About This User's Guide • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product. • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The P-2812HNU-51c may be referred to as the “P-870HN-51D”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The P-870HN51D icon is not an exact representation of your device.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Safety Warnings 8 P-870HN-51D User’s Guide
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 19 Introducing the P-870HN-51D ................................................................................................... 21 Tutorials ..................................................................................................................................... 27 Introducing the Web Configurator ........................
Contents Overview 10 P-870HN-51D User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 2.5.3 Testing the DDNS Setting .......................................................................................... 40 2.6 Configuring Static Route for Routing to Another Network ................................................... 40 2.7 Configuring QoS Queue and Class Setup ........................................................................... 43 Chapter 3 Introducing the Web Configurator ........................................................................................
Table of Contents 6.1.1 What You Can Do in this Chapter .............................................................................. 91 6.2 What You Need To Know ..................................................................................................... 92 6.3 The LAN IP Screen .............................................................................................................. 93 6.4 Technical Reference ..................................................................................
Table of Contents 9.1 Overview ........................................................................................................................... 141 9.1.1 What You Can Do in this Chapter ............................................................................ 141 9.2 What You Need to Know .................................................................................................... 141 9.3 The Firewall Screen ..............................................................................
Table of Contents 14.1.1 What You Can Do in this Chapter .......................................................................... 169 14.2 What You Need to Know .................................................................................................. 170 14.3 The Quality of Service General Screen .......................................................................... 170 14.4 The Queue Setup Screen ...............................................................................................
Table of Contents 18.1.1 What You Can Do in this Chapter .......................................................................... 209 18.2 The Time Restriction Screen ........................................................................................... 209 18.2.1 Adding a Schedule ................................................................................................. 210 18.3 The URL Filter Screen ............................................................................................
Table of Contents Chapter 24 Troubleshooting.................................................................................................................... 239 24.1 Power, Hardware Connections, and LEDs ...................................................................... 239 24.2 P-870HN-51D Access and Login ..................................................................................... 240 24.3 Internet Access ...................................................................................
Table of Contents 18 P-870HN-51D User’s Guide
P ART I User’s Guide 19
CHAPTER 1 Introducing the P-870HN-51D 1.1 Overview The P-870HN-51D is a VDSL2 device that allows super-fast, secure Internet access. It extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing.
Chapter 1 Introducing the P-870HN-51D Computers can connect to the P-870HN-51D’s LAN ports (or wirelessly). Figure 1 P-870HN-51D’s Internet Access Application WLAN WAN Bridging IPoE PPPoE VDSL LAN You can also configure the firewall on the P-870HN-51D for secure Internet access. When the firewall is on, all incoming traffic from the Internet to your network is blocked by default unless it is initiated from your network.
Chapter 1 Introducing the P-870HN-51D • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the P-870HN-51D to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the P-870HN-51D. You could simply restore your last configuration. 1.
Chapter 1 Introducing the P-870HN-51D None of the LEDs are on if the P-870HN-51D is not receiving power. Table 1 LED Descriptions LED COLO R STATUS DESCRIPTION PWR/SYS Green On The P-870HN-51D is receiving power and ready for use. Blinking The P-870HN-51D is self-testing. On The P-870HN-51D detected an error while self-testing, or there is a device malfunction. Off The P-870HN-51D is not receiving power.
Chapter 1 Introducing the P-870HN-51D 1.6 The RESET Button If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the device to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”. 1.6.1 Using the Reset Button 1 Make sure the POWER LED is on (not blinking).
Chapter 1 Introducing the P-870HN-51D 4 Press the WPS button for more than five seconds and release it. Press the WPS button on another WPS -enabled device within range of the P-870HN-51D. The WLAN/WPS LED should flash while the P-870HN-51D sets up a WPS connection with the wireless device. Note: You must activate WPS in the P-870HN-51D and in another wireless device within two minutes of each other. See Section 7.9.4 on page 121 for more information.
CHAPTER 2 Tutorials 2.1 Overview This chapter describes: • How to Set up a Wireless Network on page 27. • Configuring the MAC Address Filter on page 36. • Setting Up NAT Port Forwarding on page 37. • Access the P-870HN-51D Using DDNS on page 38. • Configuring Static Route for Routing to Another Network on page 40. • Configuring QoS Queue and Class Setup on page 43.
Chapter 2 Tutorials We use the P-870HN-51D web screens and M-302 utility screens as an example. The screens may vary slightly for different models. 2.2.2 Configuring the AP Follow the steps below to configure the wireless settings on your AP. 1 Open the Network > Wireless LAN screen in the AP’s web configurator. Figure 3 AP: Wireless LAN 28 2 Make sure the Active Wireless LAN check box is selected.
Chapter 2 Tutorials 5 Click the Advanced Setup tab and select 802.11b/g/n Mixed in the 802.11 Mode field. Click Apply. Figure 4 AP: Wireless LAN > Advanced Setup 6 Open the Status screen.Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status.
Chapter 2 Tutorials 7 Click the WLAN Station List hyperlink in the AP’s Status screen. You can see if any wireless client has connected to the AP. Figure 6 AP: Status: WLAN Station List 2.2.3 Configuring the Wireless Client This section describes how to connect the wireless client to a network. 2.2.3.1 Connecting to a Wireless LAN The following sections show you how to join a wireless network using the ZyXEL utility, as in the following diagram.
Chapter 2 Tutorials 1 Open the ZyXEL utility and click the Site Survey tab to open the screen shown next. Figure 7 ZyXEL Utility: Site Survey 2 The wireless client automatically searches for available wireless networks. Click Scan if you want to search again. If no entry displays in the Available Network List, that means there is no wireless network available within range. Make sure the AP or peer computer is turned on or move the wireless client closer to the AP or peer computer.
Chapter 2 Tutorials 4 The Confirm Save window appears. Check your settings and click Save to continue. Figure 9 ZyXEL Utility: Confirm Save 5 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection.
Chapter 2 Tutorials networks, for example if you connect a notebook computer to wireless networks at home and at work. This example illustrates how to set up a profile and connect the wireless client to an access point configured for WPA-PSK security. In this example, the SSID is “SSID_Example3”, the profile name is “PN_Example3” and the pre-shared key is “ThisismyWPA-PSKpre-sharedkey”. You have chosen the profile name “PN_Example3”.
Chapter 2 Tutorials 4 Choose the same encryption method as the AP to which you want to connect (In this example, WPA-PSK). Figure 13 ZyXEL Utility: Profile Security 5 This screen varies depending on the encryption method you selected in the previous screen. Enter the pre-shared key and leave the encryption type at the default setting. Figure 14 ZyXEL Utility: Profile Encryption 6 In the next screen, leave both boxes checked. Figure 15 Profile: Wireless Protocol Settings.
Chapter 2 Tutorials 7 Verify the profile settings in the read-only screen. Click Save to save and go to the next screen. Figure 16 Profile: Confirm Save 8 Click Activate Now to use the new profile immediately. Otherwise, click the Activate Later button. If you clicked Activate Later, you can select the profile from the list in the Profile screen and click Connect to activate it. Note: Only one profile can be activated and used at any given time.
Chapter 2 Tutorials 2.3 Configuring the MAC Address Filter Thomas noticed that his daughter Josephine spends too much time surfing the web and downloading media files. He decided to prevent Josephine from accessing the Internet so that she can concentrate on preparing for her final exams. Josephine’s computer connects wirelessly to the Internet through the P-870HN51D. Thomas decides to use the Security > MAC Filter screen to grant wireless network access to his computer but not to Josephine’s computer.
Chapter 2 Tutorials Thomas can also grant access to the computers of other members of his family and friends. However, Josephine and others not listed in this screen will no longer be able to access the Internet through the P-870HN-51D. 2.4 Setting Up NAT Port Forwarding Thomas recently received an Xbox 360 as his birthday gift. His friends invited him to play online games with them on Xbox LIVE.
Chapter 2 Tutorials 2 Configure the screen as follows to open TCP/UDP port 53 for Xbox 360. Click Apply. 3 Repeat steps 2 and 3 to open the rest of the ports for Xbox 360. Use a different service name for each port you want to add The port forwarding settings you configured are listed in the Port Forwarding screen. Thomas can then connect his Xbox 360 to the Internet and play online games with his friends. 2.
Chapter 2 Tutorials 870HN-51D’s WAN IP address changes dynamically. Dynamic DNS (DDNS) allows you to access the P-870HN-51D using a domain name. http://zyxelrouter.dyndns.org A w.x.y.z a.b.c.d To use this feature, you have to apply for DDNS service at www.dyndns.org. This tutorial shows you how to: • Registering a DDNS Account on www.dyndns.org • Configuring DDNS on Your P-870HN-51D • Testing the DDNS Setting Note: If you have a private WAN IP address, then you cannot use DDNS. 2.5.
Chapter 2 Tutorials 2 Configure the following settings in the Advanced > Dynamic DNS screen. 2a Select WWW.DynDNS.ORG for the Service Provider. 2b Type zyxelrouter.dyndns.org in the Host Name field. 2c Select interface for which the DDNS applies. 2d Enter the user name (UserName1) and password (12345). 2e Click Apply. 2.5.3 Testing the DDNS Setting Now you should be able to access the P-870HN-51D from the Internet. To test this: 1 Open a web browser on the computer (using the IP address a.b.c.
Chapter 2 Tutorials In the following figure, router R is connected to the P-870HN-51D’s LAN. R connects to two networks, N1 (192.168.1.x/24) and N2 (192.168.10.x/24). If you want to send traffic from computer A (in N1 network) to computer B (in N2 network), the traffic is sent to the P-870HN-51D’s WAN default gateway by default. In this case, B will never receive the traffic.
Chapter 2 Tutorials This tutorial uses the following example IP settings: Table 2 IP Settings in this Tutorial DEVICE / COMPUTER IP ADDRESS The P-870HN-51D’s WAN 172.16.1.1 The P-870HN-51D’s LAN 192.168.1.1 A 192.168.1.34 R’s N1 192.168.1.253 R’s N2 192.168.10.2 B 192.168.10.33 To configure a static route to route traffic from N1 to N2: 1 Log into the P-870HN-51D’s Web Configurator in advanced mode. 2 Click Advanced > Static Route.
Chapter 2 Tutorials Now B should be able to receive traffic from A. You may need to additionally configure B’s firewall settings to allow specific traffic to pass through. 2.7 Configuring QoS Queue and Class Setup This section contains tutorials on how you can configure the QoS screen. Let’s say you are a team leader of a small sales branch office. You want to prioritize e-mail traffic because your task includes sending urgent updates to clients at least twice every hour.
Chapter 2 Tutorials 1 Click Advanced > QoS > General and check Active. Set your WAN Managed Upstream Bandwidth to 10,000 kbps (or leave this blank to have the P-870HN51D automatically determine this figure). Tutorial: Advanced > QoS 2 Go to Advanced > QoS > Queue Setup. Click Add to create a new queue.
Chapter 2 Tutorials 3 Go to Advanced > QoS > Class Setup. Click Add to create a new class. Check Active and follow the settings as shown in the screen below. Tutorial: Advanced > QoS > Class Setup Class Name Give a class name to this traffic, such as E-mail in this example. To Queue Link this to an item in the Advanced > QoS > Queue Setup screen, which is the E-mail queue created in this example. From Interface This is the interface from which the traffic will be coming from. Select Local.
Chapter 2 Tutorials MAC Address Type the MAC address of your computer AA:FF:AA:FF:AA:FF. Type the MAC Mask if you know it. IP Address Type the IP address of your computer 192.168.1.23. Type the IP Subnet Mask if you know it. This maps e-mail traffic coming from port 25 to the highest priority, which you have created in the previous screen (see the IP Protocol field). This also maps your computer’s IP address and MAC address to the E-mail queue (see the Source fields).
CHAPTER 3 Introducing the Web Configurator 3.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy device setup and management via Internet browser. Use Internet Explorer 6.0 and later versions or Mozilla Firefox 3.6 and later versions. The recommended screen resolution is 1024 by 768 pixels. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 3 Introducing the Web Configurator 4 A password screen displays. Enter the default admin user name admin and default admin password 1234. The password displays in non-readable characters. If you have changed the password, enter your password and click OK. Click Cancel to revert to the default password in the password field. Figure 18 Password Screen 3.
Chapter 3 Introducing the Web Configurator As illustrated above, the main screen is divided into these parts: • A - navigation panel • B - main window • C - status bar 3.2.1 Navigation Panel Use the menu items on the navigation panel to open screens to configure P870HN-51D features. The following tables describe each menu item. Table 3 Navigation Panel Summary LINK TAB Status FUNCTION This screen shows the P-870HN-51D’s general device and network status information.
Chapter 3 Introducing the Web Configurator Table 3 Navigation Panel Summary LINK Certificate TAB FUNCTION Local Certificates Use this screen to view a summary list of certificates and manage certificates and certification requests. Trusted CA Use this screen to view and manage the list of the trusted CAs. Advanced Static Route IP Static Route Use this screen to configure IP static routes to tell your device about networks beyond the directly connected remote nodes.
Chapter 3 Introducing the Web Configurator Table 3 Navigation Panel Summary LINK TAB FUNCTION Diagnostic General Use this screen to test the connections to other devices. 802.1ag Use this screen to configure CFM (Connectivity Fault Management) MD (maintenance domain) and MA (maintenance association), perform connectivity tests and view test reports. 3.2.2 Main Window The main window displays information and configuration fields. It is discussed in the rest of this document.
Chapter 3 Introducing the Web Configurator 52 P-870HN-51D User’s Guide
P ART II Technical Reference 53
CHAPTER 4 Status Screens 4.1 Overview Use the Status screens to look at the current status of the device, system resources and interfaces (LAN, WAN and WLAN). The Status screen also provides detailed information from DHCP and statistics from traffic. 4.2 Status Screen Click Status to open this screen.
Chapter 4 Status Screens Each field is described in the following table. Table 4 Status Screen LABEL DESCRIPTION Refresh Interval Enter how often you want the P-870HN-51D to update this screen. Apply Click this to update this screen immediately. Device Information User Name This field displays the P-870HN-51D system name. It is used for identification. Click this to go to the screen where you can change it. Model Number This is the model name of your device.
Chapter 4 Status Screens Table 4 Status Screen LABEL WPS Status DESCRIPTION This field displays the status of WPS (Wi-Fi Protected Setup). Click this to go to the screen where you can change it. AP Information ESSID This is the descriptive name used to identify the P-870HN-51D in this wireless network. Click this to go to the screen where you can change it. Status This shows the current status of the wireless network.
Chapter 4 Status Screens Table 4 Status Screen LABEL DESCRIPTION Rate For the DSL interface, it displays the downstream and upstream transmission rate. For the LAN or Ethernet WAN interface, this displays the port speed and duplex setting. For the WLAN interface, it displays the maximum transmission rate. More Status WAN Service Statistics Click this link to view packet specific statistics of the WAN connection(s). See Section 4.2.1 on page 58.
Chapter 4 Status Screens The following table describes the labels in this screen. Table 5 Status > WAN Service Statistics LABEL DESCRIPTION Interface This shows the name of the WAN interface used by this connection. A default name ipoa0, pppoa1, atmx (where x starts from 0 and is the index number of ATM layer-2 interfaces using different VPI and/or VCI values) or ptm0 indicates the DSL port.
Chapter 4 Status Screens 4.2.2 Route Info Routing is based on the destination address only and the P-870HN-51D takes the shortest path to forward a packet. Click Status > Route Info to access this screen. Use this screen to view the internal routing table on the P-870HN-51D. Figure 22 Status > Route Info The following table describes the labels in this screen. Table 6 Status > Route Info LABEL DESCRIPTION Destination This indicates the destination IP address of this route.
Chapter 4 Status Screens Table 6 Status > Route Info (continued) LABEL DESCRIPTION Service This indicates the name of the service used to forward the route. Interface This indicates the name of the interface through which the route is forwarded. • • • • • • br0 indicates the LAN interface. ptm0 indicates the VDSL WAN interface using IPoE or in bridge mode. pppoa1 indicates the ADSL WAN interface using PPPoA. ipoa0 indicates the ADSL WAN interface using IPoA.
Chapter 4 Status Screens 4.2.4 VDSL Statistics Click Status > VDSL Statistics to open the following screen. Use this screen to check VDSL status and detailed performance data. Figure 24 Status > VDSL Statistics The following table describes the labels in this screen. Table 8 Status > VDSL Statistics 62 LABEL DESCRIPTION VDSL Training Status This shows whether the DSL port is connected (Showtime); idle (Idle); not connected; is negotiating a connection with a COE device (G.
Chapter 4 Status Screens Table 8 Status > VDSL Statistics (continued) LABEL DESCRIPTION VDSL Port Details These are the maximum Upstream and Downstream transfer rates for the ports that belong to this profile. Upstream traffic refers to traffic from the P-870HN-51D to the Central Organization Equipment (COE). Downstream traffic refers to traffic from the COE to the P-870HN-51D. Line Rate This indicates the maximum upstream/downstream net data rate currently attainable on this line.
Chapter 4 Status Screens Table 8 Status > VDSL Statistics (continued) 64 LABEL DESCRIPTION UAS This indicates the number of UnAvailable Seconds (UAS) since the last reset. LOS This indicates the number of Loss of Signal (LOS) failures since the last reset. LOF This indicates the number of Loss of Framing (LOF) failures since the last reset. Latest 15 minutes time This indicates VDSL performance information recorded since the last 15 minute time segment.
Chapter 4 Status Screens Table 8 Status > VDSL Statistics (continued) LABEL DESCRIPTION ES This indicates the number of port endpoint errored seconds (ESs) since the last 1-day period. SES This indicates the number of port endpoint severely errored seconds (SESs) since the last 1-day period. UAS This indicates the number of UnAvailable Seconds (UAS) since the last 1day period. LOS This indicates the number of Loss of Signal (LOS) failures since the last 1-day period.
Chapter 4 Status Screens 4.2.5 LAN Statistics Click Status > LAN Statistics to access this screen. Use this screen to view the LAN statistics. Figure 25 Status > LAN Statistics The following table describes the labels in this screen. Table 9 Status > LAN Statistics LABEL DESCRIPTION Interface This shows the LAN or WLAN interface. Received Bytes This indicates the number of bytes received on this interface. Pkts This indicates the number of transmitted packets on this interface.
Chapter 4 Status Screens DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. Click Status > Client List to open the following screen. The read-only DHCP table shows current DHCP client information (including IP Address, Host Name and MAC Address) of all network clients using the P-870HN-51D’s DHCP server. Figure 26 Status > Client List The following table describes the labels in this screen.
Chapter 4 Status Screens 68 P-870HN-51D User’s Guide
CHAPTER 5 WAN Setup 5.1 Overview This chapter discusses the P-870HN-51D’s WAN screens. Use these screens to configure your P-870HN-51D for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks, such as a LAN (Local Area Network), and other networks, so that a computer in one location can communicate with computers in other locations. Figure 27 LAN and WAN LAN WAN See Section 5.
Chapter 5 WAN Setup Table 11 WAN Setup Overview LAYER-2 INTERFACE INTERNET CONNECTION CONNECTION INTERFACE MODE WAN SERVICE TYPE PTM PPPoE PPP user name and password, WAN IP address, DNS server and default gateway IPoE WAN IP address, NAT, DNS server and default gateway Bridging N/A Default Mode VLAN MUX Mode MSC Mode CONNECTION SETTINGS 5.2 What You Need to Know Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol.
Chapter 5 WAN Setup 5.3 Before You Begin You need to know your Internet access settings such as encapsulation and WAN IP address. Get this information from your ISP. 5.4 The Layer 2 Interface Screen The P-870HN-51D must have a layer-2 interface to allow users to use the DSL port to access the Internet. Figure 28 Layer 2 Interface The following table describes the fields in this screen. Table 12 Layer 2 Interface LABEL DESCRIPTION Interface This is the name of the interface.
Chapter 5 WAN Setup 5.4.1 Layer 2 Interface Configuration Click the Add button in the Layer 2 Interface screen to open the following screen. Use this screen to create a new layer-2 interface. At the time of writing, you can configure only one PTM layer-2 interface on the P-870HN-51D. Figure 29 Layer 2 Interface Configuration: DSL PTM WAN The following table describes the fields in this screen.
Chapter 5 WAN Setup 5.5 The Internet Connection Screen Use this screen to change your P-870HN-51D’s WAN settings. Click Network > WAN > Internet Connection. The summary table shows you the configured WAN services (connections) on the P-870HN-51D. To use NAT, firewall or IGMP proxy in the P-870HN-51D, you need to configure a WAN connection with PPPoE or IPoE. Note: When a layer-2 interface is in VLAN MUX Mode or MSC Mode, you can configure up to eight WAN services for each interface.
Chapter 5 WAN Setup Table 14 Internet Connection LABEL DESCRIPTION Vlan8021p This indicates the 802.1P priority level assigned to traffic sent through this connection. This displays N/A when there is no priority level assigned. VlanMuxId This indicates the VLAN ID number assigned to traffic sent through this connection. This displays N/A when there is no VLAN ID number assigned. ConnId This shows the index number of each connection.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 15 WAN Configuration: WAN Interface LABEL DESCRIPTION Select a layer 2 interface for this service Select a PTM interface to use the DSL port as the WAN port and use the VDSL technology for data transmission. Back Click this button to return to the previous screen. Next Click this button to continue. 5.5.1.2 Service Type Use this screen to configure how you want the P-870HN-51D to connect to the Internet.
Chapter 5 WAN Setup Table 16 WAN Configuration: Service Type LABEL DESCRIPTION Rate Limit Enter the maximum transmission rate in Kbps for traffic sent through the WAN connection. Otherwise, leave this field blank to disable the rate limit. This field is not available for an ATM connection. MTU [1-1500] Type the maximum size of each data packet, in bytes, that can move through this interface. If a larger packet arrives, the P-870HN-51D divides it into smaller fragments. Allowed values are 1 - 1500.
Chapter 5 WAN Setup PPPoE This screen displays when you select PPP over Ethernet (PPPoE) in the WAN Service Configuration screen. Figure 33 WAN Configuration: PPPoE The following table describes the labels in this screen. Table 17 WAN Configuration: PPPoE LABEL DESCRIPTION PPP User Name Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
Chapter 5 WAN Setup Table 17 WAN Configuration: PPPoE LABEL DESCRIPTION Authentication Method The P-870HN-51D supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms. Use the drop-down list box to select an authentication protocol for outgoing calls. Options are: AUTO - Your P-870HN-51D accepts either CHAP or PAP when requested by this remote node.
Chapter 5 WAN Setup Table 17 WAN Configuration: PPPoE LABEL DESCRIPTION Bridge PPPoE Frames Between WAN and Local Ports Select this option to forward PPPoE packets from the WAN port to the LAN ports and from the LAN ports to the WAN port. In addition to the P-870HN-51D's built-in PPPoE client, you can select this to allow up to ten hosts on the LAN to use PPPoE client software on their computers to connect to the ISP via the P-870HN-51D. Each host can have a separate account and a public WAN IP address.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 18 WAN Configuration: IPoE LABEL DESCRIPTION Obtain an IP address automatically A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Select this if you want to get a dynamic IP address from the ISP.
Chapter 5 WAN Setup 5.5.1.4 NAT, IGMP Multicast and Firewall Activation The screen is available only when you select IP over Ethernet in the WAN Service Configuration screen. Figure 35 WAN Configuration: NAT, IGMP Multicast and Firewall Activation The following table describes the labels in this screen. Table 19 WAN Configuration: NAT, IGMP Multicast and Firewall Activation LABEL DESCRIPTION Enable NAT Select this option to enable NAT on the P-870HN-51D.
Chapter 5 WAN Setup 5.5.1.5 Default Gateway The screen is not available when you select Bridging in the WAN Service Configuration screen. Figure 36 WAN Configuration: Default Gateway The following table describes the labels in this screen. Table 20 WAN Configuration: Default Gateway: PPPoE, PPPoA, IPoE or IPoA LABEL DESCRIPTION Selected Default Gateway Interfaces Select a WAN interface through which you want to forward the traffic. Back Click this button to return to the previous screen.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 21 WAN Configuration: DNS Server LABEL DESCRIPTION Obtain DNS info from a WAN interface Select this to have the P-870HN-51D get the DNS server addresses from the ISP automatically. WAN Interface selected Select a WAN interface through which you want to obtain the DNS related information. Use the following Static DNS IP address Select this to have the P-870HN-51D use the DNS server addresses you configure manually.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 22 WAN Configuration: Configuration Summary LABEL DESCRIPTION Connection Type This is the encapsulation method used by this connection. Service Name This is the name of the service. Service Category This is the ATM traffic class. This field is blank for a PTM or Ethernet WAN conenction. IP Address This shows whether the WAN IP address is assigned by the ISP, manually configured or not configurable.
Chapter 5 WAN Setup PPP over Ethernet Point-to-Point Protocol over Ethernet (PPPoE) provides access control and billing functionality in a manner similar to dial-up services using PPP. PPPoE is an IETF standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example RADIUS).
Chapter 5 WAN Setup packets sent to IP address 2 and port B and forwards them to IP address 1, port A. Figure 39 Full Cone NAT Example 1, A 2, B Symmetric NAT The full, restricted and port restricted cone NAT types use the same mapping for an outgoing packet’s source address regardless of the destination IP address and port. In symmetric NAT, the mapping of an outgoing packet’s source address to a source address in another network is different for each different destination IP address and port.
Chapter 5 WAN Setup the example, only 3, C is allowed to send packets to 2, B and only 4, D is allowed to send packets to 2, M. Figure 40 Symmetric NAT 3, C 2, B 4, D 1, A 2, M 4, E 5, B Introduction to VLANs A Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks. Devices on a logical network belong to one group. A device can belong to more than one group.
Chapter 5 WAN Setup contains two bytes of TPID (Tag Protocol Identifier), residing within the type/ length field of the Ethernet frame) and two bytes of TCI (Tag Control Information), starts after the source address field of the Ethernet frame). The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches. If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port.
Chapter 5 WAN Setup 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The P-870HN-51D can get the DNS server addresses in the following ways. 1 The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, manually enter them in the DNS server fields.
Chapter 5 WAN Setup 90 P-870HN-51D User’s Guide
CHAPTER 6 LAN Setup 6.1 Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually located in one immediate area such as a building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses. LAN • See Section 6.4 on page 95 for more information on LANs. • See Appendix E on page 321 for more information on IP addresses and subnetting. 6.1.
Chapter 6 LAN Setup 6.2 What You Need To Know IP Address Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number. This is known as an Internet Protocol address. Subnet Mask The subnet mask specifies the network number portion of an IP address. Your P870HN-51D will compute the subnet mask automatically based on the IP address that you entered.
Chapter 6 LAN Setup DNS DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The DNS server addresses you enter when you set up DHCP are passed to the client machines along with the assigned IP address and subnet mask. 6.3 The LAN IP Screen Click Network > LAN to open the IP screen. See Section 6.4 on page 95 for background information.
Chapter 6 LAN Setup The following table describes the fields in this screen. Table 23 LAN > IP LABEL DESCRIPTION LAN TCP/IP Group Name Select the interface group for which you want to configure the LAN TCP/IP settings. See Chapter 19 on page 213 for how to create a new interface group. IP Address Enter the LAN IP address you want to assign to your P-870HN-51D in dotted decimal notation, for example, 192.168.1.1 (factory default).
Chapter 6 LAN Setup Table 23 LAN > IP LABEL DESCRIPTION Blocking Mode Select this to have the P-870HN-51D block all unknown multicast packets from the WAN. Enable IP Alias Select the check box to configure another LAN network for the P870HN-51D. IP Address Enter the IP address of your P-870HN-51D in dotted decimal notation. IP Subnet Mask Type the subnet mask of your network in dotted decimal notation, for example 255.255.255.0 (factory default).
Chapter 6 LAN Setup IP Pool Setup The P-870HN-51D is pre-configured with a pool of IP addresses for the DHCP clients (DHCP Pool). See the product specifications in the appendices. Do not assign static IP addresses from the DHCP pool to your LAN computers. LAN TCP/IP The P-870HN-51D has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.
Chapter 6 LAN Setup Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: • 10.0.0.0 • 172.16.0.0 — 10.255.255.255 — 172.31.255.255 • 192.168.0.0 — 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks.
Chapter 6 LAN Setup IP Alias IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface. The P-870HN-51D supports three logical LAN interfaces via its single physical Ethernet interface with the P-870HN-51D itself as the gateway for each LAN network. When you use IP alias, you can also configure firewall rules to control access between the LAN's logical networks (subnets). Note: Make sure that the subnets of the logical networks do not overlap.
CHAPTER 7 Wireless LAN 7.1 Overview This chapter describes how to perform tasks related to setting up and optimizing your wireless network, including the following. • Turning the wireless connection on or off. • Configuring a name, wireless channel and security for the network. • Using WiFi Protected Setup (WPS) to configure your wireless network. • Using a MAC (Media Access Control) address filter to restrict access to the wireless network.
Chapter 7 Wireless LAN • The Advanced Setup screen lets you change the wireless mode, and make other advanced wireless configuration changes (Section 7.8 on page 116). You don’t necessarily need to use all these screens to set up your wireless connection. For example, you may just want to set up a network name, a wireless radio channel and some security in the General screen. 7.2 What You Need to Know Wireless Basics “Wireless” is essentially radio communication.
Chapter 7 Wireless LAN Radio Channels In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use. For the purposes of wireless networking, these bands are divided into numerous channels. This allows a variety of networks to exist in the same place without interfering with one another. When you create a network, you must select a channel to use. Since the available unlicensed spectrum varies from one country to another, the number of available channels also varies.
Chapter 7 Wireless LAN (which you know was made in 1971) you could use “70dodchal71vanpoi” as your security key. Signal Problems Because wireless networks are radio networks, their signals are subject to limitations of distance, interference and absorption. Problems with distance occur when the two radios are too far apart. Problems with interference occur when other radio waves interrupt the data signal.
Chapter 7 Wireless LAN Click Network > Wireless LAN to open the General screen. Figure 44 Network > Wireless LAN > General The following table describes the labels in this screen. Table 24 Network > Wireless LAN > General LABEL DESCRIPTION Active Wireless LAN Click the check box to activate wireless LAN. Channel Selection Set the operating frequency/channel depending on your particular region.
Chapter 7 Wireless LAN Table 24 Network > Wireless LAN > General LABEL DESCRIPTION Bandwidth Select whether the P-870HN-51D uses a wireless channel width of 20MHz or 40MHz. A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300 Mbps. 40MHz (channel bonding or dual channel) bonds two adjacent radio channels to increase throughput. The wireless clients must also support 40 MHz.
Chapter 7 Wireless LAN Note: If you do not enable any wireless security on your P-870HN-51D, your network is accessible to any wireless networking device that is within range. Figure 45 Wireless LAN > General: No Security The following table describes the labels in this screen. Table 25 Wireless LAN > General: No Security LABEL DESCRIPTION Security Mode Choose No Security from the drop-down list box.
Chapter 7 Wireless LAN 7.4.2 WEP Encryption In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen. Select WEP from the Security Mode list. Figure 46 Wireless LAN > General: Static WEP Encryption The following table describes the wireless LAN security labels in this screen. Table 26 Network > Wireless LAN > General: Static WEP Encryption 106 LABEL DESCRIPTION Security Mode Choose WEP from the drop-down list box.
Chapter 7 Wireless LAN Table 26 Network > Wireless LAN > General: Static WEP Encryption LABEL DESCRIPTION WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. Select 64-bit or 128-bit to enable data encryption. Key 1 to Key 4 The WEP key is used to secure your data from eavesdropping by unauthorized wireless users.
Chapter 7 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 27 Wireless LAN > General: WPA(2)-PSK LABEL DESCRIPTION Auto Generate Key This field is only available for WPA-PSK and WPA2-PSK. Select this option to have the P-870HN-51D automatically generate an SSID and pre-shared key. The SSID and Pre-Shared Key fields will not be configurable when you select this option. Security Mode Choose WPA-PSK or WPA2-PSK from the drop-down list box.
Chapter 7 Wireless LAN Note: If you select WPA or WPA2 in the Wireless LAN > General screen, the WDS and WPS features are not available on the P-870HN-51D. Figure 48 Wireless LAN > General: WPA(2) The following table describes the wireless LAN security labels in this screen. Table 28 Wireless LAN > General: WPA(2) LABEL DESCRIPTION Security Mode Choose WPA or WPA2 from the drop-down list box. Active Compatible This field is only available for WPA2.
Chapter 7 Wireless LAN Table 28 Wireless LAN > General: WPA(2) LABEL DESCRIPTION ReKey Method Select Time to change encryption keys automatically using the time interval specified in the Group Key Update Timer field. If no value is entered in the said field, this feature is disabled. Select None if you do not want to use this feature. Authentication Server IP Address Enter the IP address of the external authentication server in dotted decimal notation.
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 29 Wireless LAN > MAC Filter LABEL MAC Restrict Mode DESCRIPTION Define the filter action for the list of MAC addresses in the table below. Select Disabled to turn off MAC address filtering. Select Allow to permit access to the P-870HN-51D, MAC addresses not listed will be denied access to the P-870HN-51D.
Chapter 7 Wireless LAN 7.5 The More AP Screen This screen allows you to enable and configure multiple wireless networks on the P-870HN-51D. Click Network > Wireless LAN > More AP. The following screen displays. Figure 51 Network > Wireless LAN > More AP The following table describes the labels in this screen. Table 31 Network > Wireless LAN > More AP LABEL DESCRIPTION # This is the index number of each SSID profile. Active Select the check box to activate an SSID profile.
Chapter 7 Wireless LAN 7.5.1 More AP Edit Use this screen to edit an SSID profile. Click the Edit icon next to an SSID in the More AP screen. The following screen displays. Figure 52 Network > Wireless LAN > More AP: Edit See Section 7.4 on page 102 for more details about the fields in this screen. 7.6 The WPS Screen Use this screen to configure WiFi Protected Setup (WPS) on your P-870HN-51D.
Chapter 7 Wireless LAN Click Network > Wireless LAN >WPS. The following screen displays. Figure 53 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 32 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select the check box to activate WPS on the P-870HN-51D. PIN Number This shows the PIN (Personal Identification Number) of the P-870HN51D. Enter this PIN in the configuration utility of the device you want to connect to using WPS.
Chapter 7 Wireless LAN 7.7 The WPS Station Screen Use this screen to set up a WPS wireless network using either Push Button Configuration (PBC) or PIN Configuration. Note: If you select No Security in the Wireless LAN > General screen and click Push Button in the WPS Station screen, the P-870HN-51D automatically changes to use WPA-PSK/WPA2-PSK mixed mode and generates a preshared key. Click Network > Wireless LAN > WPS Station. The following screen displays.
Chapter 7 Wireless LAN 7.8 The Advanced Setup Screen To configure advanced wireless settings, click Network > Wireless LAN > Advanced Setup. The screen appears as shown. Figure 55 Wireless LAN > Advanced Setup The following table describes the labels in this screen. Table 34 Wireless LAN > Advanced Setup LABEL DESCRIPTION 802.11 Mode Select 802.11b Only to only allow IEEE 802.11b compliant WLAN devices to associate with the P-870HN-51D. Select 802.11g Only to allow IEEE 802.
Chapter 7 Wireless LAN Table 34 Wireless LAN > Advanced Setup LABEL DESCRIPTION Number of Wireless Stations Allowed Specify the maximum number (from 1 to 64) of the wireless stations that may connect to the P-870HN-51D. Output Power Set the output power of the P-870HN-51D. If there is a high density of APs in an area, decrease the output power to reduce interference with other APs. Select one of the following 20%, 40%, 60%, 80% or 100%. 802.
Chapter 7 Wireless LAN 7.9.1 Wireless Network Overview The following figure provides an example of a wireless network. Figure 56 Example of a Wireless Network AP A B The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your P-870HN-51D is the AP. Every wireless network must follow these basic guidelines.
Chapter 7 Wireless LAN 7.9.2 Additional Wireless Terms The following table describes some wireless network terms and acronyms used in the P-870HN-51D’s Web Configurator. Table 35 Additional Wireless Terms TERM DESCRIPTION RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not aware of each other’s presence. This may cause them to send information to the AP at the same time and result in information colliding and not getting through.
Chapter 7 Wireless LAN characters2; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each device in the wireless network, see the device’s User’s Guide or other documentation. You can use the MAC address filter to tell the P-870HN-51D which devices are allowed or not allowed to use the wireless network. If a device is allowed to use the wireless network, it still has to have the correct information (SSID, channel, and security).
Chapter 7 Wireless LAN The types of encryption you can choose depend on the type of authentication. (See Section 7.9.3.3 on page 120 for information about this.) Table 36 Types of Encryption for Each Type of Authentication NO AUTHENTICATION RADIUS SERVER Weakest No Security Static WEP WPA-PSK WPA Stronges t WPA2-PSK WPA2 For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2.
Chapter 7 Wireless LAN between two devices. Both devices must support WPS (check each device’s documentation to make sure). Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated.
Chapter 7 Wireless LAN Use the PIN method instead of the push-button configuration (PBC) method if you want to ensure that the connection is established between the devices you specify, not just the first two devices to activate WPS in range of each other. However, you need to log into the configuration interfaces of both devices to use the PIN method.
Chapter 7 Wireless LAN The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 57 Example WPS Process: PIN Method ENROLLEE REGISTRAR WPS This device’s WPS PIN: 123456 WPS Enter WPS PIN from other device: WPS START WPS START WITHIN 2 MINUTES SECURE EAP TUNNEL SSID WPA(2)-PSK COMMUNICATION 7.9.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role.
Chapter 7 Wireless LAN The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 58 How WPS works ACTIVATE WPS ACTIVATE WPS WITHIN 2 MINUTES WPS HANDSHAKE REGISTRAR ENROLLEE SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes). The next time you use WPS, a different device can be the registrar if necessary.
Chapter 7 Wireless LAN 7.9.4.4 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee. The registrar randomly generates the security information to set up the network, since it is unconfigured and has no existing information.
Chapter 7 Wireless LAN point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 61 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 E N TIO EC N ON GC N I T XIS AP1 REGISTRAR CLIENT 2 SE CU RIT Y ENROLLEE INF O AP2 7.9.4.5 Limitations of WPS WPS has some limitations of which you should be aware. • WPS works in Infrastructure networks only (where an AP and a wireless client communicate).
Chapter 7 Wireless LAN • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a possible way for a hacker to gain access to a network. You can easily check to see if this has happened.
CHAPTER 8 Network Address Translation (NAT) 8.1 Overview This chapter discusses how to configure NAT on the P-870HN-51D. Network Address Translation (NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network. 8.1.
Chapter 8 Network Address Translation (NAT) Port Forwarding A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though NAT makes your whole inside network appear as a single computer to the outside world. 8.3 The Port Forwarding Screen This summary screen provides a summary of all port forwarding rules and their configuration.
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 37 NAT Port Forwarding LABEL DESCRIPTION Service Name Select a pre-defined service from the drop-down list box. The predefined service port number(s) and protocol will display in the External port, Internal port and Protocol fields. Otherwise, select User Define to open the Rule Setup screen where you can manually enter the port number(s) and select the IP protocol.
Chapter 8 Network Address Translation (NAT) Table 37 NAT Port Forwarding (continued) LABEL DESCRIPTION Internal Start Port This is the first internal port number that identifies a service. Internal End Port This is the last internal port number that identifies a service. Server IP Address This field displays the inside IP address of the server. Modify Click the Edit icon to go to the screen where you can edit the port forwarding rule.
Chapter 8 Network Address Translation (NAT) Table 38 Port Forwarding Edit (continued) LABEL DESCRIPTION External Start Port Enter the original destination port for the packets. To forward only one port, enter the port number again in the External End Port field. To forward a series of ports, enter the start port number here and the end port number in the External End Port field. External End Port Enter the last port of the original destination port range.
Chapter 8 Network Address Translation (NAT) another computer on the LAN can use the service in the same manner. This way you do not need to configure a new IP address each time you want a different LAN computer to use the application. For example: Figure 64 Trigger Port Forwarding Process: Example Jane’s Computer Real Audio Server 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the P-870HN-51D to record Jane’s computer IP address.
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 39 NAT Trigger Port LABEL DESCRIPTION Service Name Select a pre-defined service from the drop-down list box. The predefined service port number(s) and protocol will display in the Trigger port, Open port and Protocol fields. Otherwise, select User Define to open the Rule Setup screen where you can manually enter the port number(s) and select the transport layer protocol.
Chapter 8 Network Address Translation (NAT) Table 39 NAT Trigger Port (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the P-870HN-51D. Cancel Click Cancel to return to the previous configuration. 8.4.1 Trigger Port Configuration This screen lets you create new port triggering rules. Click the Add icon in the NAT - Trigger Port screen to open the following screen. Figure 66 NAT > Trigger Port > Add The following table describes the labels in this screen.
Chapter 8 Network Address Translation (NAT) Table 40 NAT > Port Triggering > Add LABEL DESCRIPTION Open Start Port The open port is a port (or a range of ports) that a server on the WAN uses when it sends out a particular service. The P-870HN-51D forwards the traffic with this port (or range of ports) to the client computer on the LAN that requested the service. Type a port number or the starting port number in a range of port numbers.
Chapter 8 Network Address Translation (NAT) 8.6 The ALG Screen Some NAT routers may include a SIP Application Layer Gateway (ALG). A SIP ALG allows SIP calls to pass through NAT by examining and translating IP addresses embedded in the data stream. The SIP ALG translates the P-870HN-51D’s private IP address inside the SIP data stream to a public IP address. You do not need to use STUN or an outbound proxy if you enable the SIP ALG. Use this screen to enable or disable the SIP (VoIP) ALG in the P-870HN-51D.
Chapter 8 Network Address Translation (NAT) Port Forwarding: Services and Port Numbers The most often used port numbers are shown in the following table. Please refer to RFC 1700 for further information about port numbers. Please also refer to the Supporting CD for more examples and details on port forwarding and NAT.
Chapter 8 Network Address Translation (NAT) 140 P-870HN-51D User’s Guide
CHAPTER 9 Firewall 9.1 Overview This chapter shows you how to enable and configure the P-870HN-51D firewall settings. The P-870HN-51D firewall is a packet filtering firewall and restricts access based on the source/destination computer network address of a packet and the type of application. 9.1.1 What You Can Do in this Chapter The Incoming screen lets you view and configure incoming IP filtering rules (Section 9.3 on page 142). 9.
Chapter 9 Firewall Some of the most common IP ports are: Table 44 Common IP Ports 21 FTP 53 DNS 23 Telnet 80 HTTP 25 SMTP 110 POP3 Default Filtering Policies Filtering rules are grouped based on the direction of travel of packets to which they apply. The default rule for incoming traffic blocks all incoming connections from the WAN to the LAN. If you wish to allow certain WAN users to have access to your LAN, you will need to create custom rules to allow it.
Chapter 9 Firewall The following table describes the labels in this screen. Table 45 Firewall > Incoming LABEL DESCRIPTION Active Firewall Select this check box to enable the firewall on the P-870HN-51D. When the firewall is enabled, the P-870HN-51D blocks all incoming traffic from the WAN to the LAN. Create custome rules below to allow certain WAN users to access your LAN or to allow traffic from the WAN to a certain computer on the LAN. Active Select this check box to enable the rule.
Chapter 9 Firewall 9.3.1 Creating Incoming Firewall Rules In the Incoming screen, click Add to display this screen and refer to the following table for information on the labels. Figure 71 Firewall > Incoming: Add The following table describes the labels in this screen. Table 46 Firewall > Incoming: Add LABEL DESCRIPTION Active Select this check box to enable the rule. Filter Name Enter a descriptive name of up to 16 printable English keyboard characters, including spaces.
Chapter 9 Firewall Table 46 Firewall > Incoming: Add (continued) LABEL DESCRIPTION Interface Select Select All to apply the rule to all interfaces on the P-870HN51D or select the specific WAN interface(s) to which this rule applies. Back Click Back to return to the previous screen. Apply Click Apply to save your customized settings and exit this screen.
Chapter 9 Firewall 146 P-870HN-51D User’s Guide
CHAPTER 10 Certificate 10.1 Overview The P-870HN-51D can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. 10.1.1 What You Can Do in this Chapter • The Local Certificates screen lets you generate certification requests and import the P-870HN-51D's CA-signed certificates (Section 10.
Chapter 10 Certificate 10.3 The Local Certificates Screen Click Security > Certificates to open the Local Certificates screen. This is the P-870HN-51D’s summary list of certificates and certification requests. Figure 72 Local Certificates The following table describes the labels in this screen. Table 47 Local Certificates LABEL DESCRIPTION Name This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name.
Chapter 10 Certificate Table 47 Local Certificates (continued) LABEL DESCRIPTION Create Certificate Request Click this button to go to the screen where you can have the P-870HN51D generate a certification request. Import Certificate Click this button to open a screen where you can save the certificate that you have enrolled from a certification authority from your computer to the P-870HN-51D. 10.3.
Chapter 10 Certificate Table 48 Create Certificate Request (continued) LABEL DESCRIPTION Back Click Back to return to the previous screen. Apply Click Apply to begin certificate or certification request generation. After you click Apply, the Certificate Request Details screen displays. Click Load Signed Certificate to import a certificate signed by the CA to replace the request (see Section 10.3.4 on page 153). Otherwise, click Back to return to the Local Certificates screen. See Section 10.3.
Chapter 10 Certificate Note: You must remove any spaces from the certificate’s filename before you can import it. Figure 75 Import Local Certificate The following table describes the labels in this screen. Table 49 Import Local Certificate LABEL DESCRIPTION Certificate Name Type up to 31 ASCII characters (not including spaces) to identify this certificate. Certificate Copy and paste the certificate into the text box to store it on the P-870HN51D.
Chapter 10 Certificate 10.3.3 Certificate Details Click Security > Certificates > Local Certificates to open the My Certificates screen (see Figure 72 on page 148). Click the View icon to open the Certificate Details screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 76 Certificate Details The following table describes the labels in this screen.
Chapter 10 Certificate Table 50 Certificate Details (continued) LABEL DESCRIPTION Subject This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organization (O), State (ST) and Country (C). Certificate This read-only text box displays the certificate in Privacy Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the binary certificate into a printable form. This displays null in a certification request.
Chapter 10 Certificate Figure 77 Load Certificate The following table describes the labels in this screen. Table 51 Load Certificate LABEL DESCRIPTION Certificate Name This field is read-only and displays the identifying name of this certificate. Certificate Copy and paste the certificate into the text box to store it on the P-870HN51D. Back Click Back to return to the previous screen. Apply Click Apply to save the certificate on the P-870HN-51D. 10.
Chapter 10 Certificate list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities. Figure 78 Trusted CA The following table describes the fields in this screen. Table 52 Trusted CA LABEL DESCRIPTION Name This field displays the name used to identify this certificate.
Chapter 10 Certificate 10.4.1 View Trusted CA Certificate Click the View button in the Trusted CA screen to open the following screen. Use this screen to view in-depth information about the certification authority’s certificate. Figure 79 Trusted CA: View The following table describes the fields in this screen. Table 53 Trusted CA: View LABEL DESCRIPTION Name This field displays the identifying name of this certificate. Type This field displays general information about the certificate.
Chapter 10 Certificate 10.4.2 Import Trusted CA Certificate Click the Import Certificate button in the Trusted CA screen to open the following screen. The P-870HN-51D trusts any valid certificate signed by any of the imported trusted CA certificates. Figure 80 Trusted CA: Import Certificate The following table describes the fields in this screen. Table 54 Trusted CA: Import Certificate LABEL DESCRIPTION Certificate Name Enter the name that identifies this certificate.
Chapter 10 Certificate 158 P-870HN-51D User’s Guide
CHAPTER 11 Static Route 11.1 Overview The P-870HN-51D usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the P-870HN-51D send data to devices not reachable through the default gateway, use static routes. For example, the next figure shows a computer (A) connected to the P-870HN51D’s LAN interface. The P-870HN-51D routes most traffic from A to the Internet through the P-870HN-51D’s default gateway (R1).
Chapter 11 Static Route 11.2 The Static Route Screen Click Advanced > Static Route to open the Static Route screen. Figure 82 Advanced > Static Route The following table describes the labels in this screen. Table 55 Advanced > Static Route LABEL DESCRIPTION # This is the number of an individual static route. Active This field indicates whether the rule is active or not. Clear the check box to disable the rule. Select the check box to enable it.
Chapter 11 Static Route 11.2.1 Static Route Edit Click the Add button in the Static Route screen. Use this screen to configure the required information for a static route. Figure 83 Static Route: Add The following table describes the labels in this screen. Table 56 Static Route: Add LABEL DESCRIPTION Destination IP Address This parameter specifies the IP network address of the final destination. Routing is always based on network number.
Chapter 11 Static Route 162 P-870HN-51D User’s Guide
CHAPTER 12 Policy Forwarding 12.1 Overview Traditionally, routing is based on the destination address only and the P-870HN51D takes the shortest path to forward a packet. Policy forwarding allows the P870HN-51D to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator. Policy-based routing is applied to outgoing packets, prior to the normal routing.
Chapter 12 Policy Forwarding The following table describes the labels in this screen. Table 57 Advanced > Policy Forwarding LABEL DESCRIPTION Policy Name This is the name of the rule. SourceIP This is the source IP address. Protocol This is the transport layer protocol. SourcePort This is the source port number. SourceMAC This is the source MAC address. Interface This is the WAN interface through which the traffic is routed. Remove Click the icon to remove a rule from the P-870HN-51D.
Chapter 12 Policy Forwarding Table 58 Policy Forwarding: Add LABEL DESCRIPTION Back Click Back to return to the previous screen without saving. Apply Click Apply to save your changes back to the P-870HN-51D. Cancel Click Cancel to begin configuring this screen afresh.
Chapter 12 Policy Forwarding 166 P-870HN-51D User’s Guide
CHAPTER 13 RIP 13.1 Overview Routing Information Protocol (RIP, RFC 1058 and RFC 1389) allows a device to exchange routing information with other routers. 13.1.1 What You Can Do in this Chapter The RIP screen lets you set up RIP settings on the P-870HN-51D (Section 13.2 on page 167). 13.2 The RIP Screen Click Advanced > RIP to open the RIP screen.
Chapter 13 RIP The following table describes the labels in this screen. Table 59 Advanced > RIP LABEL DESCRIPTION Interface This is the name of the interface in which the RIP setting is used. Version The RIP version controls the format and the broadcasting method of the RIP packets that the P-870HN-51D sends (it recognizes both formats when receiving). RIP version 1 is universally supported but RIP version 2 carries more information.
CHAPTER 14 Quality of Service (QoS) 14.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested. This can cause a reduction in network performance and make the network inadequate for time-critical application such as video-ondemand.
Chapter 14 Quality of Service (QoS) • The Monitor screen lets you view the P-870HN-51D's QoS-related packet statistics (Section 14.7 on page 183). 14.2 What You Need to Know QoS versus CoS QoS is used to prioritize source-to-destination traffic flows. All packets in the same flow are given the same priority. CoS (class of service) is a way of managing traffic in a network by grouping similar types of traffic together and treating each type as a class.
Chapter 14 Quality of Service (QoS) Click Advanced > QoS to open the screen as shown next. Figure 87 QoS General The following table describes the labels in this screen. Table 60 QoS General LABEL DESCRIPTION Active QoS Select the check box to turn on QoS to improve your network performance. WAN Managed Upstream Bandwidth Enter the amount of upstream bandwidth for the WAN interface that you want to allocate using QoS.
Chapter 14 Quality of Service (QoS) Table 60 QoS General LABEL DESCRIPTION Upstream traffic priority will be automatically assigned by This field is ignored if traffic matches a class you previously configured in the Advanced > QoS > Class Setup screen. If traffic does not match a class configured in the Class Setup screen, the P-870HN-51D assigns priority to unmatched traffic based on what you select in this field: Ethernet Priority, IP Precedence and/or Packet Length. See Section 14.8.
Chapter 14 Quality of Service (QoS) Table 61 QoS Queue Setup LABEL DESCRIPTION Buffer Management This shows the queue management algorithm used for this queue. Rate Limit This shows the maximum transmission rate allowed for traffic on this queue. Modify Click the Edit icon to go to the screen where you can edit the queue. Queue management algorithms determine how the P-870HN-51D should handle packets when it receives too many (network congestion). Click the Remove icon to delete an existing queue.
Chapter 14 Quality of Service (QoS) Table 62 QoS Queue Setup: Add LABEL DESCRIPTION Weight Select the weight (from 1 to 8) of this queue. If two queues have the same priority level, the P-870HN-51D divides the bandwidth across the queues according to their weights. Queues with larger weights get more bandwidth than queues with smaller weights. Buffer Management This field displays Drop Tail (DT).
Chapter 14 Quality of Service (QoS) The following table describes the labels in this screen. Table 63 QoS Class Setup LABEL DESCRIPTION Add Click this button to create a new classifier. Order This field displays the index number of the classifier. Active Select the check box to enable the classifier. Class Name This is the name of the classifier.
Chapter 14 Quality of Service (QoS) 14.5.1 QoS Class Edit Click the Add button or the Edit icon in the Class Setup screen to configure a classifier.
Chapter 14 Quality of Service (QoS) The following table describes the labels in this screen. Table 64 QoS Class Configuration LABEL DESCRIPTION Class Configuration Enable Select to enable or disable this classifier. Class Name Enter a descriptive name of up to 20 printable English keyboard characters, including spaces. Classification Order Select an existing number for where you want to put this classifier to move the classifier to the number you selected after clicking Apply.
Chapter 14 Quality of Service (QoS) Table 64 QoS Class Configuration (continued) LABEL DESCRIPTION Ether Type Select a predefined application to configure a class for the matched traffic. If you select IP, you also need to configure source or destination MAC address, IP address, DHCP options, DSCP value or the protocol type. If you select 8021Q, you can configure an 802.1p priority level and VLAN ID in the Others section.
Chapter 14 Quality of Service (QoS) Table 64 QoS Class Configuration (continued) LABEL 802.1P DESCRIPTION This field is available only when you select 802.1Q in the Ether Type field. Select this option and select a priority level (between 0 and 7) from the drop down list box. "0" is the lowest priority level and "7" is the highest. VLAN ID This field is available only when you select 802.1Q in the Ether Type field. Select this option and specify a VLAN ID number between 1 and 4095.
Chapter 14 Quality of Service (QoS) 14.6 The Policer Setup Screen A policer is a QoS policy. Click QoS > Policer Setup to open the following screen. The P-870HN-51D can control ingress (or incoming) traffic by dropping packets that exceed the committed rate and/or committed burst size specified in this screen. Figure 92 QoS > Policer The following table describes the labels in this screen. Table 65 QoS > Policer Setup LABEL DESCRIPTION Add Click this button to create a new policy.
Chapter 14 Quality of Service (QoS) Table 65 QoS > Policer Setup (continued) LABEL DESCRIPTION Action Conforming Action - This shows the action that the P-870HN-51D applies to packets that conform to the meter type selected, and can be Pass, Drop or DSCP mark. Non Conforming Action - This shows the action that the P-870HN51D applies to packets that do not conform to the meter type selected, and can be Pass, Drop or DSCP mark. • • • Modify Pass - the packet is allowed to flow to its destination.
Chapter 14 Quality of Service (QoS) The following table describes the labels in this screen. Table 66 QoS > Policer Setup: Edit LABEL DESCRIPTION Enable Select this to have the P-870HN-51D pass, drop or mark packets Meter Type Select the method that the P-870HN-51D uses for determining which packets to pass, drop or mark (DSCP). Choices are: Simple Token Bucket, Single Rate Three Color Meter and Two Rate Three Color Meter. Refer to Section 14.8.2 on page 186 for information on these meter types.
Chapter 14 Quality of Service (QoS) 14.7 The QoS Monitor Screen To view the P-870HN-51D’s QoS packet statistics, click Advanced > QoS > Monitor. The screen appears as shown. Figure 94 QoS > Monitor The following table describes the labels in this screen. Table 67 QoS > Monitor LABEL DESCRIPTION Refresh Interval Enter how often you want the P-870HN-51D to update this screen. Select No Refresh to stop refreshing statistics. Interface Monitor No. This is the index number of the entry.
Chapter 14 Quality of Service (QoS) 14.8 Technical Reference The following section contains additional technical information about the P-870HN51D features described in this chapter. IEEE 802.1Q Tag The IEEE 802.1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges. A VLAN tag includes the 12-bit VLAN ID and 3-bit user priority.
Chapter 14 Quality of Service (QoS) service desired. This allows the intermediary DiffServ-compliant network devices to handle the packets differently depending on the code points without the need to negotiate paths or remember state information for every flow. In addition, applications do not have to request a particular service or give advanced notice of where the traffic is going.
Chapter 14 Quality of Service (QoS) Table 69 Internal Layer2 and Layer3 QoS Mapping LAYER 2 LAYER 3 PRIORITY QUEUE IEEE 802.1P USER PRIORITY (ETHERNET PRIORITY) TOS (IP PRECEDENCE) DSCP IP PACKET LENGTH (BYTE) 3 3 1 250~1100 001110 001100 001010 001000 4 4 2 010110 010100 010010 010000 5 5 3 011110 <250 011100 011010 011000 6 6 4 100110 100100 100010 100000 5 101110 101000 7 7 6 110000 7 111000 14.8.
Chapter 14 Quality of Service (QoS) refer to packet loss priority (PLP) levels. High PLP level is referred to as red, medium is referred to as yellow and low is referred to as green. The difference between the two meters is the types of parameters used to evaluate packets. SRTCM uses committed information rate (CIR), the committed burst size and the excess burst size. TRTCM uses peak information rate (PIR), CIR, peak burst size and a committed burst size.
Chapter 14 Quality of Service (QoS) 188 P-870HN-51D User’s Guide
CHAPTER 15 Dynamic DNS Setup 15.1 Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
Chapter 15 Dynamic DNS Setup 15.3 The Dynamic DNS Screen To change your P-870HN-51D’s DDNS, click Advanced > Dynamic DNS. The screen appears as shown. Figure 95 Advanced > Dynamic DNS The following table describes the fields in this screen. Table 70 Advanced > Dynamic DNS LABEL DESCRIPTION Service Provider Select the name of your Dynamic DNS service provider. Host Name Type the domain name assigned to your P-870HN-51D by your Dynamic DNS provider.
CHAPTER 16 Remote Management 16.1 Overview This chapter explains how to configure the remote management and access control settings on the P-870HN-51D. 16.1.1 What You Can Do in this Chapter • The TR-069 screen lets you configure the P-870HN-51D’s TR-069 autoconfiguration settings (Section 16.3 on page 193). • The TR-064 screen lets you enable management via TR-064 on the P-870HN51D (Section 16.3 on page 193).
Chapter 16 Remote Management Click Advanced > Remote MGMT to open the following screen. Use this screen to configure your P-870HN-51D to be managed by an ACS. Figure 96 TR-069 The following table describes the fields in this screen. Table 71 TR-069 192 LABEL DESCRIPTION Inform Select Enable to activate remote management via TR-069 on the WAN. Otherwise, select Disable. Inform Interval Enter the time interval (in seconds) at which the P-870HN-51D sends information to the auto-configuration server.
Chapter 16 Remote Management Table 71 TR-069 (continued) LABEL DESCRIPTION Connection Request Password Enter the connection request password. Connection Request URL This shows the connection request URL. Apply/Save Click this button to save your changes back to the P-870HN-51D. Cancel Click Cancel to begin configuring this screen afresh. When the ACS makes a connection request to the P-870HN-51D, this password is used to authenticate the ACS.
Chapter 16 Remote Management 16.4 The Service Control Screen Click Advanced > Remote MGMT > Service Control to open the following screen. Use this screen to decide what services you may use to access which P870HN-51D interface. Figure 98 Service Control The following table describes the fields in this screen. Table 73 Access Control: Services 194 LABEL DESCRIPTION Service Control Select Enable to turn on service control. Otherwise, select Disable. # This is the index number of the entry.
Chapter 16 Remote Management 16.5 The IP Address Screen Click Advanced > Remote MGMT > IP Address to open the following screen. Use this screen to specify the “trusted” computers from which an administrator may use a service to manage the P-870HN-51D. Figure 99 IP Address The following table describes the fields in this screen. Table 74 IP Address LABEL DESCRIPTION Access Control Mode Select Enable to activate the secured client list. Select Disable to disable the list without deleting it.
Chapter 16 Remote Management 16.5.1 Adding an IP Address Click the Add button in the IP Address screen to open the following screen. Figure 100 IP Address: Add The following table describes the fields in this screen. Table 75 IP Address: Add 196 LABEL DESCRIPTION IP Address Enter the IP address of the trusted computer from which you can manage the P-870HN-51D. Apply/Save Click this button to save your changes back to the P-870HN-51D.
CHAPTER 17 Universal Plug-and-Play (UPnP) 17.1 Overview Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use. 17.1.
Chapter 17 Universal Plug-and-Play (UPnP) Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments.
Chapter 17 Universal Plug-and-Play (UPnP) The following table describes the fields in this screen. Table 76 Advanced > UPnP LABEL DESCRIPTION Enable Universal Plug and Play (UPnP) Feature Select this check box to enable UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the P-870HN-51D's IP address (although you must still enter the password to access the web configurator). Apply/Save Click this to save the setting to the P-870HN-51D.
Chapter 17 Universal Plug-and-Play (UPnP) 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 103 Add/Remove Programs: Windows Setup: Communication: Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted. Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 200 1 Click Start and Control Panel.
Chapter 17 Universal Plug-and-Play (UPnP) 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components …. Figure 104 Network Connections 4 The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details.
Chapter 17 Universal Plug-and-Play (UPnP) 5 In the Networking Services window, select the Universal Plug and Play check box. Figure 106 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 17.5 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the P-870HN51D.
Chapter 17 Universal Plug-and-Play (UPnP) 2 Right-click the icon and select Properties. Figure 107 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 17 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 109 Internet Connection Properties: Advanced Settings Figure 110 Internet Connection Properties: Advanced Settings: Add 5 204 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
Chapter 17 Universal Plug-and-Play (UPnP) 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 111 System Tray Icon 7 Double-click on the icon to display your current Internet connection status. Figure 112 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the P-870HN-51D without finding out the IP address of the P-870HN-51D first.
Chapter 17 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 113 Network Connections 4 206 An icon with the description for each UPnP-enabled device displays under Local Network.
Chapter 17 Universal Plug-and-Play (UPnP) 5 Right-click on the icon for your P-870HN-51D and select Invoke. The web configurator login screen displays. Figure 114 Network Connections: My Network Places 6 Right-click on the icon for your P-870HN-51D and select Properties. A properties window displays with basic information about the P-870HN-51D.
Chapter 17 Universal Plug-and-Play (UPnP) 208 P-870HN-51D User’s Guide
CHAPTER 18 Parental Control 18.1 Overview Parental control allows you to block web sites with the specific URL. You can also define time periods and days during which the P-870HN-51D performs parental control on a specific user. 18.1.1 What You Can Do in this Chapter • The Time Restriction screen lets you give different time restrictions to each user of your network (Section 18.2 on page 209). • The URL Filter screen lets you restrict home network users from viewing inappropriate websites (Section 18.
Chapter 18 Parental Control The following table describes the fields in this screen. Table 77 Parental Control > Time Restriction LABEL DESCRIPTION # This shows the index number of the schedule. Active Select the check box to enable the schedule. username This shows the name of the user. MAC This shows the MAC address of the LAN user’s computer to which this schedule applies. Mon ~ Sun x indicates the day(s) on which parental control is enabled.
Chapter 18 Parental Control The following table describes the fields in this screen. Table 78 Time Restriction Configuration LABEL DESCRIPTION User Name Enter the name of the user. MAC Address Enter the MAC address of the LAN user’s computer to which this schedule applies. Days of the week Select check boxes for the days that you want the P-870HN-51D to perform parental control.
Chapter 18 Parental Control Table 79 Parental Control > URL Filter (continued) LABEL DESCRIPTION Active Select the check box to enable the filtering rule. Address This is the URL of the web site in this rule. Port This is the port number the web server uses to forward HTTP traffic. Modify Click the Edit icon to go to the screen where you can edit the rule. Click the Remove icon to delete an existing rule. Add Click Add to create a new rule.
CHAPTER 19 Interface Group 19.1 Overview By default, all LAN and WAN interfaces on the P-870HN-51D are in the same group and can communicate with each other. You can create multiple groups to have the P-870HN-51D assign the IP addresses in different domains to different groups. Each group acts as an independent network on the P-870HN-51D. 19.1.1 What You Can Do in this Chapter The Interface Group screen lets you create multiple networks on the P-870HN51D (Section 19.2 on page 213). 19.
Chapter 19 Interface Group In the following example, the client that sends packets with the source MAC address 00:19:cb:01:23:45 is assigned the IP address 192.168.2.2 and uses the WAN interface ptm0_2. Figure 120 Interface Grouping Application Default: ETH 2~4 192.168.1.x/24 ptm0_1 ptm0_2 192.168.2.x/24 G2:00:19:cb:01:23:45 Click Advanced Setup > Interface Group to open the following screen. Figure 121 Interface Group The following table describes the fields in this screen.
Chapter 19 Interface Group 19.2.1 Interface Group Configuration Click the Add button in the Interface Group screen to open the following screen. Use this screen to create a new interface group. Note: An interface can belong to a group only. Figure 122 Interface Group Configuration The following table describes the fields in this screen. Table 82 Interface Group Configuration LABEL DESCRIPTION Group Name Enter a name to identify this group.
Chapter 19 Interface Group Table 82 Interface Group Configuration (continued) LABEL DESCRIPTION Remove Click the Remove icon to delete this rule from the P-870HN-51D. Add Click this button to create a new rule. Back Click this button to return to the previous screen without saving any changes. Apply Click this button to save your settings back to the P-870HN-51D. 19.2.2 Interface Grouping Criteria Click the Add button in the Interface Grouping Configuration screen to open the following screen.
Chapter 19 Interface Group Table 83 Interface Grouping Criteria (continued) LABEL DUID Type DESCRIPTION Select DUID-LLT (DUID Based on Link-layer Address Plus Time) to enter the hardware type, a time value and the MAC address of the device. Select DUID-EN (DUID Assigned by Vendor Based upon Enterprise Number) to enter the vendor’s registered enterprise number. Select DUID-LL (DUID Based on Link-layer Address) to enter the device’s hardware type and hardware address (MAC address) in the following fields.
Chapter 19 Interface Group 218 P-870HN-51D User’s Guide
CHAPTER 20 System Settings 20.1 Overview This chapter shows you how to configure system related settings, such as system time, password, name, the domain name and the inactivity timeout interval. 20.1.1 What You Can Do in this Chapter • The General screen lets you configure system settings (Section 20.2 on page 219). • The Time Setting screen lets you set the system time (Section 20.3 on page 220). 20.2 The General Screen Use the General screen to configure system settings such as the system password.
Chapter 20 System Settings The following table describes the labels in this screen. Table 84 Maintenance > System > Genera LABEL DESCRIPTION UserName Type the user name you use to access the system. Old Password Type the default password or the existing password you use to access the system in this field. New Password Type your new system password (up to 30 characters). Note that as you type a password, the screen displays a (*) for each character you type.
Chapter 20 System Settings The following table describes the fields in this screen. Table 85 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time Current Time This field displays the time of your P-870HN-51D. Each time you reload this page, the P-870HN-51D synchronizes the time with the time server. Current Date This field displays the date of your P-870HN-51D. Each time you reload this page, the P-870HN-51D synchronizes the date with the time server.
Chapter 20 System Settings 222 P-870HN-51D User’s Guide
CHAPTER 21 Logs 21.1 Overview This chapter contains information about configuring general log settings and viewing the P-870HN-51D’s logs. The web configurator allows you to choose which categories of events and/or alerts to have the P-870HN-51D log and then display the logs or have the P870HN-51D send them to a syslog server. 21.1.1 What You Can Do in this Chapter • The View Log screen lets you see the logs for the categories that you selected in the Log Settings screen (Section 21.2 on page 223).
Chapter 21 Logs The log wraps around and deletes the old entries after it fills. Figure 126 Maintenance > Logs > View Log The following table describes the fields in this screen. Table 86 Maintenance > Logs > View Log LABEL DESCRIPTION Display Select a severity level of logs to view. The P-870HN-51D displays the logs with the severity level equal to or higher than what you selected. # This field is a sequential value and is not associated with a specific entry.
Chapter 21 Logs To change your P-870HN-51D’s log settings, click Maintenance > Logs > Log Settings. The screen appears as shown. Figure 127 Maintenance > Logs > Log Settings The following table describes the fields in this screen. Table 87 Maintenance > Logs > Log Settings LABEL DESCRIPTION Active Select to enable or disable system logging. Log Level Select the severity level of the logs that you want the P-870HN-51D to display, record and send to the log server.
Chapter 21 Logs 226 P-870HN-51D User’s Guide
CHAPTER 22 Tools Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE your P-870HN-51D. 22.1 Overview This chapter explains how to upload new firmware, manage configuration files and restart your P-870HN-51D. Use the instructions in this chapter to change the device’s configuration file or upgrade its firmware. After you configure your device, you can backup the configuration file to a computer.
Chapter 22 Tools 22.2 The Firmware Screen Click Maintenance > Tools to open the Firmware screen. Follow the instructions in this screen to upload firmware to your P-870HN-51D. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Do NOT turn off the P-870HN-51D while firmware upload is in progress! Figure 128 Maintenance > Tools > Firmware The following table describes the labels in this screen.
Chapter 22 Tools After you see the Firmware Upload in Progress screen, wait two minutes before logging into the P-870HN-51D again. Figure 129 Firmware Upload In Progress The P-870HN-51D automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 130 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen.
Chapter 22 Tools 22.3 The Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next. Figure 132 Maintenance > Tools > Configuration Backup Configuration Backup Configuration allows you to back up (save) the P-870HN-51D’s current configuration to a file on your computer.
Chapter 22 Tools Table 89 Restore Configuration LABEL DESCRIPTION Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them. Upload Click Upload to begin the upload process. Do not turn off the P-870HN-51D while configuration file upload is in progress. After you see a “restore configuration successful” screen, you must then wait one minute before logging into the P-870HN-51D again.
Chapter 22 Tools If the upload was not successful, the following screen will appear. Click Tools > Configuration to go back to the Configuration screen. Figure 135 Configuration Upload Error Reset to Factory Defaults Click the Reset button to clear all user-entered configuration information and return the P-870HN-51D to its factory defaults. The following warning screen appears.
Chapter 22 Tools Click Maintenance > Tools > Restart. Click Restart to have the P-870HN-51D reboot. This does not affect the P-870HN-51D's configuration.
Chapter 22 Tools 234 P-870HN-51D User’s Guide
CHAPTER 23 Diagnostic 23.1 Overview The Diagnostic screens display information to help you identify problems with the P-870HN-51D. The route between a CO VDSL switch and one of its CPE may go through switches owned by independent organizations. A connectivity fault point generally takes time to discover and impacts subscriber’s network access. In order to eliminate the management and maintenance efforts, IEEE 802.
Chapter 23 Diagnostic • Loopback test - checks if the MEP port receives its Loop Back Response (LBR) from its target after it sends the Loop Back Message (LBM). If no response is received, there might be a connectivity fault between them. • Link trace test - provides additional connectivity fault analysis to get more information on where the fault is. If an MEP port does not respond to the source MEP, this may indicate a fault.
Chapter 23 Diagnostic 23.4 The 802.1ag Screen Click Diagnostic to open the following screen. Use this screen to perform CFM actions. Figure 139 802.1ag The following table describes the fields in this screen. Table 91 Maintenance > Diagnostic > 802.1ag LABEL DESCRIPTION 802.1ag Connectivity Fault Management Maintenance Domain (MD) Name Type a name of up to 39 printable English keyboard characters for this MD. Maintenance Domain (MD) Level Select a level (0-7) under which you want to create an MA.
Chapter 23 Diagnostic Table 91 Maintenance > Diagnostic > 802.1ag (continued) LABEL DESCRIPTION Maintenance Association (MA) Format Select the format which the P-870HN-51D uses to send this MA information in the domain (MD). Options are VID, String and Integer. If you select VID or Integer, the P-870HN-51D adds the VLAN ID you specified for an MA in the CCM. If you select String, the P-870HN-51D adds the MA name you specified above in the CCM.
CHAPTER 24 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • P-870HN-51D Access and Login • Internet Access • Wireless LAN Troubleshooting 24.1 Power, Hardware Connections, and LEDs The P-870HN-51D does not turn on. None of the LEDs turn on. 1 Make sure the P-870HN-51D is turned on.
Chapter 24 Troubleshooting 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Turn the P-870HN-51D off and on. 5 If the problem continues, contact the vendor. 24.2 P-870HN-51D Access and Login I forgot the IP address for the P-870HN-51D. 1 The default IP address is https://192.168.1.1.
Chapter 24 Troubleshooting • If you changed the IP address (Section on page 96), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the P-870HN-51D. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 3 Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. See Appendix C on page 299.
Chapter 24 Troubleshooting I cannot use FTP to upload / download the configuration file. / I cannot use FTP to upload new firmware. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. I cannot access the P-870HN-51D again after configuring a new interface group. Make sure your computer is connected to a LAN port in the default group.
Chapter 24 Troubleshooting 2 Make sure you configured a proper ATM or PTM layer-2 interface and WAN services with the Internet account information provided by your ISP. 3 If you set up a WAN connection using bridging service, make sure you turn off the DHCP feature in the LAN screen to have the clients get WAN IP addresses directly from your ISP’s DHCP server. I cannot access the Internet through an Ethernet WAN connection.
Chapter 24 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page 23. 2 Turn the P-870HN-51D off and on. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5 on page 23.
Chapter 24 Troubleshooting 3 Make sure the wireless adapter installed on your computer is IEEE 802.11 compatible and supports the same wireless standard as the P-870HN-51D. 4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the P-870HN-51D. 5 Check that both the P-870HN-51D and your wireless station are using the same wireless and wireless security settings.
Chapter 24 Troubleshooting 246 P-870HN-51D User’s Guide
CHAPTER 25 Product Specifications The following tables summarize the P-870HN-51D’s hardware and firmware features. 25.1 Hardware Specifications Table 92 Hardware Specifications Dimensions 21.5 cm (L) x 12.3 cm (W) x 3.6 cm (D) Weight 417 g Power Specification 12 V DC 1.
Chapter 25 Product Specifications Table 93 Firmware Specifications (continued) Default User Name admin Default Password 1234 DHCP Server IP Pool 192.168.1.33 to 192.168.1.65 Static Routes 16 Device Management Use the web configurator to easily configure the rich range of features on the P-870HN-51D. Wireless Functionality Allow the IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n wireless clients to connect to the P-870HN-51D wirelessly.
Chapter 25 Product Specifications Table 93 Firmware Specifications (continued) Universal Plug and Play (UPnP) A UPnP-enabled device can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network. QoS (Quality of Service) You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers.
Chapter 25 Product Specifications Table 93 Firmware Specifications (continued) Other Protocol Support PPP (Point-to-Point Protocol) link layer protocol Transparent bridging for unsupported network layer protocols RIP I/RIP II ICMP ATM QoS SNMP v1 and v2c with MIB II support (RFC 1213) IP Multicasting IGMP v1 and v2 IGMP Proxy Management Embedded Web Configurator Remote Firmware Upgrade Telnet Embedded FTP/TFTP Server for firmware upgrade and configuration file backup and restore CLI (Command Line Interp
Chapter 25 Product Specifications Table 94 Standards Supported (continued) STANDARD DESCRIPTION IEEE 802.11d Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges IEEE 802.11x Port Based Network Access Control. IEEE 802.11e QoS IEEE 802.11 e Wireless LAN for Quality of Service ITU-T G.993.2 (VDSL2) ITU standard that defines VDSL2. TR-069 DSL Forum Standard for CPE Wan Management.
Chapter 25 Product Specifications 252 P-870HN-51D User’s Guide
APPENDIX A Network Troubleshooting Overview The three most basic utilities for troubleshooting network connection issues are: ipconfig, ping and tracert. This appendix gives a quick overview of them as well as some common usage examples. Moreover, three slightly more advanced utilities are also discussed: arp, route, and netstat. Note: All command examples here use the Microsoft Windows operating system version of the commands.
Appendix A Network Troubleshooting Note: Most operating systems ship with TCP/IP already installed and enabled. See your Windows documentation for details on installing or configuring TCP/IP. The Command Line Interface To open the Windows command line interface: 1 Click Start > Run. 2 In the Run dialog box, enter cmd then click OK. 3 The Command Prompt window opens.
Appendix A Network Troubleshooting For example, the date command has the optional /t and date parameters. If you do not use either of them and enter just date by itself, then the system shows you the date it is currently using and then prompts you to change it. C:\>date The current date is: 2009/10/21 Enter the new date: (mm-dd-yy) However, if you use the /t parameter it just displays the date and nothing more. C:\>date /t 2009/10/21 C:\> To view the parameters for any given command, enter help [command].
Appendix A Network Troubleshooting Here you can see that the device has IP address of 1.1.1.1 and example.com is its Domain Name Server (DNS). If the device is disconnected then you would see the following instead: Ethernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected If the device is connected but cannot get an IP address then you would see: Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . .
Appendix A Network Troubleshooting ping The ping command line utility allows you to verify the connection and latency between your computer and either the P-870HN-51D or other devices on the network. If you cannot reach a target using this command, then it may indicate possible network trouble. Syntax: ping target The target can be an IP address or a host name.
Appendix A Network Troubleshooting If your ping test fails to get a response, then you may see a message like this: C:\>ping www.example.com Pinging www.example.com [192.0.32.10] with 32 bytes of data: Request Request Request Request timed timed timed timed out. out. out. out. Ping statistics for 192.0.32.
Appendix A Network Troubleshooting tracert The tracert command line utility allows you to determine the network path between your computer and a host you specify. When you communicate with other devices on a network, the data is not often sent directly from point A to point B; rather, it moves through a series of intermediate servers, passed along until eventually the server closest to point B hands it off directly.
Appendix A Network Troubleshooting The following examples show the typical output of this command: C:\>tracert www.example.com Tracing route to www.example.com [192.0.32.
Appendix A Network Troubleshooting In this example, we abridge the tracert results table to show only server IP addresses and not domain names by using the -d parameter. We also use the -h parameter to limit the number of hops to 5 to test local connections only. C:\>tracert -d -h 5 www.zyxel.com Tracing route to a1524.g.akamai.net [203.69.113.16] over a maximum of 5 hops: 1 2 3 4 5 <1 5 5 17 24 ms ms ms ms ms <1 4 5 16 25 ms ms ms ms ms <1 4 6 14 24 ms ms ms ms ms 172.23.31.254 172.23.6.113 172.23.
Appendix A Network Troubleshooting To check the ARP table on a Windows XP computer: 1 Click Start > Programs > Accessories > Command Prompt. The Command Prompt screen appears. 2 Type arp -a and press [Enter]. The following examples show the typical output of this command: C:\>arp -a Interface: 172.16.1.28 on Interface 0x1000003 Internet Address Physical Address 172.16.1.5 00-00-aa-19-07-38 172.16.1.25 00-18-f3-f0-aa-34 172.16.1.44 00-0e-a6-2c-60-10 172.16.1.210 00-19-cb-e9-66-33 172.16.1.
Appendix A Network Troubleshooting and other route information. When your computer wants to access an IP address on another network, it references this table. Syntax: route print Parameters: For the purposes of this section, the print parameter is the most important. If you enter route by itself, the command’s help page displays. The following example shows the typical output of this command: C:\>route print =========================================================================== Interface List 0x1 .....
Appendix A Network Troubleshooting Table 95 route print Command Output OUTPUT DESCRIPTION Netmask The destination subnet mask of packets that this route entry is to route. The subnet mask can be the apropriate subnet mask for a network, 255.255.255.255 for a host, or 0.0.0.0 for the default route. Gateway The IP address of the gateway through which this computer should send the matched packets.
Appendix A Network Troubleshooting netstat The netstat command line utility is used to show Ethernet statistics and current TCP/IP network connections. Syntax: netstat With no parameters, this command simply displays only active statistics for ports that are currently in use by one process or another. Parameter: netstat [-a] [-e] The -a parameter displays all available listening ports and connections whether they are active or not, while the -e parameter displays Ethernet statistics.
Appendix A Network Troubleshooting Use the -a parameter to display all possible connections to your device, not just the ones that are currently in use: C:\>netstat -a Active Connections Proto TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP Local Address COMPUTERA:http COMPUTERA:http COMPUTERA:2744 COMPUTERA:5152 COMPUTERA:5152 COMPUTERA:5354 COMPUTERA:27015 COMPUTERA:40000 COMPUTERA:40000 COMPUTERA:netbios-ssn COMPUTERA:4177 COMPUTERA:4178 COMPUTERA:4180 COMPUTERA:4182 COMPUTERA:43
Appendix A Network Troubleshooting Additionally, you can use netstat -e to display Ethernet statistics as the following example.
Appendix A Network Troubleshooting 268 P-870HN-51D User’s Guide
APPENDIX B Setting Up Your Computer’s IP Address Note: Your specific P-870HN-51D may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address 1 Click Start > Control Panel. Figure 141 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 143 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 145 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel.
Appendix B Setting Up Your Computer’s IP Address 3 Click the Network and Sharing Center icon. Figure 148 Windows Vista: Network And Internet 4 Click Manage network connections. Figure 149 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 150 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 152 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel.
Appendix B Setting Up Your Computer’s IP Address 3 Click Change adapter settings. Figure 155 Windows 7: Network And Sharing Center 4 Double click Local Area Connection and then select Properties. Figure 156 Windows 7: Local Area Connection Status Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 158 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Figure 159 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 160 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 2 In the System Preferences window, click the Network icon. Figure 161 Mac OS X 10.4: System Preferences 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 162 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 163 Mac OS X 10.4: Network Preferences > TCP/IP Tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, type the IP address of your device. Figure 164 Mac OS X 10.4: Network Preferences > Ethernet 6 Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 165 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 Click Apple > System Preferences. Figure 166 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 167 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 168 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your P-870HN-51D. Figure 169 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 170 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 1 Click System > Administration > Network. Figure 171 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 173 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 175 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 176 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 177 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Appendix B Setting Up Your Computer’s IP Address 1 Click K Menu > Computer > Administrator Settings (YaST). Figure 178 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 179 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 180 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 181 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 182 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 296 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 183 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 184 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 187 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 188 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 189 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 190 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 191 Security Settings - Java Scripting Java Permissions 304 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 192 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 193 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 308 P-870HN-51D User’s Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 196 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 197 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting.
Appendix D IP Addresses and Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.
Appendix D IP Addresses and Subnetting Table 103 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 128 IP Address (Binary) 11000000.10101000.00000001. 10000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.128 Lowest Host ID: 192.168.1.129 Broadcast Address: 192.168.1.191 Highest Host ID: 192.168.1.190 Table 104 Subnet 4 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1.
Appendix D IP Addresses and Subnetting Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 106 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.255.255.192 (/26) 4 62 3 255.255.255.224 (/27) 8 30 4 255.255.255.240 (/28) 16 14 5 255.255.255.248 (/29) 32 6 6 255.255.255.252 (/30) 64 2 7 255.255.255.
Appendix D IP Addresses and Subnetting addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0.
Appendix D IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix D IP Addresses and Subnetting following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 200 Conflicting Router IP Addresses Example Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
Appendix D IP Addresses and Subnetting 320 P-870HN-51D User’s Guide
APPENDIX E Wireless LANs Note: Your specific P-870HN-51D may not support all of the wireless security types described in this appendix. See the product specifications for more information about which wireless security types are supported. Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C).
Appendix E Wireless LANs Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other.
Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 204 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix E Wireless LANs hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 205 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix E Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 108 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.
Appendix E Wireless LANs accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: • User based identification that allows for roaming. • Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on a network RADIUS server.
Appendix E Wireless LANs The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: • Accounting-Request Sent by the access point requesting accounting. • Accounting-Response Sent by the RADIUS server to indicate that it has started or stopped accounting. In order to ensure network security, the access point and the RADIUS server use a shared secret key, which is a password, they both know. The key is not sent over the network.
Appendix E Wireless LANs authentication method does not support data encryption with dynamic session key. You must configure WEP encryption keys for data encryption. EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by both the server and the wireless clients for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server.
Appendix E Wireless LANs Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types.
Appendix E Wireless LANs required for compatibility reasons, but offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP). TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm called Rijndael.
Appendix E Wireless LANs authentication. These two features are optional and may not be supported in all wireless devices. Key caching allows a wireless client to store the PMK it derived through a successful authentication with an AP. The wireless client uses the PMK when it tries to connect to the same AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.
Appendix E Wireless LANs 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 206 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows.
Appendix E Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 207 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix E Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix E Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb.
APPENDIX F Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix F Common Services Table 112 Commonly Used Services (continued) 338 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix F Common Services Table 112 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix F Common Services Table 112 Commonly Used Services (continued) 340 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX G Open Software Announcements End-User License Agreement for "P-870HN-51D" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix G Open Software Announcements 3 Copyright The Software and Documentation contain material that is protected by International Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL.
Appendix G Open Software Announcements and conditions of this License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. 6 No Warranty THE SOFTWARE IS PROVIDED "AS IS.
Appendix G Open Software Announcements DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.
Appendix G Open Software Announcements Open-Source Packages for "P-870HN-51D" 3RD PARTY SOFTWARE VERSION WEB ADDRESS OF THE SOFTWARE LICENSE TERM MIPS Linux kernel 2.6.21.5 http://www.linux-mips.org Bridge-Utils 1.2 http://bridge.sourceforge.net bftpd 1.0.24 http://www.bftpd.org/ busybox 1'00 http://www.busybox.net/ Dnsmasq 2.48 http://www.thekelleys.org.uk/dnsmasq/ ebtables 2.0.6 http://ebtables.sourceforge.net iproute2 2.4.7 http://www.linuxgrill.
Appendix G Open Software Announcements GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Appendix G Open Software Announcements patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0.
Appendix G Open Software Announcements and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole.
Appendix G Open Software Announcements place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Appendix G Open Software Announcements 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9.
Appendix G Open Software Announcements IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. This Product includes Ssh server dropbear v0.46 under the MIT-Style License.
Appendix G Open Software Announcements 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3.
Appendix G Open Software Announcements All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code.
Appendix G Open Software Announcements The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.
APPENDIX H Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix H Legal Information • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix H Legal Information This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication.
Appendix H Legal Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page.
Index Index CA creating 149 importing 150, 153 public key 147 replacing 148 storage space 148 A ACS 191 Advanced Encryption Standard See AES. AES 331 ALG 138 alternative subnet mask notation 312 antenna 247 directional 336 gain 335 omni-directional 336 AP (access point) 323 Application Layer Gateway 138 arp 261 Auto Configuration Server, see ACS 191 B backup 230 Basic Service Set, See BSS 321 blinking LEDs 24 broadcast 88 BSS 321 Certification Authority 147 Certification Authority.
Index DHCP 66, 92, 95, 96, 189 DHCP client 66 F DHCP client list 66 FCC interference statement 355 DHCP relay 248 Finger 139 DHCP server 248 firmware upload 228 upload error 229 diagnostic 236 Differentiated Services, see DiffServ 184 DiffServ 184 marking rule 185 firmware version 56 digital IDs 147 FTP 130, 139 fragmentation threshold 325 disclaimer 355 DNS 93 DNS server address assignment 88 H Domain Name 139 domain name system see DNS hidden node 323 Domain Name System. See DNS.
Index See IANA 317 IP Address 137 IP address 96 Maintenance End Point, see MEP managing the device good habits 22 IP Address Assignment 85 MD 235 IP filter basics 141 creating or eiding rules 144 introduction 141 policies 142 memory usage 57 IP multicasting 250 MEP 235 Message Integrity Check (MIC) 330 MTU (Multi-Tenant Unit) 87 multicast 88, 92, 97 IP pool 94 IP pool setup 96 ipconfig 255 ipconfig, release 256 ipconfig, renew 256 L LAN statistics 62, 66 LAN TCP/IP 96 LAN-Side DSL CPE Configuration
Index Pairwise Master Key (PMK) 331, 333 TR-069 191 Per-Hop Behavior, see PHB 185 Remote Procedure Calls, see RPCs 191 PHB 185 resetting your device 25 ping 257 timeout 258 restore 230 Point-to-Point Tunneling Protocol 139 RFC 1389. See RIP. POP3 139, 141, 142 RFC 1631 129 ports 24 RFC 2131. See DHCP. power adaptor 250 RFC 2132.
Index Symmetric NAT, Outgoing 87 VLAN tag 87 syntax conventions 5 system name 56 W T WAN (Wide Area Network) 69 WAN interface 59 Tag Control Information See TCI WAN statistics 58 Tag Protocol Identifier See TPID TCI warranty 358 note 358 TCP/IP 141 Web Configurator 47 temperature 247 WEP encryption 108 Temporal Key Integrity Protocol (TKIP) 330 Wi-Fi Protected Access 330 TPID 87 trademarks 355 Windows Command Prompt 254 arp 261 command parameters 254 ipconfig 255 netstat 265 ping 257 route
Index WPS status 57 364 P-870HN-51D User’s Guide