LTE6100 LTE Outdoor Gateway Default Login Details Web Address http://192.168.1.1 Admin’s User Name and Password admin / 1234 Guest’s User Name and Password user / 1234 Edition 1, 7/2012 om www.zyxel.
IMPORTANT! Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • Quick Start Guide The Quick Start Guide shows how to connect the LTE Device and access the Web Configurator wizards. (See the wizard real time help for information on configuring each screen.
Contents Overview Contents Overview User’s Guide ....................................................................................................................................... 11 Introduction .............................................................................................................................................13 Introducing the Web Configurator ...........................................................................................................17 Technical Reference ..
Contents Overview 4 LTE6100 User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ......................................................................................... 11 Chapter 1 Introduction...........................................
Table of Contents 4.1 Overview ...........................................................................................................................................31 4.1.1 What You Can Do in this Chapter ............................................................................................31 4.1.2 What You Need to Know ..........................................................................................................31 4.1.3 Before You Begin .............................................
Table of Contents 8.1.1 What You Can Do in this Chapter ............................................................................................59 8.1.2 What You Need To Know .........................................................................................................59 8.2 The Port Forwarding Screen ............................................................................................................60 8.2.1 The Port Forwarding Screen .................................................
Table of Contents 12.2.1 Add/Edit a Parental Control Rule ...........................................................................................82 Chapter 13 VPN ......................................................................................................................................................85 13.1 Overview .........................................................................................................................................85 13.2 IPSec VPN .....................
Table of Contents 17.1.1 What You Need to Know ......................................................................................................107 17.2 The Remote MGMT Screen ..........................................................................................................107 Chapter 18 System ...............................................................................................................................................109 18.1 Overview ........................................
Table of Contents Appendix A IP Addresses and Subnetting.......................................................................................127 Appendix B Setting Up Your Computer’s IP Address ......................................................................137 Appendix C Pop-up Windows, JavaScript and Java Permissions ...................................................167 Appendix D Common Services.....................................................................................................
P ART I User’s Guide 11
C HAPT ER 1 Introduction 1.1 Overview The Device is an LTE (Long Term Evolution) device including an outdoor unit (ODU) and an indoor unit (IDU). The LTE Device provides a complete security solution with a robust firewall based on Stateful Packet Inspection (SPI) technology and Denial of Service (DoS). See the chapter on product specifications for a full list of features. 1.2 Applications for the LTE Device Here are some example uses for which the LTE Device is well suited. 1.2.
Chapter 1 Introduction 1.3 Ways to Manage the LTE Device • Web Configurator. This is for management of the LTE Device using a (supported) web browser. 1.4 Good Habits for Managing the LTE Device Do the following things regularly to make the LTE Device more secure and to manage the LTE Device more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place.
Chapter 1 Introduction None of the LEDs are on if the LTE Device is not receiving power. Table 1 LED Descriptions (From Left To Right) LED COLOR STATUS DESCRIPTION PWR/SYS Green On The LTE Device is receiving power and ready for use. Blinking The LTE Device is booting up. On The LTE Device detected an error while self-testing, or there is a device malfunction. Blinking The LTE Device is upgrading the firmware. Red Off LTE Green The LTE Device is not receiving power.
Chapter 1 Introduction 16 LTE6100 User’s Guide
C HAPT ER 2 Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device setup and management via Internet browser. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari 2.0 and later versions. The recommended screen resolution is 1024 by 768 pixels. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 2 Introducing the Web Configurator Note: For security reasons, the LTE Device automatically logs you out if you do not use the web configurator for five minutes (default). If this happens, log in again. 5 The following screen displays if you have not yet changed your password. It is strongly recommended you change the default password. Enter a new password, retype it to confirm and click Apply; alternatively click Skip to proceed to the main menu if you do not want to change the password now.
Chapter 2 Introducing the Web Configurator 2.2 The Web Configurator Layout Click Connection Status > System Info to show the following screen. (See Section 3.3 on page 27 for more information.) Figure 7 Web Configurator Layout A a b B C As illustrated above, the main screen is divided into these parts: • A - title bar • B - main window • C - navigation panel 2.2.1 Title Bar The title bar shows the following icon in the upper right corner.
Chapter 2 Introducing the Web Configurator Click this icon to log out of the web configurator. 2.2.2 Main Window The main window displays information and configuration fields. It is discussed in the rest of this document. After you click System Info on the Connection Status screen, the System Info screen is displayed. See Chapter 3 on page 27 for more information about the System Info screen.
Chapter 2 Introducing the Web Configurator 2.2.5 Navigation Panel Use the menu items on the navigation panel to open screens to configure LTE Device features. The following table describes each menu item. Table 2 Navigation Panel Summary LINK TAB Connection Status FUNCTION This screen shows the network status of the LTE Device and computers/devices connected to it. Network Setting Broadband Home Networking Broadband Use this screen to view and modify your WAN interface.
Chapter 2 Introducing the Web Configurator Table 2 Navigation Panel Summary (continued) LINK TAB FUNCTION WAN Use this screen to view the status of all network traffic going through the WAN port of the LTE Device. LAN Use this screen to view the status of all network traffic going through the LAN ports of the LTE Device. NAT Use this screen to view the status of NAT sessions on the LTE Device. Users Account Users Account Use this screen to configure the passwords your user accounts.
P ART II Technical Reference The appendices provide general information. Some details may not apply to your LTE Device.
C HAPT ER 3 Connection Status and System Info 3.1 Overview After you log into the web configurator, the Connection Status screen appears. This shows the network connection status of the LTE Device and clients connected to it. Use the System Info screen to look at the current status of the device, system resources, interfaces (LAN, WAN). If you click Virtual Device on the System Info screen, a visual graphic appears, showing the connection status of the LTE Device’s ports. See Section 2.2.
Chapter 3 Connection Status and System Info If you prefer to view the status in a list, click List View in the Viewing mode selection box. You can configure how often you want the LTE Device to update this screen in Refresh Interval. Figure 9 Connection Status: Icon View Figure 10 Connection Status: List View In Icon View, if you want to view information about a client, click the client’s name and Info. Click the IP address if you want to change it.
Chapter 3 Connection Status and System Info 3.3 The System Info Screen Click Connection Status > System Info to open this screen. Figure 11 System Info Screen Each field is described in the following table. Table 3 System Info Screen LABEL DESCRIPTION Language Select the web configurator language from the drop-down list box. Refresh Interval Select how often you want the LTE Device to update this screen from the dropdown list box.
Chapter 3 Connection Status and System Info Table 3 System Info Screen (continued) LABEL DESCRIPTION Mode This is the method of encapsulation used by your ISP. IP Address This field displays the current IP address of the LTE Device in the WAN. LAN Information IP Address This field displays the current IP address of the LTE Device in the LAN. IP Subnet Mask This field displays the current subnet mask in the LAN.
Chapter 3 Connection Status and System Info Table 3 System Info Screen (continued) LABEL DESCRIPTION CPU Usage This field displays what percentage of the LTE Device’s processing ability is currently used. When this percentage is close to 100%, the LTE Device is running at full load, and the throughput is not going to improve anymore. If you want some applications to have more throughput, you should turn off other applications.
Chapter 3 Connection Status and System Info 30 LTE6100 User’s Guide
C HAPT ER 4 Broadband 4.1 Overview This chapter discusses the LTE Device’s Broadband screens. Use these screens to configure your LTE Device for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks, such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations. This LTE Device supports LTE connection for the WAN only.
Chapter 4 Broadband If your ISP assigns you a static WAN IP address, they should also assign you the subnet mask and DNS server IP address(es). APN Access Point Name (APN) is a unique string which indicates an LTE network. An APN is required for LTE stations to enter the LTE network and then the Internet. 4.1.3 Before You Begin You may need to know your Internet access settings such as LTE APN, WAN IP address and SIM card’s PIN code if the INTERNET light on your LTE Device is off.
Chapter 4 Broadband Click the Edit icon next to the LTE connection, the screen displays as shown next. Figure 14 Broadband Edit The following table describes the fields in this screen. Table 5 Broadband Edit LABEL DESCRIPTION Name Specify the name for this WAN interface. APN Enter the Access Point Name (APN) of an LTE network, which your service provider gave you. Dial String Enter the dial string for the ISP.
Chapter 4 Broadband Click Network Setting > Broadband > SIM. The following screen opens. Figure 15 SIM The following table describes the fields in this screen. Table 6 SIM LABEL DESCRIPTION PIN Enter the PIN of your SIM card. Apply Click Apply to save your changes. Cancel Click Cancel to return to the previous screen without saving. 4.3.1 PUK Code Screen If the SIM card is locked, use this screen to enter the PUK code.
Chapter 4 Broadband The following table describes the fields in this screen. Table 7 PUK Code LABEL DESCRIPTION PUK code Enter the PUK (Pin Unlock Key) code to unlock the SIM card. New PIN code Enter the new PIN code for the SIM card. Apply Click Apply to save your changes. Cancel Click Cancel to return to the previous screen without saving. 4.4 Technical Reference The following section contains additional technical information about the LTE Device features described in this chapter.
Chapter 4 Broadband LTE Frequency Band Table See the following table for the frequency bands used in LTE wireless technologies.
Chapter 4 Broadband Table 8 LTE Wireless Technologies (continued) UPLINK (UL) OPERATING BAND DOWNLINK (DL) OPERATING BAND BASE STATION RECEIVE BASE STATION TRANSMIT BAND 43 CPE TRANSMIT CPE RECEIVE UL (LOW - HIGH) DL (LOW - HIGH) 3600 MHz – 3800 MHz 3600 MHz – 3800 MHz DUPLEX MODE TDD Note 1: Band 6 is not applicable LTE6100 User’s Guide 37
Chapter 4 Broadband 38 LTE6100 User’s Guide
C HAPT ER 5 Home Networking 5.1 Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually located in one immediate area such as a building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses. LAN WAN 5.1.1 What You Can Do in this Chapter • Use the LAN Setup screen to set the LAN IP address, DHCP, subnet mask, and DNS settings (Section 5.2 on page 41).
Chapter 5 Home Networking Subnet Mask The subnet mask specifies the network number portion of an IP address. Your LTE Device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the LTE Device unless you are instructed to do otherwise. DHCP DHCP (Dynamic Host Configuration Protocol) allows clients to obtain TCP/IP configuration at startup from a server.
Chapter 5 Home Networking 5.2 The LAN Setup Screen Click Network Setting > Home Networking to open the LAN Setup screen. Use this screen to set the Local Area Network IP address and subnet mask of your LTE Device and configure the DNS server information that the LTE Device sends to the DHCP client devices on the LAN. Figure 17 Network Setting > Home Networking > LAN Setup The following table describes the fields in this screen.
Chapter 5 Home Networking Table 9 Network Setting > Home Networking > LAN Setup (continued) LABEL DESCRIPTION DNS Server 1-3 Select From ISP if your ISP dynamically assigns DNS server information (and the LTE Device's WAN IP address). Select DNS-Proxy to have the LTE Device send its own address to the LAN clients for them to use as the DNS server. Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
Chapter 5 Home Networking Table 10 Network Setting > Home Networking > Static DHCP (continued) LABEL DESCRIPTION Status This field displays whether the client is connected to the LTE Device. Host Name This field displays the client host name. MAC Address The MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network) is unique to your computer (six pairs of hexadecimal notation).
Chapter 5 Home Networking Use the following screen to configure the UPnP settings on your LTE Device. Click Network Setting > Home Networking > Static DHCP > UPnP to display the screen shown next. Figure 20 Network Setting > Home Networking > UPnP The following table describes the labels in this screen. Table 12 Network Settings > Home Networking > UPnP 44 LABEL DESCRIPTION UPnP Select Enable to activate UPnP.
C HAPT ER 6 Routing 6.1 Overview The LTE Device usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the LTE Device send data to devices not reachable through the default gateway, use static routes. For example, the next figure shows a computer (A) connected to the LTE Device’s LAN interface. The LTE Device routes most traffic from A to the Internet through the LTE Device’s default gateway (R1).
Chapter 6 Routing 6.2 Configuring Static Route Use this screen to view and configure IP static routes on the LTE Device. Click Network Setting > Static Route to open the following screen. Figure 22 Network Setting > Static Route The following table describes the labels in this screen. Table 13 Network Setting > Static Route LABEL DESCRIPTION Add New Static Route Click this to set up a new static route on the LTE Device. # This is the number of an individual static route.
Chapter 6 Routing 6.2.1 Add/Edit Static Route Click add new Static Route in the Routing screen or click the Edit icon next to a rule. The following screen appears. Use this screen to configure the required information for a static route. Figure 23 Routing: Add/Edit The following table describes the labels in this screen. Table 14 Routing: Add/Edit LABEL DESCRIPTION Active Click this to activate this static route. Route Name Enter the name of the IP static route.
Chapter 6 Routing 48 LTE6100 User’s Guide
C HAPT ER 7 Quality of Service (QoS) 7.1 Overview This chapter discusses the LTE Device’s QoS screens. Use these screens to set up your LTE Device to use QoS for traffic management. Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. QoS allows the LTE Device to group and prioritize application traffic and fine-tune network performance.
Chapter 7 Quality of Service (QoS) CoS technology includes DiffServ (Differentiated Services or DS). DiffServ is a new protocol and defines a new DS field, which replaces the eight-bit ToS (Type of Service) field in the IP header. Tagging and Marking In a QoS class, you can configure whether to add or change the DSCP (DiffServ Code Point) value in a matched packet.
Chapter 7 Quality of Service (QoS) 7.3 The Queue Setup Screen Use this screen to configure QoS queue assignment. Click Network Setting > QoS > Queue Setup to open the screen as shown next. Figure 25 Network Setting > QoS > Queue Setup The following table describes the labels in this screen. Table 16 Network Setting > QoS > Queue Setup LABEL DESCRIPTION Add new Queue Click this to create a new entry. # This is the index number of this entry. Status This indicates whether the queue is active or not.
Chapter 7 Quality of Service (QoS) 7.3.1 Add/Edit a QoS Queue Use this screen to configure a queue. Click Add new Queue in the Queue Setup screen or the Edit icon next to an existing queue. Figure 26 Queue Setup: Add/Edit The following table describes the labels in this screen. Table 17 Queue Setup: Add/Edit LABEL DESCRIPTION Active Select to enable or disable this queue. Name Enter the descriptive name of this queue. Interface This shows the interface of this queue.
Chapter 7 Quality of Service (QoS) Click Network Setting > QoS > Class Setup to open the following screen. Figure 27 Network Setting > QoS > Class Setup The following table describes the labels in this screen. Table 18 Network Setting > QoS > Class Setup LABEL DESCRIPTION Add new Classifier Click this to create a new classifier. Order This field displays the order number of the classifier. Status This indicates whether the classifier is active or not.
Chapter 7 Quality of Service (QoS) 7.4.1 Add/Edit QoS Class Click Add new Classifier in the Class Setup screen or the Edit icon next to an existing classifier to configure it. Figure 28 Class Setup: Add/Edit The following table describes the labels in this screen. Table 19 Class Setup: Add/Edit LABEL DESCRIPTION Class Configuration Active Select to enable this classifier. Class Name Enter a descriptive name of up to 32 printable English keyboard characters, including spaces.
Chapter 7 Quality of Service (QoS) Table 19 Class Setup: Add/Edit (continued) LABEL DESCRIPTION Forward to Interface Select a WAN interface through which traffic of this class will be forwarded out. If you select Unchange, the LTE Device forward traffic of this class according to the default routing table. DSCP Mark This field is available only when you select the Ether Type check box in Criteria Configuration-Basic section.
Chapter 7 Quality of Service (QoS) Table 19 Class Setup: Add/Edit (continued) LABEL DESCRIPTION Port Range If you select TCP or UDP in the IP Protocol field, select the check box and enter the port number(s) of the source. Exclude Select this option to exclude the packets that match the specified criteria from this classifier. Others IP Protocol This field is available only when you select IP in the Ether Type field. Select this option and select the protocol (service type) from TCP or UDP.
Chapter 7 Quality of Service (QoS) The following table describes the labels in this screen. Table 20 Network Setting > QoS > Monitor LABEL DESCRIPTION Monitor Refresh Interval Select how often you want the LTE Device to update this screen. Select No Refresh to stop refreshing statistics. Status # This is the index number of the entry. Name This shows the name of the WAN interface on the LTE Device.
Chapter 7 Quality of Service (QoS) The DSCP value determines the forwarding behavior, the PHB (Per-Hop Behavior), that each packet gets across the DiffServ network. Based on the marking rule, different kinds of traffic can be marked for different kinds of forwarding. Resources can then be allocated according to the DSCP values and the configured policies.
C HAPT ER 8 Network Address Translation (NAT) 8.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network. 8.1.1 What You Can Do in this Chapter • Use the Port Forwarding screen to configure forward incoming service requests to the server(s) on your local network (Section 8.2 on page 60).
Chapter 8 Network Address Translation (NAT) Port Forwarding A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though NAT makes your whole inside network appear as a single computer to the outside world. Finding Out More See Section 8.5 on page 64 for advanced technical information on NAT. 8.
Chapter 8 Network Address Translation (NAT) 8.2.1 The Port Forwarding Screen Click Network Setting > NAT to open the Port Forwarding screen. See Appendix D on page 177 for port numbers commonly used for particular services. Figure 31 Network Setting > NAT > Port Forwarding The following table describes the fields in this screen. Table 21 Network Setting > NAT > Port Forwarding LABEL DESCRIPTION Add new rule Click this to add a new port forwarding rule. # This is the index number of the entry.
Chapter 8 Network Address Translation (NAT) 8.2.2 The Port Forwarding Edit Screen This screen lets you create or edit a port forwarding rule. Click Add new rule in the Port Forwarding screen or the Edit icon next to an existing rule to open the following screen. Figure 32 Port Forwarding: Add/Edit The following table describes the labels in this screen.
Chapter 8 Network Address Translation (NAT) 8.3 The DMZ Screen Use this page to set the IP address of your network DMZ (if you have one) for the LTE Device. All incoming packets received by this LTE Device’s WAN interface will be forwarded to the default server you set. Click Network Setting > NAT > DMZ to display the following screen. Note: The configuration you set in this screen takes priority than the Network Setting > NAT > Port Forwarding screen.
Chapter 8 Network Address Translation (NAT) The following table describes the fields in this screen. Table 24 Network Setting > NAT > Sessions LABEL DESCRIPTION MAX NAT Session Use this field to set a common limit to the number of concurrent NAT sessions each client computer can have. If only a few clients use peer to peer applications, you can raise this number to improve their performance.
Chapter 8 Network Address Translation (NAT) global address) back to the inside local address before forwarding it to the original inside host. Note that the IP address (either local or global) of an outside host is never changed. The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP. In addition, you can designate servers, for example, a web server and a Telnet server, on your local network and make them accessible to the outside world.
Chapter 8 Network Address Translation (NAT) 66 LTE6100 User’s Guide
C HAPT ER 9 Dynamic DNS 9.1 Overview This chapter discusses how to configure your LTE Device to use Dynamic DNS. Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in applications such as NetMeeting and CU-SeeMe). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.
Chapter 9 Dynamic DNS 9.2 The Dynamic DNS Screen Use the Dynamic DNS screen to enable DDNS and configure the DDNS settings on the LTE Device. To change your LTE Device’s DDNS, click Network Setting > Dynamic DNS. The screen appears as shown. Figure 36 Network Setting > Dynamic DNS The following table describes the fields in this screen. Table 26 Network Setting > DNS LABEL DESCRIPTION Dynamic DNS Configuration Active Dynamic DNS Select this check box to use dynamic DNS.
C HAPTER 10 Firewall 10.1 Overview Use the LTE Device firewall screens to enable and configure the firewall that protects your LTE Device and network from attacks by hackers on the Internet and control access to it. By default the firewall: • Allows traffic that originates from your LAN computers to go to all other networks. • Blocks traffic that originates on other networks from going to the LAN. The following figure illustrates the default firewall action.
Chapter 10 Firewall 10.1.2 What You Need to Know DoS Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The LTE Device is pre-configured to automatically detect and thwart all known DoS attacks.
Chapter 10 Firewall 10.2 The General Screen Use this screen to enable or disable the LTE Device’s firewall. Click Security > Firewall to open the General screen. Figure 38 Security > Firewall > General The following table describes the labels in this screen. Table 27 Security > Firewall > General LABEL DESCRIPTION Firewall Select Enable to activate the firewall. The LTE Device performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated.
Chapter 10 Firewall 10.3 The Services Screen Use this screen to view the configured service list. To access this screen, click Security > Firewall > Services. You have to configure at least one service in this screen before configuring the Security > Firewall > Access Control > Add New ACL Rule/Edit screen. Figure 39 Security > Firewall > Services Each field is described in the following table.
Chapter 10 Firewall Each field is described in the following table. Table 29 Security > Firewall > Services > Add New Service Entry LABEL DESCRIPTION Name Type a descriptive name for the service. Type Select the protocol type (TCP, UDP or ICMP or Others) of the service. Protocol Number Enter the protocol number of the service type. Source Port, Destination Port The source port defines from which port number(s) the service traffic is sent.
Chapter 10 Firewall Table 30 Security > Firewall > Access Control (continued) LABEL DESCRIPTION Policy This field displays whether the rule silently discards packets (DROP), discards packets and sends a TCP reset packet or an ICMP destination-unreachable message to the sender (REJECT) or allows the passage of packets (PERMIT). Modify Click the Edit icon to edit the rule. Click the Delete icon to delete an existing rule. Note that subsequent rules move up by one when you take this action. 10.4.
Chapter 10 Firewall Table 31 Security > Firewall > Access Control > Add New ACL Rule/Edit (continued) LABEL DESCRIPTION Destination IP Address Start Enter an IP address or the starting IP address of the destination IP range. Destination IP Address End Enter the ending IP address of the destination IP range. Select Protocol Select the name of a configured service or select Select Service to define a new service in this screen.
Chapter 10 Firewall Each field is described in the following table. Table 32 Security > Firewall > DoS LABEL DESCRIPTION DoS Protection Blocking DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection requests, using so much bandwidth and so many resources that Internet access becomes unavailable. Select Enable to enable protection against DoS attacks or Disable to disable it. Apply Click Apply to save the DoS Protection settings.
Chapter 10 Firewall 3 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers. 4 Does this rule conflict with any existing rules? Once these questions have been answered, adding rules is simply a matter of entering the information into the correct fields in the web configurator screens.
Chapter 10 Firewall 78 LTE6100 User’s Guide
C HAPTER 11 MAC Filter 11.1 Overview This chapter discusses MAC address filtering. You can configure the LTE Device to permit access to clients based on their MAC addresses in the MAC Filter screen. This applies to wired and wireless connections. 11.1.1 What You Need to Know Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
Chapter 11 MAC Filter The following table describes the labels in this menu. Table 33 Security > MAC Filter LABEL DESCRIPTION MAC Address Filter Select Enable to activate MAC address filtering. Set This is the index number of the MAC address. Allow Select Allow to permit access to the LTE Device. MAC addresses not listed will be denied access to the LTE Device. If you clear this, the MAC Address field for this set clears.
C HAPTER 12 Parental Control 12.1 Overview Parental control allows you to block web sites with the specific URL. You can also define time periods and days during which the LTE Device performs parental control on a specific user. 12.2 The Parental Control Screen Use this screen to enable parental control, view the parental control rules and schedules. Click Security > Parental Control to open the following screen.
Chapter 12 Parental Control Table 34 Parental Control > Parental Control (continued) LABEL DESCRIPTION Website Block This shows whether the website block is configured. If not, None will be shown. Modify Click the Edit icon to go to the screen where you can edit the rule. Click the Delete icon to delete an existing rule. Add Click Add to create a new schedule. Apply Click Apply to save your changes back to the LTE Device. 12.2.
Chapter 12 Parental Control Table 35 Add/Edit Parental Control Rule (continued) LABEL DESCRIPTION Home Network User Select the LAN user that you want to apply this rule to from the drop-down list box. If you select Custom, enter the LAN user’s MAC address. If you select All, the rule applies to all LAN users. Internet Access Schedule Day Select check boxes for the days that you want the LTE Device to perform parental control.
Chapter 12 Parental Control 84 LTE6100 User’s Guide
C HAPTER 13 VPN 13.1 Overview This chapter shows you how to configure the LTE Device’s VPN settings. 13.2 IPSec VPN 13.2.1 The General Screen The following figure helps explain the main fields in the web configurator. Figure 47 IPSec Fields Summary Remote Network Local Network Remote IPSec Router VPN Tunnel Local IP Address Remote IP Address Click Security > VPN to open this screen as shown next.
Chapter 13 VPN This screen contains the following fields: Table 36 IPSec VPN LABEL 86 DESCRIPTION Add New Tunnel Click this button to add an item to the list. # This is the VPN policy index number. Active This displays if the VPN policy is enabled. Tunnel Name Enter the name of the VPN connection. Local Address This displays the IP address of the LTE Device. Remote Address This displays the IP address of the remote IPSec router.
Chapter 13 VPN 13.2.2 IPSec VPN: Add Use these settings. Click Security > VPN > Add New Tunnel to open this screen as shown next. Figure 49 IPSec VPN: Add This screen contains the following fields: Table 37 IPSec VPN: Add LABEL DESCRIPTION IPSEC Setup Active LTE6100 User’s Guide Select Active to activate this VPN policy.
Chapter 13 VPN Table 37 IPSec VPN: Add LABEL NAT Traversal DESCRIPTION Select this if any of these conditions are satisfied. • This IKE SA might be used to negotiate IPSec SAs that use ESP as the active protocol. • There are one or more NAT routers between the LTE Device and remote IPSec router, and these routers do not support IPSec pass-thru or a similar feature.
Chapter 13 VPN Table 37 IPSec VPN: Add LABEL Content DESCRIPTION When you select IP in the Local ID field, type the IP address of your computer in the Content field. If you configure the Content field to 0.0.0.0 or leave it blank, the LTE Device automatically uses the Pre-Share Key (refer to the PreShare Key field description). It is recommended that you type an IP address other than 0.0.0.0 in the Content field or use the DNS or E-mail ID type in the following situations.
Chapter 13 VPN Table 37 IPSec VPN: Add LABEL Encryption Algorithm DESCRIPTION Select which key size and encryption algorithm to use in the IKE SA.
Chapter 13 VPN Table 37 IPSec VPN: Add LABEL SA Life Time DESCRIPTION Define the length of time before an IPSec SA automatically renegotiates in this field. A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected.
Chapter 13 VPN 13.3 Technical Reference This section provides some technical background information about the topics covered in this section. 13.3.1 IPSec Architecture The overall IPSec architecture is shown as follows. Figure 51 IPSec Architecture IPSec Algorithms The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms).
Chapter 13 VPN 13.3.2 Encapsulation The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. At the time of writing, the LTE Device supports Tunnel mode only. Figure 52 Transport and Tunnel Mode IPSec Encapsulation Transport Mode Transport mode is used to protect upper layer protocols and only affects the data in the IP packet.
Chapter 13 VPN 13.3.3 IKE Phases There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate SAs for IPSec. Figure 53 Two Phases to Set Up the IPSec SA In phase 1 you must: • Choose a negotiation mode. • Authenticate the connection by entering a pre-shared key. • Choose an encryption algorithm. • Choose an authentication algorithm.
Chapter 13 VPN • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1). It uses 6 messages in three round trips: SA negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random number). This mode features identity protection (your identity is not revealed in the negotiation).
Chapter 13 VPN NAT is not normally compatible with ESP in transport mode either, but the LTE Device’s NAT Traversal feature provides a way to handle this. NAT traversal allows you to set up an IKE SA when there are NAT routers between the two IPSec routers. Figure 54 NAT Router Between IPSec Routers B A Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because the NAT router changes the header of the IPSec packet.
Chapter 13 VPN distinguish different incoming SAs and you can select between different encryption algorithms, authentication algorithms and key groups when you configure a VPN rule. The ID type and content act as an extra level of identification for incoming SAs. The type of ID can be a domain name, an IP address or an e-mail address. The content is the IP address, domain name, or e-mail address. Table 41 Local ID Type and Content Fields LOCAL ID TYPE= CONTENT= IP Type the IP address of your computer.
Chapter 13 VPN 13.3.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communications channel. Diffie-Hellman is used within IKE SA setup to establish session keys. Upon completion of the Diffie-Hellman exchange, the two peers have a shared secret, but the IKE SA is not authenticated. For authentication, use pre-shared keys.
C HAPTER 14 Logs 14.1 Overview The web configurator allows you to choose which categories of events and/or alerts to have the LTE Device log and then display the logs or have the LTE Device send them to an administrator (as email) or to a syslog server. 14.1.1 What You Can Do in this Chapter • Use the System Log screen to see the system logs for the categories that you select (Section 14.2 on page 100). 14.1.2 What You Need To Know The following terms and concepts may help as you read this chapter.
Chapter 14 Logs Table 44 Syslog Severity Levels (continued) CODE SEVERITY 6 Informational (INFO): The syslog contains an informational message. 7 Debug (DEBUG): The message is intended for debug-level purposes. 14.2 The System Log Screen Click System Monitor > Log to open the System Log screen. Use the System Log screen to see the system logs for the categories that you select in the upper left drop-down list box.
C HAPTER 15 Traffic Status 15.1 Overview Use the Traffic Status screens to look at network traffic status and statistics of the WAN, LAN interfaces and NAT. 15.1.1 What You Can Do in this Chapter • Use the WAN screen to view the WAN traffic statistics (Section 15.2 on page 101). • Use the LAN screen to view the LAN traffic statistics (Section 15.3 on page 102). • Use the NAT screen to view the NAT status of the LTE Device’s client(s) (Section 15.4 on page 103). 15.
Chapter 15 Traffic Status Table 46 System Monitor > Traffic Status > WAN (continued) LABEL DESCRIPTION Connected Interface This shows the name of the WAN interface that is currently connected. Packets Sent Data This indicates the number of transmitted packets on this interface. Error This indicates the number of frames with errors transmitted on this interface. Drop This indicates the number of outgoing packets dropped on this interface.
Chapter 15 Traffic Status Table 47 System Monitor > Traffic Status > LAN (continued) LABEL DESCRIPTION Drop This indicates the number of outgoing packets dropped on this interface. Received (Packet) Data This indicates the number of received packets on this interface. Error This indicates the number of frames with errors received on this interface. Drop This indicates the number of received packets dropped on this interface. 15.
Chapter 15 Traffic Status 104 LTE6100 User’s Guide
C HAPTER 16 User Account 16.1 Overview You can configure system password for different user accounts in the User Account screen. 16.2 The User Account Screen Use the User Account screen to configure system password. Click Maintenance > User Account to open the following screen. Figure 59 Maintenance > User Account The following table describes the labels in this screen.
Chapter 16 User Account 106 LTE6100 User’s Guide
C HAPTER 17 Remote MGMT 17.1 Overview Remote MGMT allows you to manage your LTE Device from a remote location through the following interfaces: • LAN • WAN only Note: The LTE Device is managed using the web configurator. 17.1.1 What You Need to Know The following terms and concepts may help as you read this chapter 17.2 The Remote MGMT Screen Use this screen to decide what services you may use to access which LTE Device interface. Click Maintenance > Remote MGMT to open the following screen.
Chapter 17 Remote MGMT Table 50 Maintenance > Remote MGMT (continued) 108 LABEL DESCRIPTION Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Apply Click Apply to save your changes. Cancel Click Cancel to restore your previously saved settings.
C HAPTER 18 System 18.1 Overview You can configure system settings, including the host name, domain name and the inactivity timeout interval in the System screen. 18.1.1 What You Need to Know The following terms and concepts may help as you read this chapter. Domain Name This is a network address that identifies the owner of a network connection. For example, in the network address “www.example.com/support/files”, the domain name is “www.example.com”. 18.
Chapter 18 System The following table describes the labels in this screen. Table 51 Maintenance > System LABEL DESCRIPTION Host Name Choose a descriptive name for identification purposes. It is recommended you enter your computer’s “Computer name” in this field. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes “-” and underscores "_" are accepted. Domain Name Enter the domain name (if you know it) here.
C HAPTER 19 Time Setting 19.1 Overview You can configure the system’s time and date in the Time Setting screen. 19.2 The Time Setting Screen To change your LTE Device’s time and date, click Maintenance > Time. The screen appears as shown. Use this screen to configure the LTE Device’s time based on your local time zone. Figure 62 Maintenance > Time Setting The following table describes the fields in this screen.
Chapter 19 Time Setting Table 52 Maintenance > System > Time Setting (continued) LABEL DESCRIPTION Daylight Savings Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.Select this option if you use Daylight Saving Time. Start Date Configure the day and time when Daylight Saving Time starts if you selected Daylight Savings. The o'clock field uses the 24 hour format.
C HAPTER 20 Log Setting 20.1 Overview You can configure where the LTE Device sends logs and which logs and/or immediate alerts the LTE Device records in the Log Setting screen. 20.2 The Log Setting Screen To change your LTE Device’s log settings, click Maintenance > Log Setting. The screen appears as shown. Figure 63 Maintenance > Log Setting The following table describes the fields in this screen.
Chapter 20 Log Setting Table 53 Maintenance > Log Setting (continued) LABEL DESCRIPTION UDP Port Enter the port number used by the syslog server. Active Log and Select Level 114 Log Category Select the categories of logs that you want to record. Log Level Select the severity level of logs that you want to record. If you want to record all logs, select ALL. Apply Click Apply to save your changes. Cancel Click Cancel to restore your previously saved settings.
C HAPTER 21 Firmware Upgrade 21.1 Overview This chapter explains how to upload new firmware to your LTE Device. You can download new firmware releases from your nearest ZyXEL FTP site (or www.zyxel.com) to use to upgrade your device’s performance. Only use firmware for your device’s specific model. Refer to the label on the bottom of your LTE Device. 21.2 The Firmware Upgrade Screen Click Maintenance > Firmware Upgrade to open the following screen.
Chapter 21 Firmware Upgrade After you see the firmware updating screen, wait a few minutes before logging into the LTE Device again. Figure 65 Firmware Uploading The LTE Device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 66 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen.
C HAPTER 22 Backup/Restore 22.1 Overview The Backup/Restore screen allows you to backup and restore device configurations. You can also reset your device settings back to the factory default. 22.2 The Backup/Restore Screen Click Maintenance > Backup/Restore. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next.
Chapter 22 Backup/Restore Restore Configuration Restore Configuration allows you to upload a new or previously saved configuration file from your computer to your LTE Device. Table 55 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click this to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them.
Chapter 22 Backup/Restore Reset to Factory Defaults Click the Reset button to clear all user-entered configuration information and return the LTE Device to its factory defaults. The following warning screen appears. Figure 70 Reset Warning Message Figure 71 Reset In Process Message You can also press the RESET button on the back panel to reset the factory defaults of your LTE Device. Refer to Section 1.6 on page 15 for more information on the RESET button. 22.
Chapter 22 Backup/Restore 120 LTE6100 User’s Guide
C HAPTER 23 Diagnostic 23.1 Overview You can use different diagnostic methods to test a connection and see the detailed information. These read-only screens display information to help you identify problems with the LTE Device. 23.2 The Ping/TraceRoute Screen Ping and traceroute help check availability of remote hosts and also help troubleshoot network or Internet connections. Click Maintenance > Diagnostic to open the Ping/TraceRoute screen shown next.
Chapter 23 Diagnostic 122 LTE6100 User’s Guide
C HAPTER 24 Troubleshooting 24.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • LTE Device Access and Login • Internet Access • UPnP 24.2 Power, Hardware Connections, and LEDs The LTE Device does not turn on. None of the LEDs turn on. 1 Make sure the LTE Device is turned on. 2 Make sure you are using the power adaptor or cord included with the LTE Device.
Chapter 24 Troubleshooting 5 If the problem continues, contact the vendor. 24.3 LTE Device Access and Login I forgot the IP address for the LTE Device. 1 The default IP address is 192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the LTE Device by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 24 Troubleshooting 5 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the LTE Device using another service, such as Telnet. If you can access the LTE Device, check the remote management settings and firewall rules to find out why the LTE Device does not respond to HTTP. • If your computer is connected to the WAN port or is connected wirelessly, use a computer that is connected to a ETHERNET port.
Chapter 24 Troubleshooting 2 Turn the LTE Device off and on. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5 on page 14. If the LTE Device is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications. 2 Turn the LTE Device off and on.
A PPENDIX A IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (such as computers, servers, routers, and printers) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 73 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix A IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Appendix A IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 60 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 75 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix A IP Addresses and Subnetting Table 61 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 62 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix A IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 65 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix A IP Addresses and Subnetting Table 67 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX B Setting Up Your Computer’s IP Address Note: Your specific LTE Device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address 1 Click Start > Control Panel. Figure 79 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 81 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 83 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 84 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 85 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 87 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 88 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 90 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. Figure 91 Windows 7: Start Menu 2 In the Control Panel, click View network status and tasks under the Network and Internet category. Figure 92 Windows 7: Control Panel 3 Click Change adapter settings.
Appendix B Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Figure 94 Windows 7: Local Area Connection Status Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 96 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Figure 97 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 98 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 2 In the System Preferences window, click the Network icon. Figure 99 Mac OS X 10.4: System Preferences 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 100 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 101 Mac OS X 10.4: Network Preferences > TCP/IP Tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, type the IP address of your device. Figure 102 Mac OS X 10.4: Network Preferences > Ethernet 6 Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 103 Mac OS X 10.4: Network Utility Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5.
Appendix B Setting Up Your Computer’s IP Address 1 Click Apple > System Preferences. Figure 104 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 105 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 106 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your LTE Device. Figure 107 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 108 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 110 Ubuntu 8: Network Settings > Connections 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix B Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 112 Ubuntu 8: Network Settings > Connections 5 The Properties dialog box opens. Figure 113 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
Appendix B Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 114 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 115 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 1 Click K Menu > Computer > Administrator Settings (YaST). Figure 116 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 117 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 118 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 119 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 120 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 121 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 122 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address 166 LTE6100 User’s Guide
A PPENDIX C Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 125 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 168 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix C Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 126 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix C Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 127 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix C Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 128 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 129 Security Settings - Java Scripting Java Permissions 172 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 130 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 131 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, JavaScript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScript and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScript and Java Permissions 176 LTE6100 User’s Guide
A PPENDIX D Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix D Common Services Table 68 Commonly Used Services (continued) 178 NAME PROTOCOL PORT(S) DESCRIPTION ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management.
Appendix D Common Services Table 68 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
Appendix D Common Services 180 LTE6100 User’s Guide
A PPENDIX E Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna.
Appendix E Legal Information 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix E Legal Information 184 LTE6100 User’s Guide
Index Index A DHCP 28, 40, 67 administrator password 17 Differentiated Services, see DiffServ AH 92 Diffie-Hellman key groups 98 algorithms 92 DiffServ (Differentiated Services) marking rule 58 alternative subnet mask notation 130 diagnostic 121 applications Internet access 13 DNS 40 automatic logout 18 documentation related 2 DNS server address assignment 35 domain name system, see DNS B Domain Name System. See DNS.
Index G M Guide Quick Start 2 MAC address 43 MAC 27, 79 MAC address filtering 79 MAC filter 79 host 105 managing the device good habits 14 using FTP. See FTP.
Index Q T QoS 49, 57 The 31 Quality of Service, see QoS transport mode 93 Quick Start Guide 2, 17 tunnel mode 93 R U registration product 183 Universal Plug and Play, see UPnP related documentation 2 UPnP 43 security issues 40 reset 119 upgrading firmware 115 RESET button 15 restart 119 restoring configuration 118 RFC 1631 59 RFC 3164 99 router features 13 S V version firmware version 27 W safety warnings 183 security, network 76 service access control 107 static route 45 status 25 stat
Index 188 LTE6100 User’s Guide
Index LTE6100 User’s Guide 189