MAX-206M1R Series WiMAX MIMO Indoor Simple CPE Default Login Details IP Address: http://192.168.1.1 User Name: admin Password: 1234 Firmware Version 3.70 www.zyxel.com Edition 2, 07/2009 www.zyxel.
About This User's Guide About This User's Guide The following devices are covered in this book: MODEL MAX-206M1R MAX-216M1R FEATURES 1 VoIP Port 1 LAN Port MAX-236M1R MAX-216M1R plus MAX-216MR 2 External Antennas 1 VoIP Port 1 LAN Port 1 LAN Port All graphics and Web Configurator screens shown in this book are based on the MAX-206M1R unless otherwise noted. Intended Audience This manual is intended for people who want to configure the ZyXEL WiMAX Modem using the web configurator.
About This User's Guide • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User’s Guide Feedback Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. E-mail: techwriters@zyxel.com.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your WiMAX Modem. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The product(s) described in this book may be referred to as the “WiMAX Modem”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Modem icon is not an exact representation of your WiMAX Modem.
Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings • Make sure that the cable system is grounded so as to provide some protection against voltage surges. Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
Contents Overview Contents Overview Introduction and Wizards ...................................................................................................... 29 Getting Started ........................................................................................................................... 31 Introducing the Web Configurator .............................................................................................. 37 Internet Connection Wizard ...........................................
Contents Overview 10 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 3.1.5 Setup Complete ......................................................................................................... 50 Chapter 4 VoIP Connection Wizard......................................................................................................... 51 4.1 Overview .............................................................................................................................. 51 4.2 Welcome to the ZyXEL Setup Wizard ........................................
Table of Contents 6.6.5 RIP Setup ................................................................................................................... 74 6.6.6 Multicast ..................................................................................................................... 75 Chapter 7 The WAN Configuration Screens........................................................................................... 77 7.1 Overview .........................................................................
Table of Contents Part IV: Voice Screens ......................................................................... 109 Chapter 10 The Service Configuration Screens .................................................................................... 111 10.1 Overview ...........................................................................................................................111 10.1.1 What You Can Do in This Chapter ..........................................................................
Table of Contents Part V: Tools & Status Screens........................................................... 145 Chapter 13 The Certificates Screens ...................................................................................................... 147 13.1 Overview .......................................................................................................................... 147 13.1.1 What You Can Do in This Chapter .........................................................................
Table of Contents 16.1.1 What You Can Do in This Chapter ......................................................................... 183 16.1.2 What You Need to Know ........................................................................................ 184 16.2 WWW .............................................................................................................................. 185 16.3 Telnet ......................................................................................................
Table of Contents 20.1 Power, Hardware Connections, and LEDs ...................................................................... 229 20.2 WiMAX Modem Access and Login .................................................................................. 230 20.3 Internet Access ................................................................................................................ 232 20.4 Phone Calls and VoIP ..........................................................................................
Table of Contents 18 User’s Guide
List of Figures List of Figures Figure 1 Mobile Station and Base Station ............................................................................................... 32 Figure 2 WiMAX Modem’s VoIP Features - Peer-to-Peer Calls ............................................................. 33 Figure 3 WiMAX Modem’s VoIP Features - Calls via VoIP Service Provider ......................................... 33 Figure 4 The WiMAX Modem’s LEDs ....................................................................
List of Figures Figure 39 ADVANCED > NAT Configuration > ALG ............................................................................... 97 Figure 40 ADVANCED > System Configuration > General .................................................................. 101 Figure 41 ADVANCED > System Configuration > Dynamic DNS ......................................................... 103 Figure 42 ADVANCED > System Configuration > Firmware ................................................................
List of Figures Figure 82 TOOLS > Remote Management > Security ......................................................................... 191 Figure 83 TR-069 Example .................................................................................................................. 192 Figure 84 TOOLS > Remote Management > TR069 ............................................................................ 193 Figure 85 QoS > General .............................................................................
List of Figures Figure 125 Ubuntu 8: Network Tools .................................................................................................... 281 Figure 126 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 282 Figure 127 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 283 Figure 128 openSUSE 10.3: YaST Control Center ...............................................................
List of Figures Figure 168 Internet Explorer 7: Root Certificate Store .......................................................................... 320 Figure 169 Firefox 2: Website Certified by an Unknown Authority ....................................................... 322 Figure 170 Firefox 2: Page Info ............................................................................................................ 323 Figure 171 Firefox 2: Tools Menu ...........................................................
List of Figures 24 User’s Guide
List of Tables List of Tables Table 1 Common Icons ............................................................................................................................ 6 Table 2 The WiMAX Modem .................................................................................................................. 34 Table 3 Main > Icons ............................................................................................................................. 41 Table 4 Main ............................
List of Tables Table 38 Custom Tones Details ........................................................................................................... 120 Table 39 VOICE > Service Configuration > QoS ................................................................................. 122 Table 40 SIP Call Progression ............................................................................................................. 123 Table 41 VOICE > Phone > Analog Phone .........................................
List of Tables Table 81 Access Control Logs ............................................................................................................. 206 Table 82 TCP Reset Logs .................................................................................................................... 207 Table 83 Packet Filter Logs ................................................................................................................. 207 Table 84 ICMP Logs ...........................................
List of Tables Table 124 16-bit Network Number Subnet Planning ............................................................................ 307 Table 125 Commonly Used Services ...................................................................................................
P ART I Introduction and Wizards Getting Started (31) Introducing the Web Configurator (37) Internet Connection Wizard (45) VoIP Connection Wizard (51) 29
CHAPTER 1 Getting Started The following devices are covered in this book: MODEL MAX-206M1R MAX-216M1R FEATURES 1 VoIP Port 1 LAN Port MAX-236M1R MAX-216M1R plus MAX-216MR 2 External Antennas 1 VoIP Port 1 LAN Port 1 LAN Port All graphics and Web Configurator screens shown in this book are based on the MAX-206M1R unless otherwise noted. 1.1 About Your WiMAX Modem The WiMAX Modem has a built-in switch and one phone port. It allows you to access the Internet by connecting to a WiMAX wireless network.
Chapter 1 Getting Started 1.1.1 WiMAX Internet Access Connect your computer or network to the WiMAX Modem for WiMAX Internet access. See the Quick Start Guide for instructions on hardware connection. In a wireless metropolitan area network (MAN), the WiMAX Modem connects to a WiMAX base station (BS) for Internet access. The following diagram shows a notebook computer equipped with the WiMAX Modem connecting to the Internet through a WiMAX base station (marked BS).
Chapter 1 Getting Started 1.1.2 Make Calls via Internet Telephony Service Provider In a home or small office environment, you can use the WiMAX Modem to make and receive the following types of VoIP telephone calls: • Peer-to-Peer calls - Use the WiMAX Modem to make a call directly to the recipient’s IP address without using a SIP proxy server.
Chapter 1 Getting Started 1.2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Modem. Figure 4 The WiMAX Modem’s LEDs POWER WIMAX LINK STRENGTH INDICATORS VOICE The following table describes your WiMAX Modem’s LEDs (from right to left). Table 2 The WiMAX Modem 34 LED STATE DESCRIPTION Power Off The WiMAX Modem is not receiving power.
Chapter 1 Getting Started Table 2 The WiMAX Modem LED STATE DESCRIPTION LAN Off The LAN is not connected. Green The WiMAX Modem has a successful Local Area Network (Ethernet) connection and is active during modem activity. Off No SIP account is registered, or the WiMAX Modem is not receiving power. Green A SIP account is registered. Green (Blinking) A SIP account is registered, and the phone attached to the LINE port is in use (off the hook).
Chapter 1 Getting Started 1.3 Good Habits for Managing the Device Do the following things regularly to make the WiMAX Modem more secure and to manage the WiMAX Modem more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. • Back up the configuration (and make sure you know how to restore it).
CHAPTER 2 Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 2 Introducing the Web Configurator 38 4 A password screen displays. The default password (“1234”) displays in nonreadable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login. 5 The following screen displays if you have not yet changed your password. It is highly recommended you change the default password.
Chapter 2 Introducing the Web Configurator 6 Click Apply in the next screen to create a certificate using your WiMAX Modem’s MAC address that will be specific to this device. This certificate is used for authentication when using a secure HTTPS connection over the Internet. 7 A screen displays to let you choose to go to the Wizard or the Advanced screens. • Click Go to Wizard setup if you are logging in for the first time or if you want to make basic changes.
Chapter 2 Introducing the Web Configurator 2.1.2 The Reset Button If you forget your password or cannot access the web configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”. 2.1.2.1 Using The Reset Button 40 1 Make sure the Power light is on (not blinking).
Chapter 2 Introducing the Web Configurator 2.2 The Main Screen When you first log into the web configurator and by-pass the wizard, the Main screen appears. Here you can view a summary of your WiMAX Modem connection status. This is also the default “home” page for the ZyXEL web configurator and it contains conveniently-placed shortcuts to all of the other screens. Note: Some features in the web configurator may not be available depending on your firmware version and/or configuration.
Chapter 2 Introducing the Web Configurator Table 3 Main > Icons (continued) ICON DESCRIPTION VOICE Click to go to the Voice screen, where you can configure your voice service and phone settings. TOOLS Click to go the Tools screen, where you can configure your firewall, QoS, and content filter, among other things. STATUS Click to go to the Status screen, where you can view status and statistical information for all connections and interfaces.
Chapter 2 Introducing the Web Configurator Table 4 Main (continued) LABEL DESCRIPTION Software Version This field indicates the version number of the WiMAX Modem’s firmware. The version number takes the form of: Version(Build),release status (candidate) | Version Release Date. For example: V3.60(BCC.0)c4 | 07/08/2008 indicates that the firmware is 3.60, build BCC.0, candidate4, released on July 08, 2008.
Chapter 2 Introducing the Web Configurator 44 User’s Guide
CHAPTER 3 Internet Connection Wizard 3.1 Overview This chapter provides information on the ZyXEL Setup Wizard screens. The wizard guides you through several steps where you can configure your Internet and VoIP settings. 3.1.1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard. You can choose to either configure your Internet connection or your VoIP connection. The Internet Connection Wizard screens are described in detail in the following sections.
Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (see Section 9.2 on page 101 for more). Figure 7 Internet Connection Wizard > System Information The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard 3.1.3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (see Section 7.2 on page 80 for more information). Figure 8 Internet Connection Wizard > Authentication Settings Screen The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL DESCRIPTION PKM This field displays the Privacy Key Management version number. PKM provides security between the WiMAX Modem and the base station. At the time of writing, the WiMAX Modem supports PKMv2 only. See the WiMAX security appendix for more information. Authentication This field displays the user authentication method.
Chapter 3 Internet Connection Wizard 3.1.4 IP Address This Internet Connection Wizard screen allows you to configure your IP address. The settings here correspond to the SETUP > Set IP Address screen (see Section 5.2 on page 58). A fixed IP address is a static IP that your ISP gives you. An automatic (dynamic) IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
Chapter 3 Internet Connection Wizard 3.1.5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings. Figure 10 Internet Connection Wizard > Complete Launch your web browser and navigate to www.zyxel.com. If everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator.
CHAPTER 4 VoIP Connection Wizard 4.1 Overview This chapter shows you how to use the wizard to set up your voice account(s). The WiMAX Modem has Voice over IP (VoIP) communication capabilities that allow you to use a traditional analog telephone to make Internet calls. You can configure the WiMAX Modem to use up to two SIP based VoIP accounts. 4.2 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard.
Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 10.2 on page 113 for more information).
Chapter 4 VoIP Connection Wizard Table 8 VoIP Connection > First Voice Account Settings (continued) LABEL DESCRIPTION Check here to set up SIP2 settings. This screen configures SIP account 1. Select the check box if you have a second SIP account that you want to use. You will need to configure the same fields for the second SIP account. Back Click to return to the previous screen. Apply Click to complete the wizard setup and save your configuration.
Chapter 4 VoIP Connection Wizard Internet connection was already working, you can click Back and try re-entering your SIP account settings. Figure 14 VoIP Connection > SIP Registration Fail 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings. Figure 15 VoIP Connection > Finish This screen displays if your SIP account registration was successful.
P ART II Basic Screens The Main Screen (41) The Setup Screens (57) 55
CHAPTER 5 The Setup Screens 5.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 5.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 5.2 on page 58) lets you configure the WiMAX Modem’s IP address and subnet mask. • The DHCP Client screen (Section 5.3 on page 59) to view connection information for clients configured by the WiMAX Modem’s internal DHCP server. • The Time Setting screen (Section 5.
Chapter 5 The Setup Screens you entered. You do not need to change the computer subnet mask unless you are instructed to do so. Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server. Not all servers use the same format. Time A network protocol for retrieving the current time from a server.
Chapter 5 The Setup Screens The following table describes the labels in this screen. Table 9 SETUP > Set IP Address LABEL DESCRIPTION IP Address Enter the IP address of the WiMAX Modem on the LAN. Note: This field is the IP address you use to access the WiMAX Modem on the LAN. If the web configurator is running on a computer on the LAN, you lose access to it as soon as you change this field and click Apply. You can access the web configurator again by typing the new IP address in the browser.
Chapter 5 The Setup Screens Table 10 SETUP > Set IP Address (continued) LABEL DESCRIPTION Reserve This indicates whether the IP address for the connected client device is reserved. When the DHCP server issues IP addresses, reserved IPs are assigned to specific client devices. If the IP address is reserved, the client device identified by its MAC address will always receive this IP address from the DHCP server. Apply Click to save your changes. Refresh Click to refresh the information in the screen.
Chapter 5 The Setup Screens Table 11 SETUP > Time Setting (continued) LABEL DESCRIPTION Current Date Displays the current time according to the WiMAX Modem. Time and Date Setup Manual Select this if you want to specify the current date and time in the fields below. New Time Enter the new time in this field, and click Apply. New Date Enter the new date in this field, and click Apply.
Chapter 5 The Setup Screens the list in order until either it is successful or all the pre-defined NTP time servers have been tried. Table 12 Pre-defined NTP Time Servers ntp1.cs.wisc.edu ntp1.gbg.netnod.se ntp2.cs.wisc.edu tock.usno.navy.mil ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw 5.4.
P ART III Advanced Screens The LAN Configuration Screens (65) The WAN Configuration Screens (77) The NAT Configuration Screens (89) The System Configuration Screens (99) 63
CHAPTER 6 The LAN Configuration Screens 6.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Modem on the LAN. You can configure its IP address and subnet mask, DHCP services, and other subnets. You can also control how the WiMAX Modem sends routing information using RIP. A Local Area Network (LAN) is a shared communication system to which many computers are attached.
Chapter 6 The LAN Configuration Screens Subnet Masks Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a networking device before you can access it.
Chapter 6 The LAN Configuration Screens The following table describes the labels in this screen. Table 13 ADVANCED > LAN Configuration > DHCP Setup LABEL DESCRIPTION DHCP Setup Enable DHCP Server Select this if you want the WiMAX Modem to be the DHCP server on the LAN. As a DHCP server, the WiMAX Modem assigns IP addresses to DHCP clients on the LAN and provides the subnet mask and DNS server information.
Chapter 6 The LAN Configuration Screens 6.3 Static DHCP Click ADVANCED > LAN Configuration > Static DHCP to assign specific IP addresses to specific computers on the LAN. Note: This screen has no effect if the DHCP server is not enabled. You can enable it in ADVANCED > LAN Configuration > DHCP Setup. Figure 20 ADVANCED > LAN Configuration > Static DHCP The following table describes the labels in this screen.
Chapter 6 The LAN Configuration Screens 6.4 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Modem. Note: The first static route is the default route and cannot be modified or deleted. Figure 21 Advanced> LAN Configuration > IP Static Route The following table describes the icons in this screen. Table 15 Advanced> LAN Configuration > IP Static Route ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item.
Chapter 6 The LAN Configuration Screens 6.4.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Modem. Figure 22 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen. Table 17 Management > Static Route > IP Static Route > Edit LABEL DESCRIPTION Route Name Enter the name of the static route. Active Select this if you want the static route to be used.
Chapter 6 The LAN Configuration Screens Table 17 Management > Static Route > IP Static Route > Edit (continued) LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 6.5 Other Settings Click ADVANCED > LAN Configuration > Other Settings to set the RIP and Multicast options. Figure 23 ADVANCED > LAN Configuration > Advanced The following table describes the labels in this screen.
Chapter 6 The LAN Configuration Screens Table 18 ADVANCED > LAN Configuration > Other Settings (continued) LABEL DESCRIPTION Multicast You do not have to enable multicasting to use RIP-2M. (See RIP Version.) Select which version of IGMP the WiMAX Modem uses to support multicasting on the LAN. Multicasting sends packets to some computers on the LAN and is an alternative to unicasting (sending packets to one computer) and broadcasting (sending packets to every computer).
Chapter 6 The LAN Configuration Screens Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your WiMAX Modem, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your WiMAX Modem will compute the subnet mask automatically based on the IP address that you entered.
Chapter 6 The LAN Configuration Screens 6.6.4 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask. There are two ways that an ISP disseminates the DNS server addresses.
Chapter 6 The LAN Configuration Screens • None - the WiMAX Modem will not send any RIP packets and will ignore any RIP packets received. The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Modem sends (it recognizes both formats when receiving). RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology.
Chapter 6 The LAN Configuration Screens 76 User’s Guide
CHAPTER 7 The WAN Configuration Screens 7.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Modem’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet. A WAN configuration can include switched and permanent telephone circuits, terrestrial radio systems and satellite systems. 7.1.1 What You Can Do in This Chapter • The Internet Connection screen (Section 7.
Chapter 7 The WAN Configuration Screens from one base station to another base station (handover) while subscriber stations use other standards that do not have this capability (IEEE 802.16-2004, for example). The following figure shows an MS-equipped notebook computer MS1 moving from base station BS1’s coverage area and connecting to BS2. Figure 24 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations.
Chapter 7 The WAN Configuration Screens Authentication When authenticating a user, the base station uses a third-party RADIUS or Diameter server known as an AAA (Authentication, Authorization and Accounting) server to authenticate the mobile or subscriber stations. The following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to access the Internet.
Chapter 7 The WAN Configuration Screens 7.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Modem’s Internet settings. Note: Not all WiMAX Modem models have all the fields shown here. Figure 27 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION PKM This field displays the Privacy Key Management version number. PKM provides security between the WiMAX Modem and the base station. At the time of writing, the WiMAX Modem supports PKMv2 only. See the WiMAX security appendix for more information. Authentication This field displays the user authentication method.
Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Get automatically from ISP (Default) Select this if you have a dynamic IP address. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Use Fixed IP Address A static IP address is a fixed IP that your ISP gives you. Type your ISP assigned IP address in the IP Address field below.
Chapter 7 The WAN Configuration Screens Radio frequency is measured in Hertz (Hz). Table 20 Radio Frequency Conversion 1 kHz = 1000 Hz 1 MHz = 1000 kHz (1000000 Hz) 1 GHz = 1000 MHz (1000000 kHz) Figure 28 ADVANCED > WAN Configuration >WiMAX Configuration The following table describes the labels in this screen. Table 21 ADVANCED > WAN Configuration >WiMAX Configuration LABEL DESCRIPTION DL Frequency / Bandwidth These fields show the downlink frequency settings in kilohertz (kHz).
Chapter 7 The WAN Configuration Screens 7.3.1 Frequency Ranges The following figure shows the WiMAX Modem searching a range of frequencies to find a connection to a base station. Figure 29 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Modem is capable of using to transmit and receive (see the Product Specifications appendix for details). In the figure, B shows the operator frequency range.
Chapter 7 The WAN Configuration Screens Note: It may take several minutes for the WiMAX Modem to find a connection. • The WiMAX Modem searches the DL Frequency settings in ascending numerical order, from [1] to [9]. Note: The Bandwidth field is not user-configurable; when the WiMAX Modem finds a WiMAX connection, its frequency is displayed in this field. • If you enter a 0 in a DL Frequency field, the WiMAX Modem immediately moves on to the next DL Frequency field.
Chapter 7 The WAN Configuration Screens 4 In the DL Frequency [4] field, enter 2625000. Leave the rest of the DL Frequency fields at zero. The screen appears as follows. Figure 30 Completing the WiMAX Frequency Screen 5 Click Apply. The WiMAX Modem stores your settings. When the WiMAX Modem searches for available frequencies, it scans all frequencies from DL Frequency [1] to DL Frequency [4].
Chapter 7 The WAN Configuration Screens Table 23 ADVANCED > WAN Configuration > Advanced (continued) LABEL DESCRIPTION Apply Click to save your changes. Reset Click to restore your previously saved settings. 7.5 Advanced Click ADVANCED > WAN Configuration > Advanced to configure your DNS server, RIP, Multicast and Windows Networking settings.
Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 24 ADVANCED > WAN Configuration > Advanced LABEL DESCRIPTION DNS Servers First, Second and Third DNS Server Select Obtained from ISP if your ISP dynamically assigns DNS server information (and the WiMAX Modem's WAN IP address). Use the drop-down list box to select a DNS server IP address that the ISP assigns in the field to the right. Select UserDefined if you have the IP address of a DNS server.
CHAPTER 8 The NAT Configuration Screens 8.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network. For example, you can use a NAT router to map one IP address from your ISP to multiple private IP addresses for the devices in your home network. 8.1.
Chapter 8 The NAT Configuration Screens The following table describes the labels in this screen. Table 25 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Address Translation Select this if you want to use port forwarding, trigger ports, or any of the ALG. Max NAT/Firewall Session Per User When computers use peer to peer applications, such as file sharing applications, they may use a large number of NAT sessions.
Chapter 8 The NAT Configuration Screens For example, let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 34 Multiple Servers Behind NAT Example 8.3.
Chapter 8 The NAT Configuration Screens The following table describes the icons in this screen. Table 26 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen.
Chapter 8 The NAT Configuration Screens 8.3.2 Port Forwarding Rule Setup Click a port forwarding rule’s Edit icon in the ADVANCED > NAT Configuration > Port Forwarding screen to activate, deactivate, or edit it. Figure 36 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup The following table describes the labels in this screen. Table 28 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup LABEL DESCRIPTION Active Select this to enable this rule. Clear this to disable this rule.
Chapter 8 The NAT Configuration Screens 8.4 Trigger Port Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address.
Chapter 8 The NAT Configuration Screens Table 29 ADVANCED > NAT Configuration > Trigger Port (continued) LABEL Start Port End Port DESCRIPTION Enter the incoming port number or range of port numbers you want to forward to the IP address the WiMAX Modem records. To forward one port number, enter the port number in the Start Port and End Port fields.
Chapter 8 The NAT Configuration Screens 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the WiMAX Modem to record Jane’s computer IP address. The WiMAX Modem associates Jane's computer IP address with the "incoming" port range of 6970-7170. 3 The Real Audio server responds using a port number ranging between 6970-7170. 4 The WiMAX Modem forwards the traffic to Jane’s computer IP address.
Chapter 8 The NAT Configuration Screens Click ADVANCED > NAT Configuration > ALG to enable and disable SIP (VoIP), FTP (file transfer), and H.323 (audio-visual) ALG in the WiMAX Modem. Figure 39 ADVANCED > NAT Configuration > ALG The following table describes the labels in this screen. Table 30 ADVANCED > NAT Configuration > ALG User’s Guide LABEL DESCRIPTION Enable SIP ALG Select this to make sure SIP (VoIP) works correctly with portforwarding and port-triggering rules.
Chapter 8 The NAT Configuration Screens 98 User’s Guide
CHAPTER 9 The System Configuration Screens 9.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 9.1.1 What You Can Do in This Chapter • The General screen (Section 9.2 on page 101) lets you change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. • The Dynamic DNS screen (Section 9.
Chapter 9 The System Configuration Screens • In Windows XP: Click Start > My Computer > View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the WiMAX Modem System Name. Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used.
Chapter 9 The System Configuration Screens 9.2 General Click ADVANCED > System Configuration > General to change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. Figure 40 ADVANCED > System Configuration > General The following table describes the labels in this screen. Table 31 ADVANCED > System Configuration > General LABEL DESCRIPTION System Setup System Name Enter your computer's "Computer Name".
Chapter 9 The System Configuration Screens Table 31 ADVANCED > System Configuration > General (continued) LABEL DESCRIPTION Retype to Confirm Enter the new password again. Apply Click to save your changes. Reset Click to restore your previously saved settings. 9.3 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.).
Chapter 9 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client. Figure 41 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 32 ADVANCED > System Configuration > Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup User’s Guide Enable Dynamic DNS Select this to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider.
Chapter 9 The System Configuration Screens Table 32 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Enable offline option This field is available when CustomDNS is selected in the DDNS Type field. Select this if your Dynamic DNS service provider redirects traffic to a URL that you can specify while you are off line. Check with your Dynamic DNS service provider.
Chapter 9 The System Configuration Screens The following table describes the labels in this screen. Table 33 ADVANCED > System Configuration > Firmware LABEL DESCRIPTION File Path Enter the location of the *.bin file you want to upload, or click Browse... to find it. You must decompress compressed (.zip) files before you can upload them. Browse... Click this to find the *.bin file you want to upload. Upload Click this to begin uploading the selected file. This may take up to two minutes.
Chapter 9 The System Configuration Screens 9.5 Configuration Click ADVANCED > System Configuration > Configuration to back up or restore the configuration of the WiMAX Modem. You can also use this screen to reset the WiMAX Modem to the factory default settings. Figure 43 ADVANCED > System Configuration > Configuration The following table describes the labels in this screen.
Chapter 9 The System Configuration Screens 9.5.1 The Restore Configuration Process When the WiMAX Modem restores a configuration file, the device automatically restarts. This causes a temporary network disconnect. Note: Do not turn off the device while configuration file upload is in progress. If the WiMAX Modem’s IP address is different in the configuration file you selected, you may need to change the IP address of your computer to be in the same subnet as that of the default management IP address (192.
Chapter 9 The System Configuration Screens 9.6.1 The Restart Process When you click Restart, the the process usually takes about two minutes. Once the restart is complete you can log in again.
P ART IV Voice Screens The Service Configuration Screens (111) The Phone Screens (129) The Phone Book Screens (139) 109
CHAPTER 10 The Service Configuration Screens 10.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail.
Chapter 10 The Service Configuration Screens multimedia sessions over the Internet. SIP signaling is separate from the media for which it handles sessions. The media that is exchanged during the session can use a different path from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched telephone networks. SIP Identities A SIP account uses an identity (sometimes referred to as a SIP address).
Chapter 10 The Service Configuration Screens 10.1.3 Before you Begin • Ensure that you have all of your voice account information on hand. If not, contact your voice account service provider to find out which settings in this chapter you should configure in order to use your telephone with the WiMAX Modem. • Connect your WiMAX Modem to the Internet, as described in the Quick Start Guide. If you have not already done so, then you will not be able to test your VoIP settings. 10.
Chapter 10 The Service Configuration Screens The following table describes the labels in this screen. Table 36 VOICE > Service Configuration > SIP Setting LABEL DESCRIPTION SIP Account Select the SIP account you want to see in this screen. If you change this field, the screen automatically refreshes. SIP Settings Active SIP Account Select this if you want the WiMAX Modem to use this account. Clear it if you do not want the WiMAX Modem to use this account. Number Enter your SIP number.
Chapter 10 The Service Configuration Screens 10.2.1 Advanced SIP Settings This section describes the features of the Advanced SIP settings screen. 10.2.1.1 STUN STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) allows the WiMAX Modem to find the presence and types of NAT routers and/or firewalls between it and the public Internet.
Chapter 10 The Service Configuration Screens • G.711 is a Pulse Code Modulation (PCM) waveform codec. PCM measures analog signal amplitudes at regular time intervals (sampling) and converts them into digital bits (quantization). Quantization “reads” the analog signal and then “writes” it to the nearest digital value. For this reason, a digital sample is usually slightly different from its analog original (this difference is known as “quantization noise”). G.
Chapter 10 The Service Configuration Screens 10.2.1.5 Advanced SIP Settings Options Click Advanced in VOICE > Service Configuration > SIP Settings to set up and maintain advanced settings for each SIP account. Figure 47 VOICE > Service Configuration > SIP Settings > Advanced The following table describes the labels in this screen.
Chapter 10 The Service Configuration Screens Table 37 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Duration Enter the number of seconds your SIP account is registered with the SIP register server before it is deleted. The WiMAX Modem automatically tries to re-register your SIP account when one-half of this time has passed. (The SIP register server might have a different expiration.
Chapter 10 The Service Configuration Screens Table 37 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION STUN Active Select this if all of the following conditions are satisfied. • • • • There is a NAT router between the WiMAX Modem and the SIP server. The NAT router is not a SIP ALG. Your VoIP service provider gave you an IP address or domain name for a STUN server. Otherwise, clear this field.
Chapter 10 The Service Configuration Screens Table 37 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Time Keep the default value, unless your VoIP service provider tells you to change it. Enter the number of seconds the SIP server should provide the message waiting service each time the WiMAX Modem subscribes to the service. Before this time passes, the WiMAX Modem automatically subscribes again. Fax Option G.
Chapter 10 The Service Configuration Screens Table 38 Custom Tones Details LABEL DESCRIPTION Maximum Time per Individual Tone 20 seconds Total Number of Tones Recordable 8 You can record up to eight different custom tones but the total time must be 128 seconds or less. Use the following steps if you would like to create new tones or change your tones: 1 Pick up the phone and press **** on your phone’s keypad and wait for the message that says you are in the configuration menu.
Chapter 10 The Service Configuration Screens 10.3 QoS Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Modem) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks. Only stations within the same group can communicate with each other. Your WiMAX Modem can add IEEE 802.
Chapter 10 The Service Configuration Screens Table 39 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure. Enter the VLAN ID provided by your network administrator in the field on the right. Your LAN and gateway must be configured to use VLAN tags. Otherwise, clear this field. Apply Click to save your changes.
Chapter 10 The Service Configuration Screens 6 After talking, A hangs up and sends a BYE request. 7 B replies with an OK response confirming receipt of the BYE request and the call is terminated. 10.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests. A SIP server responds to the SIP requests. When you use SIP to make a VoIP call, it originates at a client and terminates at a server.
Chapter 10 The Service Configuration Screens 2 The SIP proxy server forwards the call invitation to C. Figure 50 SIP Proxy Server B 1 A 2 C 10.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server.
Chapter 10 The Service Configuration Screens 3 Client device A then sends the call invitation to client device C. Figure 51 SIP Redirect Server 1 2 A B 3 C 10.4.6 NAT and SIP The WiMAX Modem must register its public IP address with a SIP register server. If there is a NAT router between the WiMAX Modem and the SIP register server, the WiMAX Modem probably has a private IP address. The WiMAX Modem lists its IP address in the SIP message that it sends to the SIP register server.
Chapter 10 The Service Configuration Screens 10.4.8 DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels. The following figure illustrates the DS field.
Chapter 10 The Service Configuration Screens 128 User’s Guide
CHAPTER 11 The Phone Screens 11.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Modem. You can also select which SIP account to use for making outgoing calls. 11.1.1 What You Can Do in This Chapter • The Analog Phone screen (Section 11.2 on page 130) lets you control which SIP accounts each phone uses. • The Common screen (Section 11.3 on page 132) lets you activate and deactivate immediate dialing.
Chapter 11 The Phone Screens Supplementary Phone Services Overview Supplementary services such as call hold, call waiting, call transfer, etc. are generally available from your VoIP service provider.
Chapter 11 The Phone Screens The following table describes the labels in this screen. Table 41 VOICE > Phone > Analog Phone LABEL DESCRIPTION Phone Port Settings Select the phone port you want to see in this screen. If you change this field, the screen automatically refreshes. Phone Port Settings Displays the phone port number. Outgoing Call Use SIP1 Select this if you want this phone port to use the SIP1 account when it makes calls.
Chapter 11 The Phone Screens The following table describes the labels in this screen. Table 42 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION Voice Volume Control Speaking Volume Enter the loudness that the WiMAX Modem uses for speech that it sends to the peer device. -14 is the quietest, and 14 is the loudest. Listening Volume Enter the loudness that the WiMAX Modem uses for speech that it receives from the peer device. -14 is the quietest, and 14 is the loudest. Echo Cancellation G.
Chapter 11 The Phone Screens The following table describes the labels in this screen. Table 43 VOICE > Phone > Common LABEL DESCRIPTION Active Immediate Dial Select this if you want to use the pound key (#) to tell the WiMAX Modem to make the phone call immediately, instead of waiting the number of seconds you selected in the Dialing Interval Select in VOICE > Phone > Analog Phone. If you select this, dial the phone number, and then press the pound key if you do not want to wait.
Chapter 11 The Phone Screens 11.5 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 11.5.1 The Flash Key Flashing means to press the hook for a short period of time (a few hundred milliseconds) before releasing it. On newer telephones, there should be a "flash" key (button) that generates the signal electronically.
Chapter 11 The Phone Screens If you have another call, press the flash key and then “2” to switch back and forth between caller A and B by putting either one on hold. Press the flash key and then “0” to disconnect the call presently on hold and keep the current call on line. Press the flash key and then “1” to disconnect the current call and resume the call on hold. If you hang up the phone but a caller is still on hold, there will be a remind ring.
Chapter 11 The Phone Screens 4 Hang up the phone to drop the connection. 5 If you want to separate the activated three-way conference into two individual connections (one is on-line, the other is on hold), press the flash key and press “2”. 11.5.3 USA Type Supplementary Services This section describes how to use supplementary phone services with the USA Type Call Service Mode. Commands for supplementary services are listed in the table below.
Chapter 11 The Phone Screens 3 After you hear the ring signal or the second party answers it, hang up the phone. USA Three-Way Conference allows you to make three-way conference calls. To do so: 1 When you are making a call, press the flash key to put the call on hold and get a dial tone. 2 Dial a phone number to make a second call. 3 When the second call is answered, press the flash key to create a three-way conversation.
Chapter 11 The Phone Screens 138 User’s Guide
CHAPTER 12 The Phone Book Screens 12.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Modem’s phone book for making VoIP calls. 12.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 12.2 on page 140) lets you maintain rules for handling incoming calls. You can block, redirect, or accept them. • The Speed Dial screen (Section 12.3 on page 142) lets you add, edit, or remove speed-dial entries. 12.1.
Chapter 12 The Phone Book Screens 12.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 57 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen. Table 47 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION Table Number Select the call-forwarding table you want to see in this screen.
Chapter 12 The Phone Book Screens Table 47 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer Forward to Number Select this if you want the WiMAX Modem to forward incoming calls to the specified phone number if the call is unanswered. (See No Answer Waiting Time.) Specify the phone number in the field on the right. No Answer Waiting Time This field is used by the No Answer Forward to Number feature and No Answer conditions below.
Chapter 12 The Phone Book Screens 12.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters. You can also create speed-dial entries for frequently-used SIP phone numbers. Figure 58 VOICE > Phone Book > Speed Dial The following table describes the icons in this screen.
Chapter 12 The Phone Book Screens The following table describes the labels in this screen. Table 49 VOICE > Phone Book > Speed Dial LABEL DESCRIPTION Speed Dial Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the WiMAX Modem to call when you dial the speed-dial number. Name Enter a name to identify the party you call when you dial the speed-dial number. You can use up to 127 printable ASCII characters.
Chapter 12 The Phone Book Screens 144 User’s Guide
P ART V Tools & Status Screens The Certificates Screens (147) The Firewall Screens (169) Content Filter (179) The Remote Management Screens (183) QoS (195) The Logs Screens (199) The Status Screen (215) 145
CHAPTER 13 The Certificates Screens 13.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Modem. The WiMAX Modem can use public key certificates (also sometimes called “digital IDs”) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 13 The Certificates Screens WiMAX Modem to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 13.2 My Certificates Click TOOLS > Certificates > My Certificates to access this screen. Use this screen to generate and export self-signed certificates or certification requests and import the WiMAX Modem’s CA-signed certificates.
Chapter 13 The Certificates Screens Table 51 TOOLS > Certificates > My Certificates (continued) LABEL DESCRIPTION Name This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. Type This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate.
Chapter 13 The Certificates Screens 13.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Modem create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
Chapter 13 The Certificates Screens The following table describes the labels in this screen. Table 52 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Subject Information Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although the Common Name is mandatory.
Chapter 13 The Certificates Screens Table 52 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Create a certification request and enroll for a certificate immediately online Select Create a certification request and enroll for a certificate immediately online to have the WiMAX Modem generate a request for a certificate and apply to a certification authority for a certificate. You must have the certification authority’s certificate already imported in the Trusted CAs screen.
Chapter 13 The Certificates Screens Table 52 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. If you configured the My Certificate Create screen to have the WiMAX Modem enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen.
Chapter 13 The Certificates Screens 13.2.2 My Certificate Edit Click TOOLS > Certificates > My Certificates then the Edit icon to access this screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 61 TOOLS > Certificates > My Certificates > Edit The following table describes the labels in this screen. Table 53 TOOLS > Certificates > My Certificates > Edit 154 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 13 The Certificates Screens Table 53 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 13 The Certificates Screens Table 53 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. Basic Constraint This field displays general information about the certificate.
Chapter 13 The Certificates Screens 13.2.3 My Certificate Import Click TOOLS > Certificates > My Certificates > Import to access this screen. Use this screen to import a certificate that matches a corresponding certification request that was generated by the WiMAX Modem. You must remove any spaces from the certificate’s filename before you can import it. Figure 62 TOOLS > Certificates > My Certificates > Import The following table describes the labels in this screen.
Chapter 13 The Certificates Screens 13.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs access this screen. Use this screen to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted. The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities.
Chapter 13 The Certificates Screens Table 56 TOOLS > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. Valid From This field displays the date that the certificate becomes applicable.
Chapter 13 The Certificates Screens 13.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 64 TOOLS > Certificates > Trusted CAs > Edit The following table describes the labels in this screen. Table 57 TOOLS > Certificates > Trusted CAs > Edit 160 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 13 The Certificates Screens Table 57 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 13 The Certificates Screens Table 57 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. Basic Constraint This field displays general information about the certificate.
Chapter 13 The Certificates Screens 13.3.2 Trusted CA Import Click TOOLS > Certificates > Trusted CAs and then click Import to open the Trusted CA Import screen. Follow the instructions in this screen to save a trusted certification authority’s certificate from a computer to the WiMAX Modem. The WiMAX Modem trusts any valid certificate signed by any of the imported trusted CA certificates. Note: You must remove any spaces from the certificate’s filename before you can import the certificate.
Chapter 13 The Certificates Screens 13.4.1 Certificate Authorities When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it ought to look.
Chapter 13 The Certificates Screens Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The WiMAX Modem can check a peer’s certificate against a directory server’s list of revoked certificates. The framework of servers, software, procedures and policies that handles keys is called PKI (public-key infrastructure). 13.4.1.
Chapter 13 The Certificates Screens 13.4.2 Verifying a Certificate Before you import a certificate into the WiMAX Modem, you should verify that you have the correct certificate. This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates. 13.4.2.1 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms.
Chapter 13 The Certificates Screens 3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 67 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.
Chapter 13 The Certificates Screens 168 User’s Guide
CHAPTER 14 The Firewall Screens 14.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Modem’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an untrusted network.
Chapter 14 The Firewall Screens the Internet. The WiMAX Modem can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The WiMAX Modem is installed between the LAN and a WiMAX base station connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The WiMAX Modem has one Ethernet (LAN) port.
Chapter 14 The Firewall Screens LAN-to-LAN/WiMAX Modem means the LAN to the WiMAX Modem LAN interface. This is always allowed, as this is how you manage the WiMAX Modem from your local computer. WAN-to-LAN rules are Internet to your local network firewall rules. The default is to block all traffic from the Internet to your local network. How can you forward certain WAN to LAN traffic? You may allow traffic originating from the WAN to be forwarded to the LAN by: • Configuring NAT port forwarding rules.
Chapter 14 The Firewall Screens 14.2.3 Firewall Setting Options Click TOOLS > Firewall > Firewall Setting to configure the basic settings for your firewall. Figure 70 TOOLS > Firewall > Firewall Setting The following table describes the labels in this screen. Table 59 TOOLS > Firewall > Firewall Setting LABEL DESCRIPTION Enable Firewall Select this to activate the firewall. The WiMAX Modem controls access and protects against Denial of Service (DoS) attacks when the firewall is activated.
Chapter 14 The Firewall Screens 14.3 Services Click TOOLS > Firewall > Services to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 71 TOOLS > Firewall > Service Setting The following table describes the labels in this screen. Table 60 TOOLS > Firewall > Service Setting LABEL DESCRIPTION Service Setup Enable Services Blocking Select this to activate service blocking.
Chapter 14 The Firewall Screens Table 60 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Blocked Services This is a list of services (ports) that are inaccessible to computers on your LAN when service blocking is effective. To remove a service from this list, select the service, and click Delete. Type Select TCP or UDP, based on which one the custom port uses. Port Number Enter the range of port numbers that defines the service.
Chapter 14 The Firewall Screens 14.4.2 Guidelines For Enhancing Security With Your Firewall 1 Change the default password via web configurator. 2 Think about access control before you connect to the network in any way. 3 Limit who can access your router. 4 Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could present a potential security risk.
Chapter 14 The Firewall Screens As a result, the WiMAX Modem resets the connection, as the connection has not been acknowledged. Figure 72 “Triangle Route” Problem 14.4.3.1 Solving the “Triangle Route” Problem If you have the WiMAX Modem allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the WiMAX Modem and its firewall protection. Another solution is to use IP alias.
Chapter 14 The Firewall Screens 4 The WiMAX Modem then sends it to the computer on the LAN in Subnet 1.
Chapter 14 The Firewall Screens 178 User’s Guide
CHAPTER 15 Content Filter 15.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs. Content filtering is the ability to block certain web features or specific URL keywords. The WiMAX Modem can block web features such as ActiveX controls, Java applets, cookies and disable web proxies.
Chapter 15 Content Filter 15.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective.
Chapter 15 Content Filter The following table describes the labels in this screen. Table 61 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted Computer IP Address You can allow a specific computer to access all Internet resources without the restrictions you set in these screens. Enter the IP address of the trusted computer. Restrict Web Features Select the web features you want to disable.
Chapter 15 Content Filter 15.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 75 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 62 TOOLS > Content Filter > Schedule 182 LABEL DESCRIPTION Day to Block Select which days of the week you want content filtering to be effective. Time of Day to Block Select what time each day you want content filtering to be effective.
CHAPTER 16 The Remote Management Screens 16.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Modem interface (if any) from which computers. You may manage your WiMAX Modem from a remote location via: Table 63 Remote Management • Internet (WAN only) • ALL (LAN and WAN) • LAN only • Neither (Disable).
Chapter 16 The Remote Management Screens • The SNMP screen (Section 16.5 on page 187) lets you control SNMP access to your WiMAX Modem. • The DNS screen (Section 16.6 on page 190) lets you control DNS access to your WiMAX Modem. • The Security screen (Section 16.7 on page 191) lets you control how your WiMAX Modem responds to other types of requests. • The TR069 screen (Section 16.8 on page 192) lets you configure the WiMAX Modem’s auto-configuration and dynamic service configuration options. 16.1.
Chapter 16 The Remote Management Screens SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your WiMAX Modem supports SNMP agent functionality, which allows a manager station to manage and monitor the WiMAX Modem through the network. The WiMAX Modem supports SNMP version one (SNMPv1) and version two (SNMPv2). The next figure illustrates an SNMP management operation.
Chapter 16 The Remote Management Screens 16.3 Telnet Click TOOLS > Remote Management > Telnet to control Telnet access to your WiMAX Modem. Figure 77 TOOLS > Remote Management > Telnet The following table describes the labels in this screen. Table 65 TOOLS > Remote Management > Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number.
Chapter 16 The Remote Management Screens The following table describes the labels in this screen. Table 66 TOOLS > Remote Management > FTP LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the WiMAX Modem using this service. Secured Client IP Address Select All to allow any computer to access the WiMAX Modem using this service.
Chapter 16 The Remote Management Screens The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects. The WiMAX Modem supports MIB II that is defined in RFC-1213 and RFC-1215.
Chapter 16 The Remote Management Screens 16.5.2 SNMP Options Click TOOLS > Remote Management > SNMP to access this screen. Use SNMP options to control SNMP access to your WiMAX Modem. Figure 80 TOOLS > Remote Management > SNMP The following table describes the labels in this screen. Table 68 TOOLS > Remote Management > SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station.
Chapter 16 The Remote Management Screens Table 68 TOOLS > Remote Management > SNMP (continued) LABEL DESCRIPTION Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the WiMAX Modem using this service. Select All to allow any computer to access the WiMAX Modem using this service. Choose Selected to just allow the computer with the IP address that you specify to access the WiMAX Modem using this service. Apply Click to save your changes.
Chapter 16 The Remote Management Screens 16.7 Security Click TOOLS > Remote Management > Security to access this screen. Use this screen to control how your WiMAX Modem responds to other types of requests. Figure 82 TOOLS > Remote Management > Security The following table describes the labels in this screen. Table 70 TOOLS > Remote Management > Security LABEL DESCRIPTION Respond to Ping on Select the interface(s) on which the WiMAX Modem should respond to incoming ping requests.
Chapter 16 The Remote Management Screens 16.8 TR0-69 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipement (CPE), such as the WiMAX Modem. It can be managed over a WAN by means of an Auto Configuration Server (ACS). TR-069 is based on sending Remote Procedure Calls (RPCs) between the ACS and the client device. RPCs are sent in Extensible Markup Language (XML) format over HTTP or HTTPS.
Chapter 16 The Remote Management Screens Click TOOLS > Remote Management > TR069 to access this screen. Use this screen to open WiMAX Modem’s auto-configuration and dynamic service configuration options. Figure 84 TOOLS > Remote Management > TR069 The following table describes the labels in this screen. Table 71 TOOLS > Remote Management > TR069 LABEL DESCRIPTION Active Select this option to turn on the WiMAX Modem’s TR-069 feature.
Chapter 16 The Remote Management Screens Table 71 TOOLS > Remote Management > TR069 LABEL DESCRIPTION Periodic Inform Enable Select this to allow the WiMAX Modem to periodically connect to the ACS and check for configuration updates. If you do not enable this feature then the WiMAX Modem can only be updated automatically when the ACS initiates contact with it and if you selected the Active checkbox on this screen.
CHAPTER 17 QoS 17.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested. This can cause a reduction in network performance and make the network inadequate for time-critical application such as video-ondemand. 17.2 General Click TOOLS > QoS to open the screen as shown next.
Chapter 17 QoS 17.3 Class Setup Use this screen to add, edit or delete QoS classifiers. A classifier groups traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow. You can give different priorities to traffic that the WiMAX Modem forwards out through the WAN interface.
Chapter 17 QoS 17.3.1 Class Configuration Click the Create New Class button or the edit icon in the Class Setup screen to configure a classifier. Figure 87 QoS > Class Setup > Class Configuration The following table describes the labels in this screen. Table 74 QoS Class Setup LABEL DESCRIPTION Class Configuration Active Select this to make a class active. Index Enter an index number for the class. Similar classes are processed in order of index number, from lowest to highest.
Chapter 17 QoS Table 74 QoS Class Setup (continued) LABEL DESCRIPTION Source / Destination Address Enter the source IP address in dotted decimal notation. Subnet Mask Enter the source subnet mask. Port Range Enter the beginning and ending port numbers. You can use the same number in both fields to indicate a single port, or you can enter 0 in both fields to indicate all ports. Exclude Select this to use the class to exclude packets based on these settings.
CHAPTER 18 The Logs Screens 18.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Modem’s log and alert settings. For a list of log messages, see Section 18.4 on page 205. 18.1.1 What You Can Do in This Chapter • The View Logs screen (Section 18.2 on page 201) lets you look at log entries and alerts. • The Log Settings screen (Section 18.
Chapter 18 The Logs Screens can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs. Table 75 Syslog Logs LOG MESSAGE DESCRIPTION Event Log: Mon dd hr:mm:ss hostname src="" dst="" msg="" note="" devID="" cat="" This message is sent by the system ("RAS" displays as the system name if you haven’t configured one) when the router generates a syslog.
Chapter 18 The Logs Screens 18.2 View Logs Click TOOLS > Logs > View Log to access this screen. Use this screen to look at log entries and alerts. Alerts are written in red. Figure 88 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order. The small triangle next to a column header indicates how the table is currently sorted (pointing downward is descending; pointing upward is ascending).
Chapter 18 The Logs Screens Table 77 TOOLS > Logs > View Logs (continued) 202 LABEL DESCRIPTION # The number of the item in this list. Time This field displays the time the log entry was recorded. Message This field displays the reason for the log entry. See Section 18.4 on page 205. Source This field displays the source IP address and the port number of the incoming packet. In many cases, some or all of this information may not be available.
Chapter 18 The Logs Screens 18.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Modem sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded.
Chapter 18 The Logs Screens The following table describes the labels in this screen. Table 78 TOOLS > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e-mail logs and alerts. Leave this field blank if you do not want to send logs or alerts by e-mail. Mail Subject Enter the subject line used in e-mail messages the WiMAX Modem sends.
Chapter 18 The Logs Screens Table 78 TOOLS > Logs > Log Settings LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 18.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 79 System Error Logs LOG MESSAGE DESCRIPTION WAN connection is down. The WAN connection is down. You cannot access the network through this interface. %s exceeds the max.
Chapter 18 The Logs Screens Table 80 System Maintenance Logs (continued) LOG MESSAGE DESCRIPTION Time initialized by Time server The device got the time and date from the time server. Time initialized by NTP server The device got the time and date from the NTP server. Connect to Daytime server fail The device was not able to connect to the Daytime server. Connect to Time server fail The device was not able to connect to the Time server.
Chapter 18 The Logs Screens Table 82 TCP Reset Logs LOG MESSAGE DESCRIPTION Under SYN flood attack, sent TCP RST The router sent a TCP reset packet when a host was under a SYN flood attack (the TCP incomplete count is per destination host.) Exceed TCP MAX incomplete, sent TCP RST The router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold. (the TCP incomplete count is per destination host.
Chapter 18 The Logs Screens For type and code details, see Table 90 on page 211. Table 84 ICMP Logs LOG MESSAGE DESCRIPTION Firewall default policy: ICMP , , ICMP access matched the default policy and was blocked or forwarded according to the user's setting.
Chapter 18 The Logs Screens Table 87 Content Filtering Logs LOG MESSAGE DESCRIPTION %s: Keyword blocking The content of a requested web page matched a user defined keyword. %s: Not in trusted web list The web site is not in a trusted domain, and the router blocks all traffic except trusted domain sites. %s: Forbidden Web site The web site is in the forbidden web site list. %s: Contains ActiveX The web site contains ActiveX. %s: Contains Java applet The web site contains a Java applet.
Chapter 18 The Logs Screens Table 88 Attack Logs (continued) LOG MESSAGE DESCRIPTION ip spoofing - WAN ICMP (type:%d, code:%d) The firewall detected an ICMP IP spoofing attack on the WAN port. icmp echo : ICMP (type:%d, code:%d) The firewall detected an ICMP echo attack. syn flood TCP The firewall detected a TCP syn flood attack. ports scan TCP The firewall detected a TCP port scan attack. teardrop TCP The firewall detected a TCP teardrop attack.
Chapter 18 The Logs Screens Table 89 Remote Management Logs LOG MESSAGE DESCRIPTION Remote Management: WWW denied Attempted use of WWW service was blocked according to remote management settings. Remote Management: HTTPS denied Attempted use of HTTPS service was blocked according to remote management settings. Remote Management: SSH denied Attempted use of SSH service was blocked according to remote management settings.
Chapter 18 The Logs Screens Table 90 ICMP Notes (continued) TYPE CODE DESCRIPTION 0 Timestamp request message Timestamp Reply 14 0 Timestamp reply message Information Request 15 0 Information request message Information Reply 16 0 Information reply message Table 91 SIP Logs LOG MESSAGE DESCRIPTION SIP Registration Success by SIP:SIP Phone Number The listed SIP account was successfully registered with a SIP register server.
Chapter 18 The Logs Screens Table 93 FSM Logs: Caller Side LOG MESSAGE DESCRIPTION VoIP Call Start Ph[Phone Port Number] <- Outgoing Call Number Someone used a phone connected to the listed phone port to initiate a VoIP call to the listed destination. VoIP Call Established Ph[Phone Port] -> Outgoing Call Number Someone used a phone connected to the listed phone port to make a VoIP call to the listed destination.
Chapter 18 The Logs Screens 214 User’s Guide
CHAPTER 19 The Status Screen 19.1 Overview Use this screen to view a complete summary of your WiMAX Modem connection status. 19.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts. You can also register and un-register SIP accounts as well as view detailed information from DHCP and statistics from WiMAX, VoIP, bandwidth management, and traffic.
Chapter 19 The Status Screen The following tables describe the labels in this screen. Table 96 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Modem system name. It is used for identification. You can change this in the ADVANCED > System Configuration > General screen’s System Name field.
Chapter 19 The Status Screen Table 96 Status (continued) LABEL DESCRIPTION Frequency This field displays the radio frequency of the WiMAX Modem’s wireless connection to a base station. MAC address This field displays the Media Access Control address of the WiMAX Modem. Every network device has a unique MAC address which identifies it across the network. WiMAX State This field displays the status of the WiMAX Modem’s current connection. • • • • • • • • INIT: the WiMAX Modem is starting up.
Chapter 19 The Status Screen Table 96 Status (continued) LABEL DESCRIPTION System Uptime This field displays how long the WiMAX Modem has been running since it last started up. The WiMAX Modem starts up when you plug it in, when you restart it (ADVANCED > System Configuration > Restart), or when you reset it. Current Date/ Time This field displays the current date and time in the WiMAX Modem. You can change this in SETUP > Time Setting.
Chapter 19 The Status Screen Table 96 Status (continued) LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, Click Unregister to delete the SIP account’s registration in the SIP server. This does not cancel your SIP account, but it deletes the mapping between your SIP identity and your IP address or domain name.
Chapter 19 The Status Screen The following table describes the fields in this screen. Table 97 Packet Statistics LABEL DESCRIPTION Port This column displays each interface of the WiMAX Modem. Status This field indicates whether or not the WiMAX Modem is using the interface. For the WAN interface, this field displays the port speed and duplex setting when the WiMAX Modem is connected to a WiMAX network, and Down when the WiMAX Modem is not connected to a WiMAX network.
Chapter 19 The Status Screen 19.2.2 WiMAX Site Information Click Status > WiMAX Site Information to open this screen. This read-only screen shows WiMAX frequency information for the WiMAX Modem. These settings can be configured in the ADVANCED > WAN Configuration > WiMAX Configuration screen. Figure 92 WiMAX Site Information The following table describes the labels in this screen.
Chapter 19 The Status Screen 19.2.3 DHCP Table Click Status > DHCP Table to open this screen. This read-only screen shows the IP addresses, Host Names and MAC addresses of the devices currently connected to the WiMAX Modem. These settings can be configured in the ADVANCED > LAN Configuration > DHCP Setup screen. Figure 93 DHCP Table Each field is described in the following table. Table 99 DHCP Table 222 LABEL DESCRIPTION # The number of the item in this list.
Chapter 19 The Status Screen 19.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 94 VoIP Statistics Each field is described in the following table. Table 100 VoIP Statistics LABEL DESCRIPTION SIP Status Port This column displays each SIP account in the WiMAX Modem.
Chapter 19 The Status Screen Table 100 VoIP Statistics LABEL DESCRIPTION Last Outgoing Number This field displays the last number the SIP account called. It displays N/A if the SIP account has never dialed a number. Call Statistics Phone This field displays the WiMAX Modem’s phone port number. Hook This field indicates whether the phone is on the hook or off the hook. On - The phone is hanging up or already hung up. Off - The phone is dialing, calling, or connected.
Chapter 19 The Status Screen 19.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. Note: Not all WiMAX Modem models have all the fields shown here. Figure 95 WiMAX Profile The following table describes the labels in this screen.
Chapter 19 The Status Screen Table 101 The WiMAX Profile Screen (continued) LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station. See the WiMAX security appendix for more details.
P ART VI Troubleshooting and Specifications Troubleshooting (229) Product Specifications (237) 227
CHAPTER 20 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Modem Access and Login • Internet Access • Phone Calls and VoIP • Reset the WiMAX Modem to Its Factory Defaults 20.1 Power, Hardware Connections, and LEDs The WiMAX Modem does not turn on. None of the LEDs turn on.
Chapter 20 Troubleshooting 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adapter to the WiMAX Modem. 5 If the problem continues, contact the vendor. 20.2 WiMAX Modem Access and Login I forgot the IP address for the WiMAX Modem. 1 The default IP address is http://192.168.1.1.
Chapter 20 Troubleshooting • If you changed the IP address (Section 5.2 on page 58), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the WiMAX Modem. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 34. 3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled.
Chapter 20 Troubleshooting I cannot Telnet to the WiMAX Modem. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. 20.3 Internet Access I cannot access the Internet. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 34. 2 Make sure you entered your ISP account information correctly in the wizard.
Chapter 20 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 34. 2 Disconnect and re-connect the power adapter to the WiMAX Modem. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. 1 The quality of the WiMAX Modem’s wireless connection to the base station may be poor.
Chapter 20 Troubleshooting 1 Check the telephone connections and telephone wire. 2 Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 10 on page 111). I can access the Internet, but cannot make VoIP calls. 1 Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 10 on page 111). 2 The VoIP LED should come on.
Chapter 20 Troubleshooting You will lose all of your changes when you push the Reset button. To reset the WiMAX Modem, 1 Make sure the Power LED is on and not blinking. 2 Press and hold the Reset button for five to ten seconds. Release the Reset button when the Power LED begins to blink. The default settings have been restored. If the WiMAX Modem restarts automatically, wait for the WiMAX Modem to finish restarting, and log in to the web configurator. The password is “1234”.
Chapter 20 Troubleshooting 236 User’s Guide
CHAPTER 21 Product Specifications This chapter gives details about your WiMAX Modem’s hardware and firmware features.
Chapter 21 Product Specifications Table 102 Environmental and Hardware Specifications (continued) EMS Approvals EN 301489-4 v1.3.1 RF Approvals EN 302326 Table 103 Radio Specifications FEATURE DESCRIPTION Media Access Protocol IEEE 802.16e WiMAX Bandwidth MAX-216M1R: 5MHz, 7MHz, 10MHz MAX-206M1R: 5MHz, 10MHz MAX-236M1R: 5MHz, 8.
Chapter 21 Product Specifications Table 104 Firmware Specifications (continued) FEATURE DESCRIPTION Content Filtering The WiMAX Modem can block access to web sites containing specified keywords. You can define time periods and days during which content filtering is enabled and include or exclude a range of users on the LAN from content filtering.
Chapter 21 Product Specifications Table 104 Firmware Specifications (continued) FEATURE DESCRIPTION Time and Date Get the current time and date from an external server when you turn on your WiMAX Modem. You can also set the time manually. Logging Use the WiMAX Modem’s logging feature to view connection history, surveillance logs, and error messages. Codecs Enhanced Variable Rate Codec (EVRC), G.711 (PCM µ-law and a-law), G.729a, and G.723.1 Fax Support T.38 FAX relay (FAX over UDP). G.
Chapter 21 Product Specifications Table 105 Standards Supported (continued) STANDARD DESCRIPTION RFC 3263 Session Initiation Protocol (SIP): Locating SIP Servers RFC 3264 An Offer/Answer Model with the Session Description Protocol (SDP) RFC 3265 Session Initiation Protocol (SIP)-Specific Event Notification RFC 3323 A Privacy Mechanism for SIP RFC 3325 Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks RFC 3550 RTP - A Real Time Protocol fo
Chapter 21 Product Specifications Table 106 Voice Features 242 Phone config The phone configuration table allows you to customize the phone keypad combinations you use to access certain features on the WiMAX Modem, such as call waiting, call return, call forward, etc. The phone configuration table is configurable in command interpreter mode.
Chapter 21 Product Specifications Table 106 Voice Features SIP ALG Your device is a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass through NAT for devices behind it (such as a SIP-based VoIP software application on a computer). Other Voice Features SIP version 2 (Session Initiating Protocol RFC 3261) SDP (Session Description Protocol RFC 2327) RTP (RFC 1889) RTCP (RFC 1890) Voice codecs (coder/decoders) G.711, G.726, G.
Chapter 21 Product Specifications Table 108 Environmental and Hardware Specifications (continued) Operating Humidity 20% ~ 90% (non-condensing) Storage Humidity 10% to 95% (non-condensing) Power Supply 12V DC, 2 A Power consumption 18W Ethernet Interface Two auto-negotiating, auto-MDI/MDI-X NWay 10/100 Mbps RJ-45 Ethernet ports Telephony Interface Two analog ATA interfaces for standard telephones through RJ-11 FXS (Foreign Exchange Subscriber) analog connector Antennas Two internal 5dBi WiMAX
Chapter 21 Product Specifications Table 110 Firmware Specifications FEATURE DESCRIPTION Web-based Configuration and Management Tool Also known as “the web configurator”, this is a firmwarebased management solution for the WiMAX Modem. You must connect using a compatible web browser in order to use it. High Speed Wireless Internet Access The WiMAX Modem is ideal for high-speed wireless Internet browsing.
Chapter 21 Product Specifications Table 110 Firmware Specifications (continued) FEATURE DESCRIPTION SIP ALG Your device is a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass through NAT for devices behind it (such as a SIP-based VoIP software application on a computer). Dynamic Jitter Buffer The built-in adaptive buffer helps to smooth out the variations in delay (jitter) for voice traffic (up to 60 ms). This helps ensure good voice quality for your conversations.
Chapter 21 Product Specifications Table 111 Standards Supported (continued) User’s Guide STANDARD DESCRIPTION RFC 2104 HMAC: Keyed-Hashing for Message Authentication RFC 2131 Dynamic Host Configuration Protocol RFC 2401 Security Architecture for the Internet Protocol RFC 2409 Internet Key Exchange RFC 2475 Architecture for Differentiated Services (Diffserv) RFC 2617 Hypertext Transfer Protocol (HTTP) Authentication: Basic and Digest Access Authentication RFC 2782 A DNS RR for specifying th
Chapter 21 Product Specifications Table 112 Voice Features Call Park and Pickup Call park and pickup lets you put a call on hold (park) and then continue the call (pickup). The caller must still pay while the call is parked. When you park the call, you enter a number of your choice (up to eight digits), which you must enter again when you pick up the call. If you do not enter the correct number, you cannot pickup the call.
Chapter 21 Product Specifications Table 112 Voice Features Caller ID The WiMAX Modem supports caller ID, which allows you to see the originating number of an incoming call (on a phone with a suitable display). REN A Ringer Equivalence Number (REN) is used to determine the number of devices (like telephones or fax machines) that may be connected to the telephone line. Your device has a REN of three, so it can support three devices per telephone port.
Chapter 21 Product Specifications Table 113 Star (*) and Pound (#) Code Support *730 Deactivate Call Forwarding No Answer *740 Plus the forward to phone number to activate Call Forwarding Busy (no VM service plan) *911/911 Emergency phone number (same as dialing 911) *411/411 Wireless Information Services Note: To take full advantage of the supplementary phone services available through the WiMAX Modem's phone port, you may need to subscribe to the services from your voice account service provider.
Chapter 21 Product Specifications 21.1 Wall-Mounting This section shows you how to mount your WiMAX Modem on a wall using the ZyXEL Wall-Mounting kit (not included). 21.1.1 The Wall-Mounting Kit The wall-mounting kit contains the following parts: 1 2 1 Two Mortar Plugs (M4*L30 mm) 2 Two Screws (M4*L30 mm) 3 Wall-Mounting Chassis 3 If any parts are missing, contact your vendor. 21.1.2 Instructions To mount the WiMAX Modem on a wall: 1 Select a position free of obstructions on a sturdy wall.
Chapter 21 Product Specifications 3 Attach the wall mounting chassis with the plugs and screws as shown below: 4 Connect the MAX-216M1 to the wall mounting chassis by snapping the chassis’ two upper chassis hooks into the matching holes on the WiMAX Modem: Do not pinch or server the cable connections between the wallmounting chassis the WiMAX Modem.
Chapter 21 Product Specifications 5 Snap the lower chassis hooks into the matching holes on the WiMAX Modem. The cable connections should come out either the left or right gaps between the wallmounting chassis and the WiMAX Modem 6 Once you have snapped the wall-mounting chassis in place, the WiMAX Modem is securely fastened to the wall.
Chapter 21 Product Specifications 254 User’s Guide
P ART VII Appendices and Index WiMAX Security (257) Setting Up Your Computer’s IP Address (261) Pop-up Windows, JavaScripts and Java Permissions (289) IP Addresses and Subnetting (299) Importing Certificates (311) SIP Passthrough (343) Common Services (345) Legal Information (349) Customer Support (353) 255
APPENDIX A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a user’s identity and level of authorization.
Appendix A WiMAX Security RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The base station is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity.
Appendix A WiMAX Security the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Diameter Diameter (RFC 3588) is a type of AAA server that provides several improvements over RADIUS in efficiency, security, and support for roaming. Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA).
Appendix A WiMAX Security Authentication The WiMAX Modem supports EAP-TTLS authentication. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection (with EAPTLS digital certifications are needed by both the server and the wireless clients for mutual authentication).
APPENDIX B Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 96 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 98 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 100 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 101 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 102 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 104 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 105 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 107 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 108 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 109 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 110 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 111 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Figure 112 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Click Apply Now and close the window.Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 113 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 114 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 115 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 116 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your WiMAX Modem. Figure 117 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 118 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 1 Click System > Administration > Network. Figure 119 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 121 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 123 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 124 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 127 openSUSE 10.3: K Menu > Computer Menu 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 128 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 129 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 130 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 131 openSUSE 10.3: Network Settings 9 286 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 132 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address 288 User’s Guide
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 135 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 136 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 137 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 138 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 139 Security Settings - Java Scripting Java Permissions 294 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 140 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 141 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 298 User’s Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 144 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 145 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.
Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 146 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix D IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 118 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix D IP Addresses and Subnetting Table 121 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix D IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 124 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix D IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the WiMAX Modem unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
Appendix D IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 147 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets.
Appendix D IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
APPENDIX E Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 150 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix E Importing Certificates 3 In the Address Bar, click Certificate Error > View certificates. Figure 152 Internet Explorer 7: Certificate Error 4 In the Certificate dialog box, click Install Certificate.
Appendix E Importing Certificates 5 In the Certificate Import Wizard, click Next. Figure 154 Internet Explorer 7: Certificate Import Wizard 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9.
Appendix E Importing Certificates 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 156 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 158 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 160 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 162 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 164 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 166 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 167 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix E Importing Certificates 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix E Importing Certificates 3 The certificate is stored and you can now connect securely to the web configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 171 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 173 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 174 5 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 175 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 177 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 178 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences.
Appendix E Importing Certificates 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 183 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 185 6 Next, click OK. Figure 186 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 187 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 189 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 190 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 191 Konqueror 3.
Appendix E Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 192 Konqueror 3.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 193 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 194 Konqueror 3.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 196 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 197 Konqueror 3.
Appendix E Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button.
Appendix E Importing Certificates 342 User’s Guide
APPENDIX F SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Modem, use the ip alg disable ALG_SIP command to turn off the SIP ALG. Signaling Session Timeout Most SIP clients have an “expire” mechanism indicating the lifetime of signaling sessions.
Appendix F SIP Passthrough 344 User’s Guide
APPENDIX G Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix G Common Services Table 125 Commonly Used Services (continued) 346 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix G Common Services Table 125 Commonly Used Services (continued) User’s Guide NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix G Common Services Table 125 Commonly Used Services (continued) 348 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX H Legal Information Copyright Copyright © 2008 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix H Legal Information Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules.
Appendix H Legal Information 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Appendix H Legal Information implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
APPENDIX I Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http://www.zyxel.com/web/contact_us.php). Please have the following information ready when you contact an office. Required Information • Product model and serial number. • Warranty Information.
Appendix I Customer Support China - ZyXEL Communications (Shanghai) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn • Telephone: +86-021-61199055 • Fax: +86-021-52069033 • Address: 1005F, ShengGao International Tower, No.137 XianXia Rd., Shanghai • Web: http://www.zyxel.cn Costa Rica • Support E-mail: soporte@zyxel.co.cr • Sales E-mail: sales@zyxel.co.cr • Telephone: +506-2017878 • Fax: +506-2015098 • Web: www.zyxel.co.
Appendix I Customer Support • Fax: +358-9-4780-8448 • Web: www.zyxel.fi • Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-6909-69 • Fax: +49-2405-6909-99 • Web: www.zyxel.
Appendix I Customer Support Japan • Support E-mail: support@zyxel.co.jp • Sales E-mail: zyp@zyxel.co.jp • Telephone: +81-3-6847-3700 • Fax: +81-3-6847-3705 • Web: www.zyxel.co.jp • Regular Mail: ZyXEL Japan, 3F, Office T&U, 1-10-10 Higashi-Gotanda, Shinagawa-ku, Tokyo 141-0022, Japan Kazakhstan • Support: http://zyxel.kz/support • Sales E-mail: sales@zyxel.kz • Telephone: +7-3272-590-698 • Fax: +7-3272-590-689 • Web: www.zyxel.kz • Regular Mail: ZyXEL Kazakhstan, 43 Dostyk Ave.
Appendix I Customer Support • Sales E-mail: sales@zyxel.no • Telephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • Web: www.zyxel.no • Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland • E-mail: info@pl.zyxel.com • Telephone: +48-22-333 8250 • Fax: +48-22-333 8251 • Web: www.pl.zyxel.com • Regular Mail: ZyXEL Communications, ul. Okrzei 1A, 03-715 Warszawa, Poland Russia • Support: http://zyxel.ru/support • Sales E-mail: sales@zyxel.
Appendix I Customer Support Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 • Fax: +46-31-744-7701 • Web: www.zyxel.se • Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Taiwan • Support E-mail: support@zyxel.com.tw • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-2-27399889 • Fax: +886-2-27353220 • Web: http://www.zyxel.com.tw • Address: Room B, 21F., No.333, Sec. 2, Dunhua S. Rd.
Appendix I Customer Support • Fax: +380-44-494-49-32 • Web: www.ua.zyxel.com • Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str., Kiev 04050, Ukraine United Kingdom • Support E-mail: support@zyxel.co.uk • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd.
Appendix I Customer Support 360 User’s Guide
Index Index A AAA 79 AbS 116 accounting server see AAA ACK message 123 activity 79 Advanced Encryption Standard see AES and certificates 165 call Europe type service mode 134 forwarding 248 hold 134–136 park and pickup 248 return 248 service mode 134–136 transfer 135–136 waiting 135–136, 248 caller ID 249 AES 259 CBC-MAC 259 ALG 96, 246, 249 CCMP 257, 259 alternative subnet mask notation 302 cell 77 analysis-by-synthesis 116 Certificate Management Protocol (CMP) 152 antenna 244 Certificate Revoc
Index see CCMP circuit-switched telephone networks 111 download frequency see DL frequency Class of Service (CoS) 126 DS field 127 client-server protocol 124 SIP 124 DSCP see DiffServ CMAC see MAC DTMF 249 detection and generation 249 duplex 244 codec 115, 249 dynamic DNS 102, 245 comfort noise 129 generation 246 Dynamic Host Configuration Protocol see DHCP contact information 353 dynamic jitter buffer 246 copyright 349 CoS 126 counter mode see CCMP E country code 248 EAP 79 coverage area
Index G K G.168 129, 246 key 48, 81, 257 request and reply 259 G.711 116, 249 G.726 249 G.729 116, 249 L H listening port 119 humidity 244 hybrid waveform codec 116 M MAC 259 I MAN 77 Management Information Base (MIB) 188 IANA 308 manual site survey 85, 86 identity 79, 257 Media Access Protocol 244 idle timeout 184 IEEE 802.16 77, 257 Message Authentication Code see MAC IEEE 802.16e 77 message integrity 259 IEEE 802.
Index services 79 Network Address Translation see NAT public-private key pairs 147, 164 pulse code modulation 116 Q O QoS 195, 249 OK response 123 operating humidity 244 Quality of Service 249 see QoS operating temperature 243 Quality of Service, see QoS outbound proxy 115, 126 server 115 SIP 115 quick dialing 249 R P park 248 pattern-spotting 259 PBX services 111 PCM 116 peer-to-peer calls 139 per-hop behavior 127 PHB (per-hop behavior) 127 phone configuration 248 services 130 physical specificatio
Index S specifications physical and environmental 243, 244 safety warnings 7 speed dial 139 SDP 249 SS 77, 78 secure communication 48, 81, 257 stateful inspection 174 secure connection 79 storage humidity 244 security 244, 257 storage temperature 243 security association 259 see SA STUN 115, 126 server outbound proxy 115 services 79 Session Description Protocol 249 subnet 299 mask 300 subnetting 302 subscriber station see SS Session Initiation Protocol see SIP supplementary phone services
Index U Wireless Metropolitan Area Network see MAN unauthorized device 257 wireless network access 77 standard 77 uniform resource identifier 112 UPnP 245 USA type call service mode 136 use NAT 126 wireless security 244, 257 wizard setup 45 use NAT feature 112 user agent, SIP 124 user authentication 257 user ID 52 user name 103 V VAD 129, 246 verification 259 virtual local area network see VLAN VLAN 122 group 122 ID tags 122 tags 122 VLAN ID 122 voice activity detection 129, 246 coding 115 mail 111