MAX-306M1 Series Models: MAX-306M1 (2.5 GHz) and MAX-316M1 (3.5 GHz) WiMAX MIMO Outdoor Simple CPE Default Login Details IP Address: http://192.168.1.1 User Name: admin Password: 1234 www.zyxel.com Firmware Version 3.70 Edition 1, 12/2009 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the ZyXEL WiMAX Modem using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Note: This book covers the following models: MAX-306M1 and MAX-316M1. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your WiMAX Modem. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The product(s) described in this book may be referred to as the “WiMAX Modem”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Modem icon is not an exact representation of your WiMAX Modem.
Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings • Make sure that the cable system is grounded so as to provide some protection against voltage surges. Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
Safety Warnings 8 User’s Guide
Contents Overview Contents Overview Introduction and Wizards ...................................................................................................... 29 Getting Started ........................................................................................................................... 31 Introducing the Web Configurator .............................................................................................. 35 Internet Connection Wizard ...........................................
Contents Overview 10 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents Chapter 4 VoIP Connection Wizard......................................................................................................... 47 4.1 Overview .............................................................................................................................. 47 4.2 Welcome to the ZyXEL Setup Wizard ................................................................................. 47 4.2.1 First Voice Account Settings ...................................................
Table of Contents 7.1.2 What You Need to Know ............................................................................................ 73 7.2 DHCP Setup ........................................................................................................................ 74 7.3 Static DHCP ......................................................................................................................... 76 7.4 IP Static Route .....................................................................
Table of Contents 10.1 Overview .......................................................................................................................... 109 10.1.1 What You Can Do in This Chapter ......................................................................... 109 10.2 General ............................................................................................................................ 109 10.3 Port Forwarding ........................................................................
Table of Contents 12.4.6 NAT and SIP .......................................................................................................... 146 12.4.7 DiffServ .................................................................................................................. 146 12.4.8 DSCP and Per-Hop Behavior ................................................................................. 147 Chapter 13 The Phone Screens................................................................................
Table of Contents 15.4.1 Certificate Authorities ............................................................................................. 184 15.4.2 Verifying a Certificate ............................................................................................. 186 Chapter 16 The Firewall Screens ............................................................................................................ 189 16.1 Overview ...........................................................................
Table of Contents 19.2 General ............................................................................................................................ 215 19.3 Class Setup ..................................................................................................................... 216 19.3.1 Class Configuration ................................................................................................ 217 Chapter 20 The Logs Screens .......................................................
Table of Contents Appendix B Setting Up Your Computer’s IP Address ........................................................... 271 Appendix C Pop-up Windows, JavaScripts and Java Permissions ...................................... 299 Appendix D IP Addresses and Subnetting ........................................................................... 309 Appendix E Importing Certificates ........................................................................................ 321 Appendix F SIP Passthrough ....
List of Figures List of Figures Figure 1 Mobile Station and Base Station ............................................................................................... 31 Figure 2 WiMAX Modem’s VoIP Features - Peer-to-Peer Calls ............................................................. 32 Figure 3 WiMAX Modem’s VoIP Features - Calls via VoIP Service Provider ......................................... 32 Figure 4 The WiMAX Modem’s LEDs ....................................................................
List of Figures Figure 39 ADVANCED > VPN Transport > Customer Interface Setup ............................................ 103 Figure 40 Ethernet Pseudowire Settings Example .............................................................................. 105 Figure 41 Advance > VPN Transport > Ethernet Pseudowire .............................................................. 105 Figure 42 ADVANCED > VPN Transport > Ethernet Pseudowire Setup ............................................
List of Figures Figure 82 TOOLS > Firewall > Service Setting .................................................................................... 193 Figure 83 “Triangle Route” Problem ..................................................................................................... 196 Figure 84 IP Alias ................................................................................................................................. 197 Figure 85 TOOLS > Content Filter > Filter .........................
List of Figures Figure 125 Mac OS X 10.5: Apple Menu .............................................................................................. 283 Figure 126 Mac OS X 10.5: Systems Preferences ............................................................................... 283 Figure 127 Mac OS X 10.5: Network Preferences > Ethernet .............................................................. 284 Figure 128 Mac OS X 10.5: Network Preferences > Ethernet ................................................
List of Figures Figure 168 Internet Explorer 7: Select Certificate Store ....................................................................... 325 Figure 169 Internet Explorer 7: Certificate Import Wizard .................................................................... 326 Figure 170 Internet Explorer 7: Security Warning ................................................................................. 326 Figure 171 Internet Explorer 7: Certificate Import Wizard ......................................
List of Figures 24 User’s Guide
List of Tables List of Tables Table 1 Common Icons ............................................................................................................................ 5 Table 2 The WiMAX Modem .................................................................................................................. 33 Table 3 Main > Icons ............................................................................................................................. 38 Table 4 Main ............................
List of Tables Table 38 ADVANCED > System Configuration > General ................................................................... 121 Table 39 ADVANCED > System Configuration > Dynamic DNS ......................................................... 123 Table 40 ADVANCED > System Configuration > Firmware ................................................................. 125 Table 41 ADVANCED > System Configuration > Configuration ..........................................................
List of Tables Table 81 QoS Class Setup .................................................................................................................. 217 Table 82 Syslog Logs .......................................................................................................................... 220 Table 83 RFC-2408 ISAKMP Payload Types ...................................................................................... 220 Table 84 TOOLS > Logs > View Logs ........................................
List of Tables Table 124 24-bit Network Number Subnet Planning ............................................................................ 316 Table 125 16-bit Network Number Subnet Planning ............................................................................ 317 Table 126 Commonly Used Services ...................................................................................................
P ART I Introduction and Wizards Getting Started (31) Introducing the Web Configurator (35) Internet Connection Wizard (41) VoIP Connection Wizard (47) 29
CHAPTER 1 Getting Started 1.1 About Your WiMAX Modem The WiMAX Modem allows you to access the Internet by connecting to a WiMAX wireless network. You can use a traditional analog telephone to make Internet calls using the WiMAX Modem’s Voice over IP (VoIP) communication capabilities. You can configure firewall and content filtering as well as a host of other features. The web browser-based Graphical User Interface (GUI), also known as the web configurator, provides easy management.
Chapter 1 Getting Started Use content filtering to block access to web sites with URLs containing keywords that you specify. You can define time periods and days during which content filtering is enabled and include or exclude particular computers on your network from content filtering. For example, you could block access to certain web sites for the kids. 1.1.
Chapter 1 Getting Started 1.2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Modem. Figure 4 The WiMAX Modem’s LEDs STRENGTH INDICATORS ACTIVITY INDICATOR The following table describes your WiMAX Modem’s LEDs (from right to left). Table 2 The WiMAX Modem User’s Guide LED STATE DESCRIPTION Power (IDU only) Off The WiMAX Modem is not receiving power.
Chapter 1 Getting Started Table 2 The WiMAX Modem LED STATE DESCRIPTION Activity Indicator Off The WiMAX Modem is not ready. Green The WiMAX Modem is connected to the network. Blinking The WiMAX Modem system is booting up or the WiMAX Modem is seeking a viable signal. 1.3 Good Habits for Managing the Device Do the following things regularly to make the WiMAX Modem more secure and to manage the WiMAX Modem more effectively. • Change the password.
CHAPTER 2 Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 2 Introducing the Web Configurator 36 4 A password screen displays. The default password (“1234”) displays in nonreadable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login. 5 The following screen displays if you have not yet changed your password. It is highly recommended you change the default password.
Chapter 2 Introducing the Web Configurator 6 A screen displays to let you choose to go to the Wizard or the Advanced screens. • Click Go to Wizard setup if you are logging in for the first time or if you want to make basic changes. The wizard selection screen appears after you click it. See Chapter 3 on page 41 for more information. • Click Go to Advanced setup if you want to configure features that are not available in the wizards. The main screen appears after you click it.
Chapter 2 Introducing the Web Configurator 2.2 The Main Screen When you first log into the web configurator and by-pass the wizard, the Main screen appears. Here you can view a summary of your WiMAX Modem connection status. This is also the default “home” page for the ZyXEL web configurator and it contains conveniently-placed shortcuts to all of the other screens. Note: Some features in the web configurator may not be available depending on your firmware version and/or configuration.
Chapter 2 Introducing the Web Configurator Table 3 Main > Icons (continued) ICON DESCRIPTION VOICE Click to go to the Voice screen, where you can configure your voice service and phone settings. TOOLS Click to go the Tools screen, where you can configure your firewall, QoS, and content filter, among other things. STATUS Click to go to the Status screen, where you can view status and statistical information for all connections and interfaces.
Chapter 2 Introducing the Web Configurator Table 4 Main (continued) LABEL DESCRIPTION Software Version This field indicates the version number of the WiMAX Modem’s firmware. The version number takes the form of: Version(Build),release status (candidate) | Version Release Date. For example: V3.70(BCC.0)c4 | 07/08/2009 indicates that the firmware is 3.70, build BCC.0, candidate 4, released on July 08, 2009. 40 Version Date This field indicates the exact date and time the current firmware was compiled.
CHAPTER 3 Internet Connection Wizard 3.1 Overview This chapter provides information on the ZyXEL Setup Wizard screens. The wizard guides you through several steps where you can configure your Internet and VoIP settings. 3.1.1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard. You can choose to either configure your Internet connection or your VoIP connection. The Internet Connection Wizard screens are described in detail in the following sections.
Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (see Section 11.2 on page 121 for more). Figure 7 Internet Connection Wizard > System Information The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard 3.1.3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (see Section 8.2 on page 88 for more information). Figure 8 Internet Connection Wizard > Authentication Settings Screen The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL Anonymous Identity DESCRIPTION Enter the anonymous identity provided by your Internet Service Provider. Anonymous identity (also known as outer identity) is used with EAP-TTLS encryption. The anonymous identity is used to route your authentication request to the correct authentication server, and does not reveal your real user name.
Chapter 3 Internet Connection Wizard 3.1.4 IP Address This Internet Connection Wizard screen allows you to configure your IP address. The settings here correspond to the SETUP > Set IP Address screen (see Section 6.2 on page 66). A fixed IP address is a static IP that your ISP gives you. An automatic (dynamic) IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
Chapter 3 Internet Connection Wizard 3.1.5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings. Figure 10 Internet Connection Wizard > Complete Launch your web browser and navigate to www.zyxel.com. If everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator.
CHAPTER 4 VoIP Connection Wizard 4.1 Overview This chapter shows you how to use the wizard to set up your voice account(s). The WiMAX Modem has Voice over IP (VoIP) communication capabilities that allow you to use a traditional analog telephone to make Internet calls. You can configure the WiMAX Modem to use up to two SIP based VoIP accounts. 4.2 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard.
Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 12.2 on page 133 for more information).
Chapter 4 VoIP Connection Wizard Table 8 VoIP Connection > First Voice Account Settings (continued) LABEL DESCRIPTION Apply Click to complete the wizard setup and save your configuration. Close Click to close the wizard without saving your settings. After you enter your voice account settings and click Apply, the WiMAX Modem attempts to register your SIP account with the SIP server. Figure 13 VoIP Connection > SIP Registration Test This screen displays if SIP account registration fails.
Chapter 4 VoIP Connection Wizard Internet connection was already working, you can click Back and try re-entering your SIP account settings. Figure 14 VoIP Connection > SIP Registration Fail 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings. Figure 15 VoIP Connection > Finish This screen displays if your SIP account registration was successful.
CHAPTER 5 Tutorials 5.1 Overview This chapter shows you how to configure some of the WiMAX Modem’s features. Note: Be sure to read Introducing the Web Configurator on page 35 before working through the tutorials presented here. For field descriptions of individual screens, see the related technical reference in this User's Guide. 5.2 Setting Up a Small Network This tutorial shows you how to set up a small network in your office or home.
Chapter 5 Tutorials Required: The following table provides a summary of the information you will need to complete the tasks in this tutorial. 52 INFORMATION VALUE SEE ALSO LAN IP Address 192.168.100.1 Chapter 6 on page 65 Starting IP Address 192.168.100.33 Chapter 7 on page 73 Pool Size 32 DNS Servers From ISP 1 In the Web Configurator, open the SETUP > Set IP Address screen and set the IP Address to 192.168.100.1. Use the default IP Subnet Mask of 255.255.255.0.
Chapter 5 Tutorials 6 Next, go to the ADVANCED > NAT Configuration > General screen and select the Enable Network Address Translation option. 7 Click Apply to save your settings. 8 Connect your computers to the WiMAX Modem’s Ethernet ports and you’re all set! Note: You may need to configure the computers on your LAN to automatically obtain IP addresses. For information on how to do this, see Appendix B on page 271. 5.2.
Chapter 5 Tutorials 2 In the Import Certificate screen, click Browse and locate the security certificate that was provided by your new ISP. 3 Next, go to the ADVANCED > WAN Configuration screen and configure your new Internet access settings based on the information provided by your ISP. Note: You can also use the Internet Connection Wizard to configure these settings. 54 4 From the Certificates menu, select the security certificate that you just imported. 5 Click Apply to save your settings.
Chapter 5 Tutorials 5.2.3 Blocking Web Access During Specific Hours If your WiMAX Modem is in a home or office environment you may decide that you want to block web access and video chat during a specific block of hours, such as during your daughter’s designated study hours. Goal: Configure the WiMAX Modem’s firewall to block web and video chat access on weekdays between the hours of 3:30 PM and 8:30 PM.’ See Also: Chapter 16 on page 189. 1 Open the TOOLS > Firewall > Services to screen.
Chapter 5 Tutorials 3 Under Available Services, select HTTP(TCP:80) then click the Add button. Repeat this for CU-SEEME(TCP/UDP:7648,24032). This blocks all web and video chat traffic, while leaving other ports open for other types of traffic, such as ports 25 and 587 for e-mail and port 21 for FTP. The Blocked Services window updates accordingly. 4 Next, configure the Schedule to Block area with the days and hours for blocking web access to your employees.
Chapter 5 Tutorials 5.2.4 Blocking Web Sites by Keyword You can further refine web access by specifying keywords that appear in a URL and blocking them. This allows you to control the content you do allow to pass through the WiMAX Modem. For example, once your daughter’s designated study hours end, you allow web access and video chat but want to restrict certain sites. Goal: Restrict websites with the words “poker”, “sex”, and “beer” in their URLs. See Also: Chapter 17 on page 199.
Chapter 5 Tutorials 3 Enter the first Keyword then click Add. Repeat for additional keywords. As you enter them, the keywords appear in the Keyword List. 58 4 (Optional) If you want to allow websites with these keywords for a specific computer in your household, such as the computer in the master bedroom, then add that computer’s IP address to the Trusted IP Address field. 5 Click Apply to save these settings. 6 Next, open the TOOLS > Content Filter > Schedule screen.
Chapter 5 Tutorials 5.3 Configuring Your Internet Phone This tutorial shows you how to configure the WiMAX Modem’s VoIP settings when you connect an analog phone to place Internet phone calls. Goals: Connect an analog phone to the WiMAX Modem then configure your Internet phone settings. Figure 16 Phone Call Example In this example, your analog phone (A) connects to the WiMAX Modem (B).
Chapter 5 Tutorials 1 Connect an analog phone to your WiMAX Modem, as described in the included Quick Start Guide. 2 Open the VOICE > Service Configuration > SIP Setting screen, then enter the required information as presented above. Tip: Unless otherwise told by a SIP service provider, you can often leave the Port settings at their default values. 3 Click Apply to save your changes. 4 Next, click VOICE > Phone > Analog Phone.
Chapter 5 Tutorials 5.3.1 Placing an Internet Phone Call Because you’re using an analog phone, you can’t just enter another party’s SIP number and dial straight away. The reason is there is no way to enter certain SIPspecific characters on your analog phone’s keypad in a way that the WiMAX Modem will recognize. As such, you must first configure a ‘speed dial’ entry in the WiMAX Modem’s internal phone book.
Chapter 5 Tutorials 5.4 Remotely Managing Your WiMAX Modem The remote management feature allows you to log into the device over the Internet and configure its settings from a second trusted location. Goal: Set up the WiMAX Modem to allow management requests from the (demonstration) IP address 2.2.2.2. See Also: Chapter 18 on page 203. 62 1 Open the TOOLS > Remote Management > WWW screen.
P ART II Basic Screens The Main Screen (38) The Setup Screens (65) 63
CHAPTER 6 The Setup Screens 6.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 6.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 6.2 on page 66) lets you configure the WiMAX Modem’s IP address and subnet mask. • The DHCP Client screen (Section 6.3 on page 67) to view connection information for clients configured by the WiMAX Modem’s internal DHCP server. • The Time Setting screen (Section 6.
Chapter 6 The Setup Screens you entered. You do not need to change the computer subnet mask unless you are instructed to do so. Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server. Not all servers use the same format. Time A network protocol for retrieving the current time from a server.
Chapter 6 The Setup Screens The following table describes the labels in this screen. Table 9 SETUP > Set IP Address LABEL DESCRIPTION IP Address Enter the IP address of the WiMAX Modem on the LAN. Note: This field is the IP address you use to access the WiMAX Modem on the LAN. If the web configurator is running on a computer on the LAN, you lose access to it as soon as you change this field and click Apply. You can access the web configurator again by typing the new IP address in the browser.
Chapter 6 The Setup Screens Table 10 SETUP > DHCP Client (continued) LABEL DESCRIPTION Reserve This indicates whether the IP address for the connected client device is reserved. When the DHCP server issues IP addresses, reserved IPs are assigned to specific client devices. If the IP address is reserved, the client device identified by its MAC address will always receive this IP address from the DHCP server. Apply Click to save your changes. Refresh Click to refresh the information in the screen. 6.
Chapter 6 The Setup Screens Table 11 SETUP > Time Setting (continued) LABEL DESCRIPTION Current Date Displays the current time according to the WiMAX Modem. Time and Date Setup Manual Select this if you want to specify the current date and time in the fields below. New Time Enter the new time in this field, and click Apply. New Date Enter the new date in this field, and click Apply.
Chapter 6 The Setup Screens the list in order until either it is successful or all the pre-defined NTP time servers have been tried. Table 12 Pre-defined NTP Time Servers ntp1.cs.wisc.edu ntp1.gbg.netnod.se ntp2.cs.wisc.edu tock.usno.navy.mil ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw 6.4.
P ART III Advanced Screens The LAN Configuration Screens (73) The WAN Configuration Screens (85) The NAT Configuration Screens (109) The System Configuration Screens (119) 71
CHAPTER 7 The LAN Configuration Screens 7.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Modem on the LAN. You can configure DHCP services and control how the WiMAX Modem sends routing information using RIP. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually a computer network limited to the immediate area, such as the same building or floor of a building. 7.1.
Chapter 7 The LAN Configuration Screens Subnet Masks Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a networking device before you can access it.
Chapter 7 The LAN Configuration Screens The following table describes the labels in this screen. Table 13 ADVANCED > LAN Configuration > DHCP Setup LABEL DESCRIPTION DHCP Setup Enable DHCP Server Select this if you want the WiMAX Modem to be the DHCP server on the LAN. As a DHCP server, the WiMAX Modem assigns IP addresses to DHCP clients on the LAN and provides the subnet mask and DNS server information.
Chapter 7 The LAN Configuration Screens 7.3 Static DHCP Click ADVANCED > LAN Configuration > Static DHCP to assign specific IP addresses to specific computers on the LAN. Note: This screen has no effect if the DHCP server is not enabled. You can enable it in ADVANCED > LAN Configuration > DHCP Setup. Figure 21 ADVANCED > LAN Configuration > Static DHCP The following table describes the labels in this screen.
Chapter 7 The LAN Configuration Screens 7.4 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Modem. Note: The first static route is the default route and cannot be modified or deleted. Figure 22 Advanced> LAN Configuration > IP Static Route The following table describes the icons in this screen. Table 15 Advanced> LAN Configuration > IP Static Route ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item.
Chapter 7 The LAN Configuration Screens 7.4.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Modem. Figure 23 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen. Table 17 Advanced> LAN Configuration > IP Static Route > Edit LABEL DESCRIPTION Route Name Enter the name of the static route. Active Select this if you want the static route to be used.
Chapter 7 The LAN Configuration Screens Table 17 Advanced> LAN Configuration > IP Static Route > Edit (continued) LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 7.5 Other Settings Click ADVANCED > LAN Configuration > Other Settings to set the RIP and Multicast options. Figure 24 ADVANCED > LAN Configuration > Other Settings The following table describes the labels in this screen.
Chapter 7 The LAN Configuration Screens Table 18 ADVANCED > LAN Configuration > Other Settings (continued) LABEL DESCRIPTION Multicast You do not have to enable multicasting to use RIP-2M. (See RIP Version.) Select which version of IGMP the WiMAX Modem uses to support multicasting on the LAN. Multicasting sends packets to some computers on the LAN and is an alternative to unicasting (sending packets to one computer) and broadcasting (sending packets to every computer).
Chapter 7 The LAN Configuration Screens Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your WiMAX Modem, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your WiMAX Modem will compute the subnet mask automatically based on the IP address that you entered.
Chapter 7 The LAN Configuration Screens 7.6.4 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask. There are two ways that an ISP disseminates the DNS server addresses.
Chapter 7 The LAN Configuration Screens • None - the WiMAX Modem will not send any RIP packets and will ignore any RIP packets received. The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Modem sends (it recognizes both formats when receiving). RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology.
Chapter 7 The LAN Configuration Screens 84 User’s Guide
CHAPTER 8 The WAN Configuration Screens 8.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Modem’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet. A WAN configuration can include switched and permanent telephone circuits, terrestrial radio systems and satellite systems. 8.1.1 What You Can Do in This Chapter • The Internet Connection screen (Section 8.
Chapter 8 The WAN Configuration Screens for example). The following figure shows an MS-equipped notebook computer MS1 moving from base station BS1’s coverage area and connecting to BS2. Figure 25 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations. Numerous subscriber stations and mobile stations connect to the network through a single base station (BS), as in the following figure.
Chapter 8 The WAN Configuration Screens Authentication When authenticating a user, the base station uses a third-party RADIUS or Diameter server known as an AAA (Authentication, Authorization and Accounting) server to authenticate the mobile or subscriber stations. The following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to access the Internet.
Chapter 8 The WAN Configuration Screens 8.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Modem’s Internet settings. Note: Not all WiMAX Modem models have all the fields shown here. Figure 28 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
Chapter 8 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION PKM This field displays the Privacy Key Management version number. PKM provides security between the WiMAX Modem and the base station. At the time of writing, the WiMAX Modem supports PKMv2 only. See the WiMAX security appendix for more information. Authentication This field displays the user authentication method.
Chapter 8 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Get automatically from ISP (Default) Select this if you have a dynamic IP address. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Use Fixed IP Address A static IP address is a fixed IP that your ISP gives you. Type your ISP assigned IP address in the IP Address field below.
Chapter 8 The WAN Configuration Screens Radio frequency is measured in Hertz (Hz). Table 20 Radio Frequency Conversion 1 kHz = 1000 Hz 1 MHz = 1000 kHz (1000000 Hz) 1 GHz = 1000 MHz (1000000 kHz) Figure 29 ADVANCED > WAN Configuration >WiMAX Configuration The following table describes the labels in this screen. Table 21 ADVANCED > WAN Configuration >WiMAX Configuration LABEL DESCRIPTION DL Frequency / Bandwidth These fields show the downlink frequency settings in kilohertz (kHz).
Chapter 8 The WAN Configuration Screens 8.3.1 Frequency Ranges The following figure shows the WiMAX Modem searching a range of frequencies to find a connection to a base station. Figure 30 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Modem is capable of using to transmit and receive (see the Product Specifications appendix for details). In the figure, B shows the operator frequency range.
Chapter 8 The WAN Configuration Screens Note: It may take several minutes for the WiMAX Modem to find a connection. • The WiMAX Modem searches the DL Frequency settings in ascending numerical order, from [1] to [9]. Note: The Bandwidth field is not user-configurable; when the WiMAX Modem finds a WiMAX connection, its frequency is displayed in this field. • If you enter a 0 in a DL Frequency field, the WiMAX Modem immediately moves on to the next DL Frequency field.
Chapter 8 The WAN Configuration Screens 4 In the DL Frequency [4] field, enter 2625000. Leave the rest of the DL Frequency fields at zero. The screen appears as follows. Figure 31 Completing the WiMAX Frequency Screen 5 Click Apply. The WiMAX Modem stores your settings. When the WiMAX Modem searches for available frequencies, it scans all frequencies from DL Frequency [1] to DL Frequency [4].
Chapter 8 The WAN Configuration Screens The following table describes the labels in this screen. Table 23 ADVANCED > WAN Configuration > Advanced LABEL DESCRIPTION DNS Servers First, Second and Third DNS Server Select Obtained from ISP if your ISP dynamically assigns DNS server information (and the WiMAX Modem's WAN IP address). Use the drop-down list box to select a DNS server IP address that the ISP assigns in the field to the right. Select UserDefined if you have the IP address of a DNS server.
Chapter 8 The WAN Configuration Screens 96 User’s Guide
CHAPTER 9 The VPN Transport Screens 9.1 Overview This chapter describes the ADVANCED > VPN Transport screens, where you can configure the WiMAX Modem to allow traffic from multiple users to pass through the WiMAX network to the service provider’s router. Each user has his own personal connection to the service provider, even though there is only a single WiMAX connection. This allows the service provider to identify which user traffic comes from. VPN stands for “Virtual Private Network”.
Chapter 9 The VPN Transport Screens • The Ethernet Pseudowire screen (Section 9.4 on page 104) lets you configure the links over the WiMAX network between the WiMAX Modem and the service provider’s router. • The Statistics screen (Section 9.5 on page 107) lets you view performance information about the VPN transport connections. 9.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter.
Chapter 9 The VPN Transport Screens 9.1.3 Before You Begin Before you start configuring your WiMAX Modem to use VPN transport, ensure that you have the following from the service provider: • The IP address or domain name of the service provider’s edge router. • Virtual circuit (VC) labels for each Ethernet Pseudowire you want to create. • Also make sure that you know the VLAN IDs (Virtual LAN IDentifiers) of the VLANs on your LAN. 9.
Chapter 9 The VPN Transport Screens 9.3 Customer Interface Customer interfaces connect data coming from your computers to Ethernet pseudowires, according to the data’s VLAN (Virtual Local Area Network) information. One customer interface is for traffic that has no tag; this is the default interface (rule 0) which cannot be deleted in the GUI. All other customer interfaces are identified by their VLAN ID.
Chapter 9 The VPN Transport Screens 9.3.2 Generic Routing Encapsulation In order to transport the VPLS traffic over the WiMAX network, the WiMAX Modem uses the Generic Routing Encapsulation (GRE) protocol. Like MPLS, GRE is a tunneling protocol that has specified endpoints. The GRE tunnel is bi-directional, and transports both LSPs. The GRE tunnel runs across the WiMAX network between the WiMAX Modem and your service provider’s router.
Chapter 9 The VPN Transport Screens 9.3.3 Customer Interface Options Click ADVANCED > VPN Transport > Customer Interface to configure the VPNs used by the WiMAX Modem. Figure 38 ADVANCED > VPN Transport > Customer Interface The following table describes the icons in this screen. Table 25 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen.
Chapter 9 The VPN Transport Screens Table 26 ADVANCED > VPN Transport > Customer Interface (continued) LABEL DESCRIPTION Associated Ethernet Pseudowire (Ingress, Egress) This displays the number of the Ethernet pseudowire that this interface uses, as well as the ingress and egress MPLS (Multi-Protocol Label Switching) VC (Virtual Circuit) label numbers. DSCP This displays the DiffServ Control Point value you previously entered in binary. This determines the pseudowire’s priority on the network.
Chapter 9 The VPN Transport Screens The following table describes the labels in this screen. Table 27 ADVANCED > VPN Transport > Customer Interface Setup LABEL DESCRIPTION Active Select to make this customer interface active. Deselect it to make the customer interface inactive. Customer Interface Type A customer interface can be tagged (controlling traffic that has a specific VLAN ID) or untagged (controlling traffic without a specific VLAN ID). There can be only one untagged interface.
Chapter 9 The VPN Transport Screens device must be the same as the egress label on the peer device, as shown in the following figure. A is your WiMAX Modem and B is your service provider’s router. Figure 40 Ethernet Pseudowire Settings Example A TO Y PSEUDOWIRE TO X B INGRESS LABEL: X INGRESS LABEL: Y EGRESS LABEL: Y EGRESS LABEL: X Click ADVANCED > VPN Transport > Ethernet Pseudowire to configure the WiMAX Modem’s Ethernet pseudowires.
Chapter 9 The VPN Transport Screens Table 29 ADVANCED > VPN Transport > Ethernet Pseudowire (continued) LABEL DESCRIPTION Ingress This is the MPLS virtual circuit label number for traffic coming from the peer device. Egress This is the MPLS virtual circuit label number for traffic going to the peer device. Pseudowire Description This displays the information you previously entered describing the pseudowire.
Chapter 9 The VPN Transport Screens Table 30 ADVANCED > VPN Transport > Ethernet Pseudowire Setup (continued) LABEL DESCRIPTION Pseudowire Description Enter a brief (up to 31 characters) description for this pseudowire. Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 9.
Chapter 9 The VPN Transport Screens 108 User’s Guide
CHAPTER 10 The NAT Configuration Screens 10.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network. For example, you can use a NAT router to map one IP address from your ISP to multiple private IP addresses for the devices in your home network. 10.1.
Chapter 10 The NAT Configuration Screens The following table describes the labels in this screen. Table 32 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Address Translation Select this if you want to use port forwarding, trigger ports, or any of the ALG. Max NAT/Firewall Session Per User When computers use peer to peer applications, such as file sharing applications, they may use a large number of NAT sessions.
Chapter 10 The NAT Configuration Screens For example, let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 45 Multiple Servers Behind NAT Example 10.3.
Chapter 10 The NAT Configuration Screens The following table describes the icons in this screen. Table 33 Advanced> NAT Configuration > Port Forwarding ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen.
Chapter 10 The NAT Configuration Screens 10.3.2 Port Forwarding Rule Setup Click a port forwarding rule’s Edit icon in the ADVANCED > NAT Configuration > Port Forwarding screen to activate, deactivate, or edit it. Figure 47 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup The following table describes the labels in this screen. Table 35 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup LABEL DESCRIPTION Active Select this to enable this rule. Clear this to disable this rule.
Chapter 10 The NAT Configuration Screens 10.4 Trigger Port Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address.
Chapter 10 The NAT Configuration Screens Table 36 ADVANCED > NAT Configuration > Trigger Port (continued) LABEL Start Port End Port DESCRIPTION Enter the incoming port number or range of port numbers you want to forward to the IP address the WiMAX Modem records. To forward one port number, enter the port number in the Start Port and End Port fields.
Chapter 10 The NAT Configuration Screens 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the WiMAX Modem to record Jane’s computer IP address. The WiMAX Modem associates Jane's computer IP address with the "incoming" port range of 6970-7170. 3 The Real Audio server responds using a port number ranging between 6970-7170. 4 The WiMAX Modem forwards the traffic to Jane’s computer IP address.
Chapter 10 The NAT Configuration Screens Click ADVANCED > NAT Configuration > ALG to enable and disable SIP (VoIP), FTP (file transfer), and H.323 (audio-visual) ALG in the WiMAX Modem. Figure 50 ADVANCED > NAT Configuration > ALG The following table describes the labels in this screen. Table 37 ADVANCED > NAT Configuration > ALG User’s Guide LABEL DESCRIPTION Enable SIP ALG Select this to make sure SIP (VoIP) works correctly with portforwarding and port-triggering rules.
Chapter 10 The NAT Configuration Screens 118 User’s Guide
CHAPTER 11 The System Configuration Screens 11.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 11.1.1 What You Can Do in This Chapter • The General screen (Section 11.2 on page 121) lets you change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. • The Dynamic DNS screen (Section 11.
Chapter 11 The System Configuration Screens • In Windows XP: Click Start > My Computer > View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the WiMAX Modem System Name. Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used.
Chapter 11 The System Configuration Screens 11.2 General Click ADVANCED > System Configuration > General to change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. Figure 51 ADVANCED > System Configuration > General The following table describes the labels in this screen. Table 38 ADVANCED > System Configuration > General LABEL DESCRIPTION System Setup System Name Enter your computer's "Computer Name".
Chapter 11 The System Configuration Screens Table 38 ADVANCED > System Configuration > General (continued) LABEL DESCRIPTION Retype to Confirm Enter the new password again. Apply Click to save your changes. Reset Click to restore your previously saved settings. 11.3 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.).
Chapter 11 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client. Figure 52 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 39 ADVANCED > System Configuration > Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup User’s Guide Enable Dynamic DNS Select this to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider.
Chapter 11 The System Configuration Screens Table 39 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Enable offline option This field is available when CustomDNS is selected in the DDNS Type field. Select this if your Dynamic DNS service provider redirects traffic to a URL that you can specify while you are off line. Check with your Dynamic DNS service provider.
Chapter 11 The System Configuration Screens The following table describes the labels in this screen. Table 40 ADVANCED > System Configuration > Firmware LABEL DESCRIPTION File Path Enter the location of the *.bin file you want to upload, or click Browse... to find it. You must decompress compressed (.zip) files before you can upload them. Browse... Click this to find the *.bin file you want to upload. Upload Click this to begin uploading the selected file. This may take up to two minutes.
Chapter 11 The System Configuration Screens 11.5 Configuration Click ADVANCED > System Configuration > Configuration to back up or restore the configuration of the WiMAX Modem. You can also use this screen to reset the WiMAX Modem to the factory default settings. Figure 54 ADVANCED > System Configuration > Configuration The following table describes the labels in this screen.
Chapter 11 The System Configuration Screens 11.5.1 The Restore Configuration Process When the WiMAX Modem restores a configuration file, the device automatically restarts. This causes a temporary network disconnect. Note: Do not turn off the device while configuration file upload is in progress.
Chapter 11 The System Configuration Screens 11.6.1 The Restart Process When you click Restart, the the process usually takes about two minutes. Once the restart is complete you can log in again.
P ART IV Voice Screens The Service Configuration Screens (131) The Phone Screens (149) The Phone Book Screens (159) 129
CHAPTER 12 The Service Configuration Screens 12.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail.
Chapter 12 The Service Configuration Screens multimedia sessions over the Internet. SIP signaling is separate from the media for which it handles sessions. The media that is exchanged during the session can use a different path from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched telephone networks. SIP Identities A SIP account uses an identity (sometimes referred to as a SIP address).
Chapter 12 The Service Configuration Screens 12.1.3 Before you Begin • Ensure that you have all of your voice account information on hand. If not, contact your voice account service provider to find out which settings in this chapter you should configure in order to use your telephone with the WiMAX Modem. • Connect your WiMAX Modem to the Internet, as described in the Quick Start Guide. If you have not already done so, then you will not be able to test your VoIP settings. 12.
Chapter 12 The Service Configuration Screens The following table describes the labels in this screen. Table 43 VOICE > Service Configuration > SIP Setting LABEL DESCRIPTION SIP Account Select the SIP account you want to see in this screen. If you change this field, the screen automatically refreshes. SIP Settings Active SIP Account Select this if you want the WiMAX Modem to use this account. Clear it if you do not want the WiMAX Modem to use this account. Number Enter your SIP number.
Chapter 12 The Service Configuration Screens 12.2.1 Advanced SIP Settings This section describes the features of the Advanced SIP settings screen. 12.2.1.1 STUN STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) allows the WiMAX Modem to find the presence and types of NAT routers and/or firewalls between it and the public Internet.
Chapter 12 The Service Configuration Screens • G.711 is a Pulse Code Modulation (PCM) waveform codec. PCM measures analog signal amplitudes at regular time intervals (sampling) and converts them into digital bits (quantization). Quantization “reads” the analog signal and then “writes” it to the nearest digital value. For this reason, a digital sample is usually slightly different from its analog original (this difference is known as “quantization noise”). G.
Chapter 12 The Service Configuration Screens 12.2.1.5 Advanced SIP Settings Options Click Advanced in VOICE > Service Configuration > SIP Settings to set up and maintain advanced settings for each SIP account. Figure 58 VOICE > Service Configuration > SIP Settings > Advanced The following table describes the labels in this screen.
Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Duration Enter the number of seconds your SIP account is registered with the SIP register server before it is deleted. The WiMAX Modem automatically tries to re-register your SIP account when one-half of this time has passed. (The SIP register server might have a different expiration.
Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION STUN Active Select this if all of the following conditions are satisfied. • • • • There is a NAT router between the WiMAX Modem and the SIP server. The NAT router is not a SIP ALG. Your VoIP service provider gave you an IP address or domain name for a STUN server. Otherwise, clear this field.
Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Time Keep the default value, unless your VoIP service provider tells you to change it. Enter the number of seconds the SIP server should provide the message waiting service each time the WiMAX Modem subscribes to the service. Before this time passes, the WiMAX Modem automatically subscribes again. Fax Option G.
Chapter 12 The Service Configuration Screens Table 45 Custom Tones Details LABEL DESCRIPTION Maximum Time per Individual Tone 20 seconds Total Number of Tones Recordable 8 You can record up to eight different custom tones but the total time must be 128 seconds or less. Use the following steps if you would like to create new tones or change your tones: 1 Pick up the phone and press **** on your phone’s keypad and wait for the message that says you are in the configuration menu.
Chapter 12 The Service Configuration Screens 12.3 QoS Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Modem) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks. Only stations within the same group can communicate with each other. Your WiMAX Modem can add IEEE 802.
Chapter 12 The Service Configuration Screens Table 46 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure. Enter the VLAN ID provided by your network administrator in the field on the right. Your LAN and gateway must be configured to use VLAN tags. Otherwise, clear this field. Apply Click to save your changes.
Chapter 12 The Service Configuration Screens 6 After talking, A hangs up and sends a BYE request. 7 B replies with an OK response confirming receipt of the BYE request and the call is terminated. 12.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests. A SIP server responds to the SIP requests. When you use SIP to make a VoIP call, it originates at a client and terminates at a server.
Chapter 12 The Service Configuration Screens 2 The SIP proxy server forwards the call invitation to C. Figure 61 SIP Proxy Server B 1 A 2 C 12.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server.
Chapter 12 The Service Configuration Screens 3 Client device A then sends the call invitation to client device C. Figure 62 SIP Redirect Server 1 2 A B 3 C 12.4.6 NAT and SIP The WiMAX Modem must register its public IP address with a SIP register server. If there is a NAT router between the WiMAX Modem and the SIP register server, the WiMAX Modem probably has a private IP address. The WiMAX Modem lists its IP address in the SIP message that it sends to the SIP register server.
Chapter 12 The Service Configuration Screens 12.4.8 DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels. The following figure illustrates the DS field.
Chapter 12 The Service Configuration Screens 148 User’s Guide
CHAPTER 13 The Phone Screens 13.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Modem. You can also select which SIP account to use for making outgoing calls. 13.1.1 What You Can Do in This Chapter • The Analog Phone screen (Section 13.2 on page 150) lets you control which SIP accounts each phone uses. • The Common screen (Section 13.3 on page 152) lets you activate and deactivate immediate dialing.
Chapter 13 The Phone Screens Supplementary Phone Services Overview Supplementary services such as call hold, call waiting, call transfer, etc. are generally available from your VoIP service provider.
Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 48 VOICE > Phone > Analog Phone LABEL DESCRIPTION Phone Port Settings Select the phone port you want to see in this screen. If you change this field, the screen automatically refreshes. Phone Port Settings Displays the phone port number. Outgoing Call Use SIP1 Select this if you want this phone port to use the SIP1 account when it makes calls.
Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 49 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION Voice Volume Control Speaking Volume Enter the loudness that the WiMAX Modem uses for speech that it sends to the peer device. -14 is the quietest, and 14 is the loudest. Listening Volume Enter the loudness that the WiMAX Modem uses for speech that it receives from the peer device. -14 is the quietest, and 14 is the loudest. Echo Cancellation G.
Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 50 VOICE > Phone > Common LABEL DESCRIPTION Active Immediate Dial Select this if you want to use the pound key (#) to tell the WiMAX Modem to make the phone call immediately, instead of waiting the number of seconds you selected in the Dialing Interval Select in VOICE > Phone > Analog Phone. If you select this, dial the phone number, and then press the pound key if you do not want to wait.
Chapter 13 The Phone Screens 13.5 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 13.5.1 The Flash Key Flashing means to press the hook for a short period of time (a few hundred milliseconds) before releasing it. On newer telephones, there should be a "flash" key (button) that generates the signal electronically.
Chapter 13 The Phone Screens If you have another call, press the flash key and then “2” to switch back and forth between caller A and B by putting either one on hold. Press the flash key and then “0” to disconnect the call presently on hold and keep the current call on line. Press the flash key and then “1” to disconnect the current call and resume the call on hold. If you hang up the phone but a caller is still on hold, there will be a remind ring.
Chapter 13 The Phone Screens 4 Hang up the phone to drop the connection. 5 If you want to separate the activated three-way conference into two individual connections (one is on-line, the other is on hold), press the flash key and press “2”. 13.5.3 USA Type Supplementary Services This section describes how to use supplementary phone services with the USA Type Call Service Mode. Commands for supplementary services are listed in the table below.
Chapter 13 The Phone Screens 3 After you hear the ring signal or the second party answers it, hang up the phone. USA Three-Way Conference allows you to make three-way conference calls. To do so: 1 When you are making a call, press the flash key to put the call on hold and get a dial tone. 2 Dial a phone number to make a second call. 3 When the second call is answered, press the flash key to create a three-way conversation.
Chapter 13 The Phone Screens 158 User’s Guide
CHAPTER 14 The Phone Book Screens 14.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Modem’s phone book for making VoIP calls. 14.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 14.2 on page 160) lets you maintain rules for handling incoming calls. You can block, redirect, or accept them. • The Speed Dial screen (Section 14.3 on page 162) lets you add, edit, or remove speed-dial entries. 14.1.
Chapter 14 The Phone Book Screens 14.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 68 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen. Table 54 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION Table Number Select the call-forwarding table you want to see in this screen.
Chapter 14 The Phone Book Screens Table 54 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer Forward to Number Select this if you want the WiMAX Modem to forward incoming calls to the specified phone number if the call is unanswered. (See No Answer Waiting Time.) Specify the phone number in the field on the right. No Answer Waiting Time This field is used by the No Answer Forward to Number feature and No Answer conditions below.
Chapter 14 The Phone Book Screens 14.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters. You can also create speed-dial entries for frequently-used SIP phone numbers. Figure 69 VOICE > Phone Book > Speed Dial The following table describes the icons in this screen.
Chapter 14 The Phone Book Screens The following table describes the labels in this screen. Table 56 VOICE > Phone Book > Speed Dial LABEL DESCRIPTION Speed Dial Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the WiMAX Modem to call when you dial the speed-dial number. Name Enter a name to identify the party you call when you dial the speed-dial number. You can use up to 127 printable ASCII characters.
Chapter 14 The Phone Book Screens 164 User’s Guide
P ART V Tools & Status Screens The Certificates Screens (167) The Firewall Screens (189) Content Filter (199) The Remote Management Screens (203) QoS (215) The Logs Screens (219) The Status Screen (235) 165
CHAPTER 15 The Certificates Screens 15.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Modem. The WiMAX Modem can use public key certificates (also sometimes called “digital IDs”) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 15 The Certificates Screens WiMAX Modem to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 15.2 My Certificates Click TOOLS > Certificates > My Certificates to access this screen. Use this screen to generate and export self-signed certificates or certification requests and import the WiMAX Modem’s CA-signed certificates.
Chapter 15 The Certificates Screens Table 58 TOOLS > Certificates > My Certificates (continued) LABEL DESCRIPTION Name This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. Type This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate.
Chapter 15 The Certificates Screens 15.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Modem create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
Chapter 15 The Certificates Screens The following table describes the labels in this screen. Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Subject Information Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although the Common Name is mandatory.
Chapter 15 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Create a certification request and enroll for a certificate immediately online Select Create a certification request and enroll for a certificate immediately online to have the WiMAX Modem generate a request for a certificate and apply to a certification authority for a certificate. You must have the certification authority’s certificate already imported in the Trusted CAs screen.
Chapter 15 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. If you configured the My Certificate Create screen to have the WiMAX Modem enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen.
Chapter 15 The Certificates Screens 15.2.2 My Certificate Edit Click TOOLS > Certificates > My Certificates then the Edit icon to access this screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 72 TOOLS > Certificates > My Certificates > Edit The following table describes the labels in this screen. Table 60 TOOLS > Certificates > My Certificates > Edit 174 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 15 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 15 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. Basic Constraint This field displays general information about the certificate.
Chapter 15 The Certificates Screens 15.2.3 My Certificate Import Click TOOLS > Certificates > My Certificates > Import to access this screen. Use this screen to import a certificate that matches a corresponding certification request that was generated by the WiMAX Modem. You must remove any spaces from the certificate’s filename before you can import it. Figure 73 TOOLS > Certificates > My Certificates > Import The following table describes the labels in this screen.
Chapter 15 The Certificates Screens 15.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs access this screen. Use this screen to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted. The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities.
Chapter 15 The Certificates Screens Table 63 TOOLS > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. Valid From This field displays the date that the certificate becomes applicable.
Chapter 15 The Certificates Screens 15.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 75 TOOLS > Certificates > Trusted CAs > Edit The following table describes the labels in this screen. Table 64 TOOLS > Certificates > Trusted CAs > Edit 180 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 15 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 15 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. Basic Constraint This field displays general information about the certificate.
Chapter 15 The Certificates Screens 15.3.2 Trusted CA Import Click TOOLS > Certificates > Trusted CAs and then click Import to open the Trusted CA Import screen. Follow the instructions in this screen to save a trusted certification authority’s certificate from a computer to the WiMAX Modem. The WiMAX Modem trusts any valid certificate signed by any of the imported trusted CA certificates. Note: You must remove any spaces from the certificate’s filename before you can import the certificate.
Chapter 15 The Certificates Screens 15.4.1 Certificate Authorities When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it ought to look.
Chapter 15 The Certificates Screens Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The WiMAX Modem can check a peer’s certificate against a directory server’s list of revoked certificates. The framework of servers, software, procedures and policies that handles keys is called PKI (public-key infrastructure). 15.4.1.
Chapter 15 The Certificates Screens 15.4.2 Verifying a Certificate Before you import a certificate into the WiMAX Modem, you should verify that you have the correct certificate. This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates. 15.4.2.1 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms.
Chapter 15 The Certificates Screens 3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 78 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.
Chapter 15 The Certificates Screens 188 User’s Guide
CHAPTER 16 The Firewall Screens 16.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Modem’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an untrusted network.
Chapter 16 The Firewall Screens the Internet. The WiMAX Modem can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The WiMAX Modem is installed between the LAN and a WiMAX base station connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The WiMAX Modem has one Ethernet (LAN) port.
Chapter 16 The Firewall Screens LAN-to-LAN/WiMAX Modem means the LAN to the WiMAX Modem LAN interface. This is always allowed, as this is how you manage the WiMAX Modem from your local computer. WAN-to-LAN rules are Internet to your local network firewall rules. The default is to block all traffic from the Internet to your local network. How can you forward certain WAN to LAN traffic? You may allow traffic originating from the WAN to be forwarded to the LAN by: • Configuring NAT port forwarding rules.
Chapter 16 The Firewall Screens 16.2.3 General Options Click TOOLS > Firewall > General to configure the basic settings for your firewall. Figure 81 TOOLS > Firewall > General The following table describes the labels in this screen. Table 66 TOOLS > Firewall > General LABEL DESCRIPTION Enable Firewall Select this to activate the firewall. The WiMAX Modem controls access and protects against Denial of Service (DoS) attacks when the firewall is activated.
Chapter 16 The Firewall Screens 16.3 Services Click TOOLS > Firewall > Services to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 82 TOOLS > Firewall > Service Setting The following table describes the labels in this screen. Table 67 TOOLS > Firewall > Service Setting LABEL DESCRIPTION Service Setup Enable Services Blocking Select this to activate service blocking.
Chapter 16 The Firewall Screens Table 67 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Blocked Services This is a list of services (ports) that are inaccessible to computers on your LAN when service blocking is effective. To remove a service from this list, select the service, and click Delete. Type Select TCP or UDP, based on which one the custom port uses. Port Number Enter the range of port numbers that defines the service.
Chapter 16 The Firewall Screens 16.4.2 Guidelines For Enhancing Security With Your Firewall 1 Change the default password via web configurator. 2 Think about access control before you connect to the network in any way. 3 Limit who can access your router. 4 Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could present a potential security risk.
Chapter 16 The Firewall Screens As a result, the WiMAX Modem resets the connection, as the connection has not been acknowledged. Figure 83 “Triangle Route” Problem 16.4.3.1 Solving the “Triangle Route” Problem If you have the WiMAX Modem allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the WiMAX Modem and its firewall protection. Another solution is to use IP alias.
Chapter 16 The Firewall Screens 4 The WiMAX Modem then sends it to the computer on the LAN in Subnet 1.
Chapter 16 The Firewall Screens 198 User’s Guide
CHAPTER 17 Content Filter 17.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs. Content filtering is the ability to block certain web features or specific URL keywords. The WiMAX Modem can block web features such as ActiveX controls, Java applets, cookies and disable web proxies.
Chapter 17 Content Filter 17.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective.
Chapter 17 Content Filter The following table describes the labels in this screen. Table 68 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted Computer IP Address You can allow a specific computer to access all Internet resources without the restrictions you set in these screens. Enter the IP address of the trusted computer. Restrict Web Features Select the web features you want to disable.
Chapter 17 Content Filter 17.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 86 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 69 TOOLS > Content Filter > Schedule 202 LABEL DESCRIPTION Day to Block Select which days of the week you want content filtering to be effective. Time of Day to Block Select what time each day you want content filtering to be effective.
CHAPTER 18 The Remote Management Screens 18.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Modem interface (if any) from which computers. You may manage your WiMAX Modem from a remote location via: Table 70 Remote Management • Internet (WAN only) • ALL (LAN and WAN) • LAN only • Neither (Disable).
Chapter 18 The Remote Management Screens • The SNMP screen (Section 18.5 on page 207) lets you control SNMP access to your WiMAX Modem. • The DNS screen (Section 18.6 on page 210) lets you control DNS access to your WiMAX Modem. • The Security screen (Section 18.7 on page 211) lets you control how your WiMAX Modem responds to other types of requests. • The TR069 screen (Section 18.8 on page 212) lets you configure the WiMAX Modem’s auto-configuration and dynamic service configuration options. 18.1.
Chapter 18 The Remote Management Screens SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your WiMAX Modem supports SNMP agent functionality, which allows a manager station to manage and monitor the WiMAX Modem through the network. The WiMAX Modem supports SNMP version one (SNMPv1) and version two (SNMPv2). The next figure illustrates an SNMP management operation.
Chapter 18 The Remote Management Screens 18.3 Telnet Click TOOLS > Remote Management > Telnet to control Telnet access to your WiMAX Modem. Figure 88 TOOLS > Remote Management > Telnet The following table describes the labels in this screen. Table 72 TOOLS > Remote Management > Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number.
Chapter 18 The Remote Management Screens The following table describes the labels in this screen. Table 73 TOOLS > Remote Management > FTP LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the WiMAX Modem using this service. Secured Client IP Address Select All to allow any computer to access the WiMAX Modem using this service.
Chapter 18 The Remote Management Screens The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects. The WiMAX Modem supports MIB II that is defined in RFC-1213 and RFC-1215.
Chapter 18 The Remote Management Screens 18.5.2 SNMP Options Click TOOLS > Remote Management > SNMP to access this screen. Use SNMP options to control SNMP access to your WiMAX Modem. Figure 91 TOOLS > Remote Management > SNMP The following table describes the labels in this screen. Table 75 TOOLS > Remote Management > SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station.
Chapter 18 The Remote Management Screens Table 75 TOOLS > Remote Management > SNMP (continued) LABEL DESCRIPTION Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the WiMAX Modem using this service. Select All to allow any computer to access the WiMAX Modem using this service. Choose Selected to just allow the computer with the IP address that you specify to access the WiMAX Modem using this service. Apply Click to save your changes.
Chapter 18 The Remote Management Screens 18.7 Security Click TOOLS > Remote Management > Security to access this screen. Use this screen to control how your WiMAX Modem responds to other types of requests. Figure 93 TOOLS > Remote Management > Security The following table describes the labels in this screen. Table 77 TOOLS > Remote Management > Security LABEL DESCRIPTION Respond to Ping on Select the interface(s) on which the WiMAX Modem should respond to incoming ping requests.
Chapter 18 The Remote Management Screens 18.8 TR0-69 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipement (CPE), such as the WiMAX Modem. It can be managed over a WAN by means of an Auto Configuration Server (ACS). TR-069 is based on sending Remote Procedure Calls (RPCs) between the ACS and the client device. RPCs are sent in Extensible Markup Language (XML) format over HTTP or HTTPS.
Chapter 18 The Remote Management Screens Click TOOLS > Remote Management > TR069 to access this screen. Use this screen to open WiMAX Modem’s auto-configuration and dynamic service configuration options. Figure 95 TOOLS > Remote Management > TR069 The following table describes the labels in this screen. Table 78 TOOLS > Remote Management > TR069 LABEL DESCRIPTION Active Select this option to turn on the WiMAX Modem’s TR-069 feature.
Chapter 18 The Remote Management Screens Table 78 TOOLS > Remote Management > TR069 LABEL DESCRIPTION Periodic Inform Enable Select this to allow the WiMAX Modem to periodically connect to the ACS and check for configuration updates. If you do not enable this feature then the WiMAX Modem can only be updated automatically when the ACS initiates contact with it and if you selected the Active checkbox on this screen.
CHAPTER 19 QoS 19.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested. This can cause a reduction in network performance and make the network inadequate for time-critical application such as video-ondemand. 19.2 General Click TOOLS > QoS to open the screen as shown next.
Chapter 19 QoS 19.3 Class Setup Use this screen to add, edit or delete QoS classifiers. A classifier groups traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow. You can give different priorities to traffic that the WiMAX Modem forwards out through the WAN interface.
Chapter 19 QoS 19.3.1 Class Configuration Click the Create New Class button or the edit icon in the Class Setup screen to configure a classifier. Figure 98 QoS > Class Setup > Class Configuration The following table describes the labels in this screen. Table 81 QoS Class Setup LABEL DESCRIPTION Class Configuration Active Select this to make a class active. Index Enter an index number for the class. Similar classes are processed in order of index number, from lowest to highest.
Chapter 19 QoS 218 User’s Guide
CHAPTER 20 The Logs Screens 20.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Modem’s log and alert settings. For a list of log messages, see Section 20.4 on page 225. 20.1.1 What You Can Do in This Chapter • The View Logs screen (Section 20.2 on page 221) lets you look at log entries and alerts. • The Log Settings screen (Section 20.
Chapter 20 The Logs Screens can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs. Table 82 Syslog Logs LOG MESSAGE DESCRIPTION Event Log: Mon dd hr:mm:ss hostname src="" dst="" msg="" note="" devID="" cat="" This message is sent by the system ("RAS" displays as the system name if you haven’t configured one) when the router generates a syslog.
Chapter 20 The Logs Screens 20.2 View Logs Click TOOLS > Logs > View Log to access this screen. Use this screen to look at log entries and alerts. Alerts are written in red. Figure 99 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order. The small triangle next to a column header indicates how the table is currently sorted (pointing downward is descending; pointing upward is ascending).
Chapter 20 The Logs Screens Table 84 TOOLS > Logs > View Logs (continued) 222 LABEL DESCRIPTION # The number of the item in this list. Time This field displays the time the log entry was recorded. Message This field displays the reason for the log entry. See Section 20.4 on page 225. Source This field displays the source IP address and the port number of the incoming packet. In many cases, some or all of this information may not be available.
Chapter 20 The Logs Screens 20.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Modem sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded.
Chapter 20 The Logs Screens The following table describes the labels in this screen. Table 85 TOOLS > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e-mail logs and alerts. Leave this field blank if you do not want to send logs or alerts by e-mail. Mail Subject Enter the subject line used in e-mail messages the WiMAX Modem sends.
Chapter 20 The Logs Screens Table 85 TOOLS > Logs > Log Settings LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 20.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 86 System Error Logs LOG MESSAGE DESCRIPTION WAN connection is down. The WAN connection is down. You cannot access the network through this interface. %s exceeds the max.
Chapter 20 The Logs Screens Table 87 System Maintenance Logs (continued) LOG MESSAGE DESCRIPTION Time initialized by Time server The device got the time and date from the time server. Time initialized by NTP server The device got the time and date from the NTP server. Connect to Daytime server fail The device was not able to connect to the Daytime server. Connect to Time server fail The device was not able to connect to the Time server.
Chapter 20 The Logs Screens Table 89 TCP Reset Logs LOG MESSAGE DESCRIPTION Under SYN flood attack, sent TCP RST The router sent a TCP reset packet when a host was under a SYN flood attack (the TCP incomplete count is per destination host.) Exceed TCP MAX incomplete, sent TCP RST The router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold. (the TCP incomplete count is per destination host.
Chapter 20 The Logs Screens For type and code details, see Table 97 on page 231. Table 91 ICMP Logs LOG MESSAGE DESCRIPTION Firewall default policy: ICMP , , ICMP access matched the default policy and was blocked or forwarded according to the user's setting.
Chapter 20 The Logs Screens Table 94 Content Filtering Logs LOG MESSAGE DESCRIPTION %s: Keyword blocking The content of a requested web page matched a user defined keyword. %s: Not in trusted web list The web site is not in a trusted domain, and the router blocks all traffic except trusted domain sites. %s: Forbidden Web site The web site is in the forbidden web site list. %s: Contains ActiveX The web site contains ActiveX. %s: Contains Java applet The web site contains a Java applet.
Chapter 20 The Logs Screens Table 95 Attack Logs (continued) LOG MESSAGE DESCRIPTION ip spoofing - WAN ICMP (type:%d, code:%d) The firewall detected an ICMP IP spoofing attack on the WAN port. icmp echo : ICMP (type:%d, code:%d) The firewall detected an ICMP echo attack. syn flood TCP The firewall detected a TCP syn flood attack. ports scan TCP The firewall detected a TCP port scan attack. teardrop TCP The firewall detected a TCP teardrop attack.
Chapter 20 The Logs Screens Table 96 Remote Management Logs LOG MESSAGE DESCRIPTION Remote Management: WWW denied Attempted use of WWW service was blocked according to remote management settings. Remote Management: HTTPS denied Attempted use of HTTPS service was blocked according to remote management settings. Remote Management: SSH denied Attempted use of SSH service was blocked according to remote management settings.
Chapter 20 The Logs Screens Table 97 ICMP Notes (continued) TYPE CODE DESCRIPTION 0 Timestamp request message Timestamp Reply 14 0 Timestamp reply message Information Request 15 0 Information request message Information Reply 16 0 Information reply message Table 98 SIP Logs LOG MESSAGE DESCRIPTION SIP Registration Success by SIP:SIP Phone Number The listed SIP account was successfully registered with a SIP register server.
Chapter 20 The Logs Screens Table 100 FSM Logs: Caller Side LOG MESSAGE DESCRIPTION VoIP Call Start Ph[Phone Port Number] <- Outgoing Call Number Someone used a phone connected to the listed phone port to initiate a VoIP call to the listed destination. VoIP Call Established Ph[Phone Port] -> Outgoing Call Number Someone used a phone connected to the listed phone port to make a VoIP call to the listed destination.
Chapter 20 The Logs Screens 234 User’s Guide
CHAPTER 21 The Status Screen 21.1 Overview Use this screen to view a complete summary of your WiMAX Modem connection status. 21.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts. You can also register and un-register SIP accounts as well as view detailed information from DHCP and statistics from WiMAX, VoIP, bandwidth management, and traffic.
Chapter 21 The Status Screen The following tables describe the labels in this screen. Table 103 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Modem system name. It is used for identification. You can change this in the ADVANCED > System Configuration > General screen’s System Name field.
Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION WiMAX State This field displays the status of the WiMAX Modem’s current connection. • • • • • • • • INIT: the WiMAX Modem is starting up. DL_SYN: The WiMAX Modem is unable to connect to a base station. RANGING: the WiMAX Modem and the base station are transmitting and receiving information about the distance between them.
Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION Memory Usage This field displays what percentage of the WiMAX Modem’s memory is currently used. The higher the memory usage, the more likely the WiMAX Modem is to slow down. Some memory is required just to start the WiMAX Modem and to run the web configurator.
Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, Click Unregister to delete the SIP account’s registration in the SIP server. This does not cancel your SIP account, but it deletes the mapping between your SIP identity and your IP address or domain name.
Chapter 21 The Status Screen The following table describes the fields in this screen. Table 104 Packet Statistics LABEL DESCRIPTION Port This column displays each interface of the WiMAX Modem. Status This field indicates whether or not the WiMAX Modem is using the interface. For the WAN interface, this field displays the port speed and duplex setting when the WiMAX Modem is connected to a WiMAX network, and Down when the WiMAX Modem is not connected to a WiMAX network.
Chapter 21 The Status Screen 21.2.2 WiMAX Site Information Click Status > WiMAX Site Information to open this screen. This read-only screen shows WiMAX frequency information for the WiMAX Modem. These settings can be configured in the ADVANCED > WAN Configuration > WiMAX Configuration screen. Figure 103 WiMAX Site Information The following table describes the labels in this screen.
Chapter 21 The Status Screen 21.2.3 DHCP Table Click Status > DHCP Table to open this screen. This read-only screen shows the IP addresses, Host Names and MAC addresses of the devices currently connected to the WiMAX Modem. These settings can be configured in the ADVANCED > LAN Configuration > DHCP Setup screen. Figure 104 DHCP Table Each field is described in the following table. Table 106 DHCP Table 242 LABEL DESCRIPTION # The number of the item in this list.
Chapter 21 The Status Screen 21.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 105 VoIP Statistics Each field is described in the following table. Table 107 VoIP Statistics LABEL DESCRIPTION SIP Status Port This column displays each SIP account in the WiMAX Modem.
Chapter 21 The Status Screen Table 107 VoIP Statistics LABEL DESCRIPTION Last Outgoing Number This field displays the last number the SIP account called. It displays N/A if the SIP account has never dialed a number. Call Statistics Phone This field displays the WiMAX Modem’s phone port number. Hook This field indicates whether the phone is on the hook or off the hook. On - The phone is hanging up or already hung up. Off - The phone is dialing, calling, or connected.
Chapter 21 The Status Screen 21.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. Note: Not all WiMAX Modem models have all the fields shown here. Figure 106 WiMAX Profile The following table describes the labels in this screen.
Chapter 21 The Status Screen Table 108 The WiMAX Profile Screen (continued) LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station. See the WiMAX security appendix for more details.
P ART VI Troubleshooting and Specifications Troubleshooting (249) Product Specifications (257) 247
CHAPTER 22 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Modem Access and Login • Internet Access • Phone Calls and VoIP • Reset the WiMAX Modem to Its Factory Defaults 22.1 Power, Hardware Connections, and LEDs The WiMAX Modem does not turn on. None of the LEDs turn on.
Chapter 22 Troubleshooting 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adapter to the WiMAX Modem. 5 If the problem continues, contact the vendor. 22.2 WiMAX Modem Access and Login I forgot the IP address for the WiMAX Modem. 1 The default IP address is http://192.168.1.1.
Chapter 22 Troubleshooting • If you changed the IP address (Section 6.2 on page 66), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the WiMAX Modem. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 33. 3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled.
Chapter 22 Troubleshooting I cannot Telnet to the WiMAX Modem. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. 22.3 Internet Access I cannot access the Internet. 252 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 33. 2 Make sure you entered your ISP account information correctly in the wizard.
Chapter 22 Troubleshooting I cannot access the Internet any more. I had access to the Internet (with the WiMAX Modem), but my Internet connection is not available any more. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page 33. 2 Disconnect and re-connect the power adapter to the WiMAX Modem. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent.
Chapter 22 Troubleshooting 22.4 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. 1 Check the telephone connections and telephone wire. 2 Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 12 on page 131). I can access the Internet, but cannot make VoIP calls. 1 Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 12 on page 131).
Chapter 22 Troubleshooting 22.5 Reset the WiMAX Modem to Its Factory Defaults If you reset the WiMAX Modem, you lose all of the changes you have made. The WiMAX Modem re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the Reset button. To reset the WiMAX Modem, 1 Make sure the Power LED is on and not blinking. 2 Press and hold the Reset button for five to ten seconds.
Chapter 22 Troubleshooting 256 User’s Guide
CHAPTER 23 Product Specifications This chapter gives details about your WiMAX Modem’s hardware and firmware features. Table 109 Environmental and Hardware Specifications FEATURE DESCRIPTION Operating Temperature -40°C to 60°C (ODU), -5°C to 55°C (IDU) Storage Temperature -40°C to 65°C (ODU), -25°C to 60°C (IDU) Operating Humidity 10% ~ 90% (non-condensing) Storage Humidity 10% to 95% (non-condensing) Power Supply Input: 90V-270V, 50/60Hz Power Consumption MAX-306M1: Output: 48.0V --- 0.
Chapter 23 Product Specifications Table 110 Radio Specifications FEATURE DESCRIPTION WiMAX Operating Frequency MAX-306M1: 2.5~2.7 GHz Channel Bandwidth 5MHz / 10MHz Maximum Transmit Power 26dbm with ODU antenna deployed. WiMAX Compliance Compliant to receiver performances defined in IEEE P802.16-2005, §8.4.13. MAX-316M1: 3.4~3.
Chapter 23 Product Specifications Table 111 Firmware Specifications (continued) FEATURE DESCRIPTION DHCP DHCP (Dynamic Host Configuration Protocol) allows the individual clients (computers) to obtain the TCP/IP configuration at start-up from a centralized DHCP server. Your device has built-in DHCP server capability enabled by default. It can assign IP addresses, an IP default gateway and DNS servers to DHCP clients.
Chapter 23 Product Specifications Table 112 Standards Supported 260 STANDARD DESCRIPTION RFC 768 User Datagram Protocol RFC 791 Internet Protocol v4 RFC 792 Internet Control Message Protocol RFC 792 Transmission Control Protocol RFC 826 Address Resolution Protocol RFC 854 Telnet Protocol RFC 1349 Type of Service Protocol RFC 1706 DNS NSAP Resource Records RFC 1889 Real-time Transport Protocol (RTP) RFC 1890 Real-time Transport Control Protocol (RTCP) RFC 2030 Simple Network Time Pr
Chapter 23 Product Specifications Table 112 Standards Supported (continued) STANDARD DESCRIPTION IEEE 802.3 10BASE5 10 Mbit/s (1.25 MB/s) IEEE 802.3u 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) with auto-negotiation Table 113 Voice Features Call Park and Pickup Call park and pickup lets you put a call on hold (park) and then continue the call (pickup). The caller must still pay while the call is parked.
Chapter 23 Product Specifications Table 113 Voice Features Call waiting This feature allows you to hear an alert when you are already using the phone and another person calls you. You can then either reject the new incoming call, put your current call on hold and receive the new incoming call, or end the current call and receive the new incoming call.
Chapter 23 Product Specifications Table 114 Star (*) and Pound (#) Code Support *70 Followed by the 10 digit phone number to cancel Call Waiting on a single call basis *72 Activate Call Forwarding (*72 followed by the 10 digit phone number that is requesting call forwarding service) *720 Activate Call Forwarding (*720 followed by the 10 digit phone number that is requesting deactivation of call forwarding service) *73 Plus the forward to phone number to activate Call Forwarding No Answer (no VM serv
Chapter 23 Product Specifications 264 User’s Guide
P ART VII Appendices and Index WiMAX Security (267) Setting Up Your Computer’s IP Address (271) Pop-up Windows, JavaScripts and Java Permissions (299) IP Addresses and Subnetting (309) Importing Certificates (321) SIP Passthrough (353) Common Services (355) Legal Information (359) Customer Support (363) 265
APPENDIX A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a user’s identity and level of authorization.
Appendix A WiMAX Security RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The base station is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity.
Appendix A WiMAX Security the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Diameter Diameter (RFC 3588) is a type of AAA server that provides several improvements over RADIUS in efficiency, security, and support for roaming. Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA).
Appendix A WiMAX Security Authentication The WiMAX Modem supports EAP-TTLS authentication. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection (with EAPTLS digital certifications are needed by both the server and the wireless clients for mutual authentication).
APPENDIX B Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 107 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 109 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 111 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 112 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 113 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 115 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 116 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 118 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 119 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 120 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 121 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 122 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Figure 123 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Click Apply Now and close the window.Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 124 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 125 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 126 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 127 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your WiMAX Modem. Figure 128 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 129 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 1 Click System > Administration > Network. Figure 130 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 132 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 134 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 135 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 138 openSUSE 10.3: K Menu > Computer Menu 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 139 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 140 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 141 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 142 openSUSE 10.3: Network Settings 9 296 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 143 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address 298 User’s Guide
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 146 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 147 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 148 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 149 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 150 Security Settings - Java Scripting Java Permissions 304 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 151 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 152 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 308 User’s Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 155 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 156 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.
Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 157 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix D IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 119 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix D IP Addresses and Subnetting Table 122 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix D IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 125 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix D IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the WiMAX Modem unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
Appendix D IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 158 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets.
Appendix D IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
APPENDIX E Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 161 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix E Importing Certificates 3 In the Address Bar, click Certificate Error > View certificates. Figure 163 Internet Explorer 7: Certificate Error 4 In the Certificate dialog box, click Install Certificate.
Appendix E Importing Certificates 5 In the Certificate Import Wizard, click Next. Figure 165 Internet Explorer 7: Certificate Import Wizard 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9.
Appendix E Importing Certificates 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 167 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 169 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 171 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 173 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 175 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 177 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 178 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix E Importing Certificates 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix E Importing Certificates 3 The certificate is stored and you can now connect securely to the web configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 182 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 184 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 185 5 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 186 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 188 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 189 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences.
Appendix E Importing Certificates 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 194 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 196 6 Next, click OK. Figure 197 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 198 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 200 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 201 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 202 Konqueror 3.
Appendix E Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 203 Konqueror 3.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 204 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 205 Konqueror 3.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 207 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 208 Konqueror 3.
Appendix E Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button.
Appendix E Importing Certificates 352 User’s Guide
APPENDIX F SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Modem, use the ip alg disable ALG_SIP command to turn off the SIP ALG. Signaling Session Timeout Most SIP clients have an “expire” mechanism indicating the lifetime of signaling sessions.
Appendix F SIP Passthrough 354 User’s Guide
APPENDIX G Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix G Common Services Table 126 Commonly Used Services (continued) 356 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix G Common Services Table 126 Commonly Used Services (continued) User’s Guide NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix G Common Services Table 126 Commonly Used Services (continued) 358 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX H Legal Information Copyright Copyright © 2008 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix H Legal Information Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device complies with part 15 of the FCC Rules. • Operation is subject to the condition that this device does not cause harmful interference. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules.
Appendix H Legal Information 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Appendix H Legal Information implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
APPENDIX I Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http://www.zyxel.com/web/contact_us.php). Please have the following information ready when you contact an office. Required Information • Product model and serial number. • Warranty Information.
Appendix I Customer Support China - ZyXEL Communications (Shanghai) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn • Telephone: +86-021-61199055 • Fax: +86-021-52069033 • Address: 1005F, ShengGao International Tower, No.137 XianXia Rd., Shanghai • Web: http://www.zyxel.cn Costa Rica • Support E-mail: soporte@zyxel.co.cr • Sales E-mail: sales@zyxel.co.cr • Telephone: +506-2017878 • Fax: +506-2015098 • Web: www.zyxel.co.
Appendix I Customer Support • Fax: +358-9-4780-8448 • Web: www.zyxel.fi • Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-6909-69 • Fax: +49-2405-6909-99 • Web: www.zyxel.
Appendix I Customer Support Japan • Support E-mail: support@zyxel.co.jp • Sales E-mail: zyp@zyxel.co.jp • Telephone: +81-3-6847-3700 • Fax: +81-3-6847-3705 • Web: www.zyxel.co.jp • Regular Mail: ZyXEL Japan, 3F, Office T&U, 1-10-10 Higashi-Gotanda, Shinagawa-ku, Tokyo 141-0022, Japan Kazakhstan • Support: http://zyxel.kz/support • Sales E-mail: sales@zyxel.kz • Telephone: +7-3272-590-698 • Fax: +7-3272-590-689 • Web: www.zyxel.kz • Regular Mail: ZyXEL Kazakhstan, 43 Dostyk Ave.
Appendix I Customer Support • Sales E-mail: sales@zyxel.no • Telephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • Web: www.zyxel.no • Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland • E-mail: info@pl.zyxel.com • Telephone: +48-22-333 8250 • Fax: +48-22-333 8251 • Web: www.pl.zyxel.com • Regular Mail: ZyXEL Communications, ul. Okrzei 1A, 03-715 Warszawa, Poland Russia • Support: http://zyxel.ru/support • Sales E-mail: sales@zyxel.
Appendix I Customer Support Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 • Fax: +46-31-744-7701 • Web: www.zyxel.se • Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Taiwan • Support E-mail: support@zyxel.com.tw • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-2-27399889 • Fax: +886-2-27353220 • Web: http://www.zyxel.com.tw • Address: Room B, 21F., No.333, Sec. 2, Dunhua S. Rd.
Appendix I Customer Support • Fax: +380-44-494-49-32 • Web: www.ua.zyxel.com • Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str., Kiev 04050, Ukraine United Kingdom • Support E-mail: support@zyxel.co.uk • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd.
Appendix I Customer Support 370 User’s Guide
Index Index A AAA 87 AbS 136 accounting server see AAA ACK message 143 activity 87 Advanced Encryption Standard see AES AES 269 ALG 116 alternative subnet mask notation 312 analysis-by-synthesis 136 Application Layer Gateway see ALG authentication 44, 87, 89, 267 inner 270 key server 87 types 270 authorization 267 request and reply 269 server 87 B Europe type service mode 154 hold 154–156 service mode 154–156 transfer 155–156 waiting 155–156 CBC-MAC 269 CCMP 267, 269 cell 85 Certificate Management Protoc
Index CMAC see MAC codec 135 echo cancellation 149 encryption 267–269 traffic 269 contact information 363 Ethernet encapsulation 110 copyright 359 Europe type call service mode 154 CoS 146 Extensible Authorization Protocol see EAP comfort noise 149 counter mode see CCMP coverage area 85 cryptography 267 F customer support 363 FCC interference statement 360 firewall 189, 194, 195 D flash key 154 data 267–269 decryption 267 encryption 267 flow 269 frequency band 94 ranges 93, 94 scanning 94 DH
Index inner authentication 270 Internet access 87 Internet Assigned Numbers Authority see IANA 318 Internet Telephony Service Provider see ITSP interoperability 85 IP-PBX 131 N NAT 135, 317 and remote management 204 routers 135 server sets 110 network activity 87 services 87 ITSP 131 ITU-T 149 O K key 44, 89, 267 request and reply 269 L listening port 139 OK response 143 outbound proxy 135, 146 server 135 SIP 135 P pattern-spotting 269 PBX services 131 PCM 136 M MAC 269 MAN 85 Management Information
Index Q QoS 215 Quality of Service, see QoS R RADIUS 87, 268 Message Types 268 Messages 268 Shared Secret Key 268 Real-time Transport Protocol see RTP redirect server SIP 145 register server SIP 132 registration product 362 related documentation 3 remote management and NAT 204 remote management limitations 204 required bandwidth 136 RFC 1889 132 RFC 2510. See Certificate Management Protocol.
Index T tampering TCP/IP configuration 74 TEK 269 TFTP restrictions 204 three-way conference 155, 157 TLS 44, 89, 267 transport encryption key see TEK transport layer security see TLS triangle route problem 195 solutions 196 trigger port forwarding process 115 TTLS 44, 89, 267, 270 tunneled TLS see TTLS U unauthorized device 267 uniform resource identifier 132 tags 142 VLAN ID 142 voice activity detection 149 coding 135 mail 131 Voice over IP see VoIP VoIP 131 W waveform codec 136 WiMAX 85–86 security 2
Index 376 User’s Guide