WiMAX CPE Series MAX208M, MAX218M, MAX208M2W, MAX218M2W, MAX218M1W, MAX218MW, MAX318M2W, MAX308M, MAX318M Default Login Details IP Address http://192.168.1.1 Admin’s User Name /Password admin / 1234 Guest’s User Name /Password guest / guest Firmware Version 2.00 Edition 1, 8/2011 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the WiMAX Device. See the productspecific QSG for hardware setup. Note: This is a configuration manual for a series of products. Therefore, some features or options in this guide may not be available in your product. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get your WiMAX Device up and running right away.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The WiMAX Device may be referred to as the “WiMAX Device”, the “device” or the “system” in this User’s Guide.
Document Conventions Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.
Safety Warnings Safety Warnings • • • • • • • • • • • • • • • • • • • • • • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 15 Introduction to the Series ...........................................................................................................17 Introduction to the Web Configurator .........................................................................................20 Setup Wizard.........................................................
Contents Overview 8 WiMAX Device Configuration User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions ........................................................................................................... 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents Chapter 4 Tutorials ................................................................................................................................... 35 4.1 Overview ..............................................................................................................................35 4.2 WiMAX Connection Settings ................................................................................................35 4.3 Setting Up a Small Network for the LAN ........................
Table of Contents 6.7 RAPL Settings ......................................................................................................................81 6.8 Home NSP Settings .............................................................................................................82 6.9 Connect ................................................................................................................................83 6.10 Wide Scan ..............................................................
Table of Contents 8.1 Overview ............................................................................................................................125 8.1.1 What You Need to Know ...........................................................................................125 8.2 IP Filter ...............................................................................................................................125 8.3 MAC Filter .....................................................................
Table of Contents 10.5 Feature .............................................................................................................................165 10.6 Dialing ..............................................................................................................................166 10.7 FAX ..................................................................................................................................167 10.8 Technical Reference ........................................
Table of Contents Chapter 13 Troubleshooting.................................................................................................................... 197 13.1 Power, Hardware Connections, and LEDs .......................................................................197 13.2 WiMAX Device Access and Login ....................................................................................198 13.3 Internet Access ....................................................................................
P ART I User’s Guide 15
C HAPT ER 1 Introduction to the Series 1.1 About Your WiMAX Device The WiMAX Device allows you to access the Internet by connecting to a WiMAX wireless network. For some models, you can use a traditional analog telephone to make Internet calls using the WiMAX Device’s Voice over IP (VoIP) communication capabilities. Additionally, The web browser-based Graphical User Interface (GUI), also known as the web configurator, provides easy management of the device and its features.
Chapter 1 Introduction to the Series 1.1.1 WiMAX Internet Access Connect your computer or network to the WiMAX Device for WiMAX Internet access. See the Quick Start Guide for instructions on hardware connection. In a wireless metropolitan area network (MAN), the WiMAX Device connects to a WiMAX base station (BS) for Internet access. The following diagram shows a notebook computer equipped with the WiMAX Device connecting to the Internet through a WiMAX base station (marked BS).
Chapter 1 Introduction to the Series 1.1.3 Models with WiFi For WiFi models, IEEE 802.11b/g/n compliant clients can wirelessly connect to the WiMAX Device to access network resources. You can set up a wireless network with WPS (WiFi Protected Setup) or manually add a client to your wireless network. Figure 3 WiFi Connection Application WLAN WAN LAN 1.
C HAPT ER 2 Introduction to the Web Configurator 2.1 Overview The Web Configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher. In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 2 Introduction to the Web Configurator Note: For security reasons, the WiMAX Device automatically logs you out if you do not use the Web Configurator for five minutes. If this happens, log in again. 2.1.2 Saving and Canceling Changes All screens to which you can make configuration changes must be saved before those changes can go into effect. If you make a mistake while configuring the WiMAX Device, you can cancel those changes and start over.
Chapter 2 Introduction to the Web Configurator Table 3 Saving and Canceling Changes (continued) LABEL DESCRIPTION Previous Page Click this to go to the previous page in the table. Page Indicator / Jump to Page This indicates which page is currently displayed in the table. Use the menu to jump to another page. You can only jump to other pages if those pages exist. Next Page Click this to go to the previous page in the table. Last Page Click this to go to the last page in the table.
Chapter 2 Introduction to the Web Configurator Note: The available menus and screens vary depending on the type of account (admin or guest) you use for login. Figure 7 Main Screen The following table describes the menus in this screen. Table 4 Main > Menu MENU DESCRIPTION Language Use this menu to select the Web Configurator’s language. Setup Wizard Click this to open the Setup Wizard, where you can configure the most essential settings for your WiMAX Device to work.
Chapter 2 Introduction to the Web Configurator 24 WiMAX Device Configuration User’s Guide
C HAPT ER 3 Setup Wizard 3.1 Overview This chapter provides information on the Setup Wizard. The wizard guides you through several steps for configuring your network settings. 3.1.1 Welcome to the Setup Wizard This screen provides a quick summary of the configuration tasks the wizard helps you to perform. They are: 1 Set up your Local Area Network (LAN) options, which determine how the devices in your home or office connect to the WiMAX Device.
Chapter 3 Setup Wizard 3.1.2 LAN Settings The LAN Settings screen allows you to configure your local network options. Figure 9 Setup Wizard > LAN Settings The following table describes the labels in this screen. Table 5 Setup Wizard > LAN Settings LABEL DESCRIPTION LAN TCP/IP IP Address Enter the IP address of the WiMAX Device on the LAN. Note: This field is the IP address you use to access the WiMAX Device on the LAN.
Chapter 3 Setup Wizard Table 5 Setup Wizard > LAN Settings (continued) LABEL DESCRIPTION Second DNS Server Specify the second IP address of three DNS servers that the network can use. The WiMAX Device provides these IP addresses to DHCP clients. Third DNS Server Specify the third IP address of three DNS servers that the network can use. The WiMAX Device provides these IP addresses to DHCP clients. Back Click to display the previous screen. Next Click to proceed to the next screen. 3.1.
Chapter 3 Setup Wizard The following table describes the labels in this screen. Table 6 Setup Wizard > WiMAX Frequency Settings LABEL DESCRIPTION Setting Type Select the WiMAX frequency setting type from the list. • • Step By Range - Select this to set up the frequency based on a range of MHz. By List - Select this to set up the frequency on an individual MHz basis. You can add multiple MHz values to the list. Enter the increments in MHz by which to increase the frequency range.
Chapter 3 Setup Wizard Figure 11 Setup Wizard > WiMAX Authentication Settings The following table describes the labels in this screen. Table 7 Setup Wizard > WiMAX Authentication Settings LABEL DESCRIPTION Authentication Authentication Mode Select a WiMAX authentication mode for authentication network sessions with the ISP. Options are: • • • • No authentication User authentication Device authentication User and Device authentication EAP Supplication EAP Mode Select an EAP authentication mode.
Chapter 3 Setup Wizard Table 7 Setup Wizard > WiMAX Authentication Settings (continued) LABEL DESCRIPTION Server Root CA Cert. File Browse for and choose a server root certificate file, if required. Server Root CA Cert. Info This field displays information about the assigned server root certificate. Device Cert. File Browse for and choose a device certificate file, if required. Device Cert. Info. This field displays information about the assigned device certificate.
Chapter 3 Setup Wizard Note: This settings should be provided by your VoIP service provider. Figure 12 Setup Wizard > VoIP Settings The following table describes the labels in this screen. Table 8 Setup Wizard > VoIP Settings LABEL DESCRIPTION Line 1/2 SIP Account - Configure this section to use the PHONE 1 and/or PHONE 2 port. Enable Select this to activate the SIP account. SIP Server Enter the IP address or domain name of the SIP server. Port Number Enter the SIP server’s listening port number.
Chapter 3 Setup Wizard 3.1.6 WLAN Settings For models with WiFi wireless feature, you can configure your WLAN settings in the Setup Wizard. The WLAN Settings screen lets you set up how other devices connect to the Internet wirelessly using the WiMAX Device. Figure 13 Setup Wizard > WLAN Settings Figure 14 Setup Wizard > WLAN Settings > Encryption Type: WPA Personal The following table describes the labels in this screen.
Chapter 3 Setup Wizard Table 9 Setup Wizard > WLAN Settings (continued) LABEL DESCRIPTION WLAN Mode Select the mode that the WiMAX Device will be using to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. WLAN Channel Select one channel from 1 to 13 for wireless communications with the wireless stations. SSID Settings WLAN SSID This field displays the name of the wireless network associated with the WiMAX Device.
Chapter 3 Setup Wizard 3.1.7 Setup Complete Click Save to save the Setup Wizard settings and close it. Figure 15 Setup Wizard > Setup Complete Launch your web browser and navigate to your favorite website. If everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Device features available in the more advanced web configurator.
C HAPT ER 4 Tutorials 4.1 Overview Run the Setup Wizard for the basic setup of your WiMAX Device. This chapter shows you how to configure some of the advanced settings WiMAX Device’s features. Note: Be sure to read Introduction to the Web Configurator on page 20 before working through the tutorials presented here. For field descriptions for individual screens, see the related technical reference in this User's Guide.
Chapter 4 Tutorials 4.3 Setting Up a Small Network for the LAN This tutorial shows you how to set up a small network in your office or home. Goal: Connect three computers to your WiMAX Device to form a small network. Required: The following table provides a summary of the information you will need to complete the tasks in this tutorial. 36 INFORMATION VALUE SEE ALSO LAN IP Address 192.168.100.1 Chapter 7 on page 98 Starting IP Address 192.168.100.10 Chapter 7 on page 99 Ending IP Address 192.
Chapter 4 Tutorials 4 Log into the Web Configurator and open the Network Setting > LAN > DHCP screen. 5 Select Server for the DHCP mode, then enter 192.168.100.10 and 192.168.100.30 as your DHCP starting and ending IP addresses. 6 Leave the other settings as their defaults and click Save. 7 Next, go to the Network Setting > WAN screen and select NAT in the Operation Mode field. Click Save.
Chapter 4 Tutorials Once your network is configured and hooked up, you will want to connect it to the Internet next. To do this, just run the Internet Connection Wizard (Chapter 3 on page 25), which walks you through the process. 4.4 Making a Telephone Call Over the Internet For models with phone port(s), you can make a call over the Internet using the WiMAX Device. 4.4.
Chapter 4 Tutorials 3 Click Save to save your settings. 4 Click VoIP > Account > SIP. 5 Select the Enable checkbox and enter the parameters provided in the SIP Account section. 6 Click Save to save your settings. 7 Click VoIP > Account > Status. Click Connect to to register the WiMAX Device to the register server. If the Register Status is Registered, it is ready to use.
Chapter 4 Tutorials 4.5 Blocking Web Access from the WiMAX Device If your WiMAX Device is in a home or office environment you may decide that you want to block an Internet website access. You may need to block both the website’s IP address and domain name. Goal: Configure the WiMAX Device’s content filter to block a website with a domain name www.example.com. See Also: Section 7.23 on page 123. 1 Open the Network Setting > Content Filter. 2 Select Enable URL Filter. 3 Select Blacklist.
Chapter 4 Tutorials 1 First of all, you have to know the MAC address of the computer. If not, you can look for the MAC address in the Network Setting > LAN > DHCP screen. (192.168.100.3 mapping to 00:02:E3:53:16:95 in this example). 2 Click Security > Firewall > MAC Filter. Select Blacklist and click the Add button in the MAC Filter Rules table.
Chapter 4 Tutorials 3 An empty entry appears. Enter the computer’s MAC address in the Source MAC field and leave the other fields set to their defaults. Click Save. The computer will no longer be able to access any host on the WiMAX network through the WiMAX Device. 4.7 Allowing Internet Users to use Internal Servers Thomas recently received an Xbox 360 as his birthday gift. His friends invited him to play online games with them on Xbox LIVE.
Chapter 4 Tutorials 2 NAT mode is required to use port forwarding. Click Network Setting > WAN and make sure NAT is selected in the Operation Mode field. Click Save. 3 Click Network Setting > NAT > Port Forwarding and then click the first entry to edit the rule. 4 Configure the screen as follows to open TCP/UDP port 53 for the Xbox 360. Click OK.
Chapter 4 Tutorials 5 Repeat steps 2 and 3 to open the rest of the ports for the Xbox 360. The port forwarding settings you configured are listed in the Port Forwarding screen. 6 Click Save. Thomas can then connect his Xbox 360 to the Internet and play online games with his friends. In this tutorial, all port 80 traffic is forwarded to the Xbox 360, but port 80 is also the default listening port for remote management via WWW.
Chapter 4 Tutorials changes dynamically. Dynamic DNS (DDNS) allows you to access the WiMAX Device using a domain name. http://mywimax.dyndns.org A w.x.y.z a.b.c.d To use this feature, you have to apply for DDNS service at www.dyndns.org. This tutorial covers: • Registering a DDNS Account on www.dyndns.org • Configuring DDNS on Your WiMAX Device • Testing the DDNS Setting Note: If you have a private WAN IP address (see Private IP Addresses on page 250), then you cannot use DDNS. 4.8.
Chapter 4 Tutorials 4.8.2 Configuring DDNS on Your WiMAX Device Configure the following settings in the Network Setting > DDNS screen. 1 Select Enable Dynamic DNS. 2 Select dyndns.org for the service provider. 3 Select Dynamic for the service type. 4 Type mywimax.dyndns.org in the Domain Name field. 5 Enter the user name (UserName1) and password (12345). 6 Select WAN IP for the IP update policy. 7 Click Save. 4.8.
Chapter 4 Tutorials In the following figure, router R is connected to the WiMAX Device’s LAN. R connects to two networks, N1 (192.168.1.x/24) and N2 (192.168.10.x/24). If you want to send traffic from computer A (in N1 network) to computer B (in N2 network), the traffic is sent to the WiMAX Device’s WAN default gateway by default. In this case, computer B will never receive the traffic.
Chapter 4 Tutorials Table 10 IP Settings in this Tutorial DEVICE / COMPUTER IP ADDRESS R’s IP address on N2 192.168.10.2 B 192.168.10.33 To configure a static route to route traffic from N1 to N2: 1 Click Network Setting > Route > Static Route. 2 Click Add to create a new route. 3 Configure the Edit Static Route screen using the following settings: 3a Enter 192.168.10.0 and subnet mask 255.255.255.0 for the destination, N2. 3b Enter 192.168.1.
Chapter 4 Tutorials 1 Open the Maintenance > Remote MGMT > HTTP screen. 2 Select Enable in both HTTP Server and HTTPS Server sections and leave the Port Number settings as “80” and “443”. 3 Select Allow Connection from WAN. This allows remote management connections not only from the local network but also the WAN network (Internet). 4 Click Save. 4.
Chapter 4 Tutorials 2 Configure your new Internet access settings based on the information provided by the ISP. Note: You can also use the Internet Connection Wizard to configure the Internet access settings. 3 You may need to configure the Options section according to the information provided by the ISP. 4 Click Save. You should now be able to connect to the Internet through your new service provider! 4.12 Using Virtual Networks This section shows VLAN configuration scenarios. See Section 7.
Chapter 4 Tutorials Click Network Setting > WAN. Change the WiMAX Device to bridge mode and then click Save. If you cannot obtain IP address settings from a WAN DHCP server, select User as the Get IP Method and enter the WAN IP Address, WAN IP Subnet Mask and Gateway IP Address. 4.12.1 Scenario 1 In this scenario, PC A is connected directly to interface LAN1 on the WiMAX Device. PC B is connected to interface WiMAX and interface IAD for managing the WiMAX Device.
Chapter 4 Tutorials 1 Configure the Link Type, PVID and Tag/Untag settings for the interfaces as below by clicking each row. Then press OK. 2 Next, configure the Name, VID and Ports for the Filter Setting. The WiMAX Device will tag packets it receives on each interface so that they are recognized in VLAN 5. Tagged packets will be untagged when they are forwarded out of each interface since the devices attached to these interfaces do not support VLAN tagged packets. 4.12.
Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC A on the LAN would be tagged to VLAN 5.
Chapter 4 Tutorials 2 Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links, so the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives on these interfaces from the VLAN supporting switches. VLAN tagged packets will also be forwarded out of these interfaces. Interface IAD is configured as an Access port, so tagged packets will be untagged when they are forwarded. 4.12.
Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC A on the LAN would be tagged to VLAN 5.
Chapter 4 Tutorials 2 Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links, so the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives on these interfaces from the VLAN supporting switches. VLAN tagged packets will also be forwarded out of these interfaces. Interface IAD is configured as an Access port, so tagged packets will be untagged when they are forwarded. 4.12.
Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC B on the LAN would be tagged to VLAN 5.
Chapter 4 Tutorials 2 Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links. On the WiMAX interface, the WiMAX Device will recognize VLAN 5 tagged packets it receives from the VLAN supporting switch. VLAN tagged packets will also be forwarded out of this interface. On the LAN1 interface, the WiMAX Device will tag packets it receives so that they are recognized in VLAN 5.
Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC C on the LAN would be tagged to VLAN 10.
Chapter 4 Tutorials 2 60 Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links. On the WiMAX interface the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives from the VLAN supporting switch. VLAN tagged packets will also be forwarded out of these interfaces. On the LAN1 interface, the WiMAX Device will tag packets it receives so that they are recognized in VLAN 10.
P ART II Technical Reference 61
C HAPT ER 5 System Status 5.1 Overview Use this screen to view a summary of your WiMAX Device connection status. 5.2 System Status This screen allows you to view the current status of the device, system resources, and interfaces (LAN and WAN). Click System Status to open this screen as shown next.
Chapter 5 System Status The following tables describe the labels in this screen. Table 11 Status LABEL DESCRIPTION System Information System Model Name This field displays the WiMAX Device system model name. It is used for identification. Software Version This field displays the Web Configurator version number. CROM Version This field displays the CROM version number. Firmware Version This field displays the current version of the firmware inside the device.
Chapter 5 System Status Table 11 Status (continued) LABEL DESCRIPTION Status This field indicates the status of the WAN connection to the WiMAX Device. MAC Address This field indicates the MAC address of the port making the WAN connection on the WiMAX Device. IP Address This field indicates the current IP address of the WiMAX Device in the WAN. Subnet Mask This field indicates the current subnet mask on the WAN.
Chapter 5 System Status 66 WiMAX Device Configuration User’s Guide
C HAPT ER 6 WiMAX 6.1 Overview This chapter shows you how to set up and manage the connection between the WiMAX Device and your ISP’s base stations. 6.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. WiMAX WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 wireless networking standard, which provides high-bandwidth, wide-range wireless service across wireless Metropolitan Area Networks (MANs).
Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations. Numerous subscriber stations and mobile stations connect to the network through a single base station (BS), as in the following figure. Figure 23 WiMAX: Multiple Mobile Stations A base station’s coverage area can extend over many hundreds of meters, even under poor conditions.
Chapter 6 WiMAX Frequency Ranges The following figure shows the WiMAX Device searching a range of frequencies to find a connection to a base station. Figure 25 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Device is capable of using to transmit and receive (see the Product Specifications appendix for details). In the figure, B shows the operator frequency range.
Chapter 6 WiMAX • PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses 64 ASCII characters to convert a binary PKCS#7 certificate into a printable form. CINR Carrier to Interference-plus-Noise Ratio (CINR) measures the effectiveness of a wireless signal and plays an important role in allowing the WiMAX Device to decode signal burst.
Chapter 6 WiMAX Click WiMAX > Profile > Connection Settings to open this screen as shown next. Figure 26 Connection Settings Screen This screen contains the following fields: Table 12 Connection Settings LABEL DESCRIPTION Connection Option Settings Auto Reconnect Select the interval in seconds that the WiMAX Device waits after getting disconnected from the base station before attempting to reconnect. Auto Connect Mode Select the auto connect mode.
Chapter 6 WiMAX Table 12 Connection Settings (continued) LABEL Mode Select DESCRIPTION Select how the WiMAX Device connects to the base station. • • • • • Auto Connect Mode - The device connects automatically to the first base station in range. Network Search Mode - The device scans for available base stations then connects to the best one it can. NSP Mode - This allows the WiMAX Device to connect to a base station with a user-specified NSP ID.
Chapter 6 WiMAX Click WiMAX > Profile > Frequency Settings to open this screen as shown next. Figure 27 Frequency Settings Screen (By List) A B Figure 28 Frequency Settings Screen (By Range) A B This screen contains the following fields: Table 13 Frequency Settings LABEL DESCRIPTION Setting Type Select whether to scan base stations by entering specific frequency(-ies) (By List) or a range of frequencies (By Range).
Chapter 6 WiMAX Table 13 Frequency Settings (continued) LABEL Bandwidth (MHz) DESCRIPTION This displays the bandwidth of the frequency band in megahertz (MHz). If you set a center frequency to 2600000 KHz with the bandwidth of 10 MHz, then the frequency band is from 2595000 to 2605000 KHz. Click the number to modify it. Enter the bandwidth of the frequency band in this field when you are adding an entry. Delete Click this button to remove an item from the list.
Chapter 6 WiMAX Click WiMAX > Profile > Authentication Settings to open this screen as shown next.
Chapter 6 WiMAX This screen contains the following fields: Table 14 Authentication Settings LABEL DESCRIPTION Authentication Mode Select the authentication mode from the list. The WiMAX Device supports the following authentication modes: • • • • No authentication User authentication Device authentication User and device authentication Data Encryption AES-CCM Select this to enable AES-CCM encryption. CCM combines counter-mode encryption with CBC-MAC authentication.
Chapter 6 WiMAX Table 14 Authentication Settings (continued) LABEL Inner Mode DESCRIPTION Sets the EAP-TTLS inner mode. The WiMAX Device supports the following: • • • • • MS-CHAP v2 - This is version 2 of Microsoft’s variant of Challenge Handshake Authentication Protocol (CHAP). It allows for mutual authentication between devices. MS-CHAP - This is Microsoft’s variant of Challenge Handshake Authentication Protocol (CHAP). It allows for mutual authentication between devices.
Chapter 6 WiMAX Home NSP). Through the NAP’s base station, which is identified by a NAP-ID, the subscriber’s WiMAX Device can access the Internet through a network service provider (NSP). Access can be through another network service provider (Visited-Network Service Provider or V-NSP) or his own network service provider (Home NSP), depending on his service agreement. In the following scenario, the subscriber’s WiMAX Device cannot reach a base station owned by his Home NSP (base station with NAP-ID = 1).
Chapter 6 WiMAX This screen contains the following fields: Table 15 Channel Plan Settings LABEL DESCRIPTION Channel Plan Settings - You can configure multiple ranges of frequencies to scan for different NAPs. The configured frequency ranges to scan must be within the Valid Band. Specify the Channel Plan to scan for each NAP on the CAPL Settings: Add screen (Section 6.6.1 on page 80). Start Frequency (KHz) This indicates the beginning of a frequency band in kilohertz (KHz). Click this field to modify it.
Chapter 6 WiMAX This screen contains the following fields: Table 16 CAPL Settings LABEL DESCRIPTION NAP ID This displays the NAP ID. Priority This displays the priority for the NAP ID. Channel Plan ID This displays the Channel Plan ID. Delete Click this button to remove an item from the list. Add Click this button to add an item to the list. Save Click this to save the changes made. Cancel Click this avoid any changes made from being saved to your configuration. 6.6.
Chapter 6 WiMAX Table 17 CAPL Settings: Add (continued) LABEL DESCRIPTION End Frequency (KHz) This indicates the end of the frequency band in kilohertz (KHz). Step (KHz) This indicates the frequency step within each band in kilohertz (KHz). Bandwidth (MHz) This indicates the bandwidth in megahertz (MHz). OK Click this button to save any changes made to the list. Save Click this to save the changes made. Cancel Click this avoid any changes made from being saved to your configuration. 6.
Chapter 6 WiMAX 6.8 Home NSP Settings On this screen, you can configure settings for the Home NSP. The Home NSP can authenticate and authorize connections and may support roaming through relationships with other NSPs. Click WiMAX > ND&S > Home NSP Settings to open this screen as shown next. Figure 35 Home NSP Settings This screen contains the following fields: Table 19 Home NSP Settings LABEL DESCRIPTION NDS Option Settings NDS Mode Select Enable to use NDS to establish connections to the Home NSP.
Chapter 6 WiMAX Table 19 Home NSP Settings (continued) LABEL DESCRIPTION Save Click this button to save any changes made to the list. Note: If you change the NDS Mode, the WiMAX Device will reboot when you click save. Cancel Click this avoid any changes made from being saved to your configuration. 6.9 Connect This screen allows you to view the available WiMAX frequency band(s) and base station(s) the WiMAX Device found through scanning and choose a base station to which to connect.
Chapter 6 WiMAX This screen contains the following fields: Table 20 Connect LABEL DESCRIPTION Applied Frequency Information This table shows the scanning result you made in the WiMAX > Profile > Frequency Settings and WiMAX > Wide Scan screens. Note: You cannot see the wide scanning result that you made in WiMAX > Wide Scan screen if the Join Wide Scan Result is set to No in the WiMAX > Profile > Frequency Settings screen.
Chapter 6 WiMAX Table 20 Connect (continued) LABEL DESCRIPTION RSSI (dBm) This field displays the Received Signal Strength Indication (RSSI), which is an overall measurement of radio signal strength. A higher RSSI level indicates a stronger signal. CINR (dB) R3/ R1 This field displays the average Carrier to Interference plus Noise Ratio for the current connection. This value is an indication of overall radio signal quality, where a higher value means a better quality signal.
Chapter 6 WiMAX Click WiMAX > Wide Scan to open this screen as shown next. Figure 37 Wide Scan Screen This screen contains the following fields: Table 21 Wide Scan LABEL DESCRIPTION Wide Scan Settings Auto Wide Scan Use this to enable (Yes) or disable (No) automatically scanning for base stations. Wide Scan Range Start Frequency (KHz) Enter the start frequency in kilohertz (KHz) for a wide scan range. End Frequency (KHz) Enter the end frequency in kilohertz (KHz) for a wide scan range.
Chapter 6 WiMAX 6.11 Link Status This screen provides a general overview of the current WiMAX connection with the service provider. Click WiMAX > Link Status to open this screen as shown next. Figure 38 Link Status Screen This screen contains the following fields: Table 22 Link Status LABEL DESCRIPTION Profile This field displays the profile name. BSID This field displays the MAC address of the base station to which the WiMAX Device is currently connected.
Chapter 6 WiMAX Table 22 Link Status (continued) LABEL DESCRIPTION Handover Fail This field displays how many times the WiMAX Device had been failed to switch its connection from one base station to another base station, since the WiMAX Device last restarted. Handover This field displays the maximum latency for switching connections from one base Maximum Latency station to another base station, since the WiMAX Device last restarted.
Chapter 6 WiMAX This screen contains the following sections: Table 23 Link Statistics LABEL DESCRIPTION Link This section provides a detailed overview of link statistics. HARQ This section provides a detailed overview of Hybrid Automatic Repeat Request link statistics. TX/RX This section provides a detailed overview of transmission and receiving link statistics. MCS This section provides a detailed overview of Modulation and Coding Sequence (MCS) link statistics 6.
Chapter 6 WiMAX This screen contains the following fields: Table 25 Service Flow LABEL 90 DESCRIPTION SFID This displays a 32-bit service flow identifier. SF Status This display the service flow status. SF Direction This displays the service flow direction.
C HAPT ER 7 Network Setting 7.1 Overview This chapter shows you how to configure the WiMAX Device’s network setting. 7.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. IP Address IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts.
Chapter 7 Network Setting If the Primary and Secondary DNS Server fields are not specified, for instance, left as 0.0.0.0, the WiMAX Device tells the DHCP clients that it itself is the DNS server. When a computer sends a DNS query to the WiMAX Device, the WiMAX Device forwards the query to the real DNS server learned through IPCP and relays the response back to the computer. Please note that DNS proxy works only when the ISP uses the IPCP DNS server extensions.
Chapter 7 Network Setting 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 42 Multiple Servers Behind NAT Example Trigger Ports Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side.
Chapter 7 Network Setting UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP compatible device installed on your network will appear as a separate icon. Selecting the icon of a UPnP device will allow you to access the information and properties of that device. NAT Traversal UPnP NAT traversal automates the process of allowing an application to operate through NAT.
Chapter 7 Network Setting Click Network Setting > WAN to open this screen as shown next. Figure 43 WAN Screen This screen contains the following fields: Table 26 WAN LABEL DESCRIPTION Operation Mode Select the WiMAX Device’s operational mode. • • • WAN Protocol Bridge - This puts the WiMAX Device in bridge mode, acting as a transparent middle man between devices on the LAN and the devices on the WAN.
Chapter 7 Network Setting Table 26 WAN (continued) LABEL DESCRIPTION WAN IP Request Timeout Enter the number of seconds the WiMAX Device waits for an IP from the ISP before it times out. WAN IP Address If the WiMAX Device gets its IP from the user, enter the IP address it is to use. WAN IP Subnet Mask If the WiMAX Device gets its IP from the ISP, enter the IP address it is to use. Gateway IP Address If the WiMAX Device gets its gateway IP address from the user, enter the IP address it is to use.
Chapter 7 Network Setting This screen contains the following fields: Table 27 PPPoE LABEL DESCRIPTION User Name Enter the username for PPPoE login into the WAN network. Password Enter the password for PPPoE login into the WAN network. Retype Password Retype the password to confirm it. Auth Protocol Select a PPPoE authentication protocol.
Chapter 7 Network Setting This screen contains the following fields: Table 28 GRE LABEL DESCRIPTION Peer IP Address Enter the IP address of the GRE peer. 7.5 EtherIP Use these settings to configure the peer setting of the EtherIP tunnel between the WiMAX Device and another EtherIP peer. Click Network Setting > WAN > EtherIP to open this screen as shown next.
Chapter 7 Network Setting 7.7 DHCP Use these settings to configure whether the WiMAX Device functions as a DHCP server for your local network, or a DHCP relay between the local network and the service provider. You can also disable the DHCP functions. Click Network Setting > LAN > DHCP to open this screen as shown next.
Chapter 7 Network Setting Table 31 DHCP (continued) LABEL DESCRIPTION Lease Time Enter the duration in minutes that devices on the LAN retain their DHCP-issued IP addresses. At the end of the lease time, they poll the WiMAX Device for a renewed or replacement IP. Relay IP Enter the name of the IP address to be used. DNS Server Assigned by the DHCP Server First~Third DNS Server Select how the WiMAX Device acquires its DNS server address. • • • None - Select this to not use a DNS server.
Chapter 7 Network Setting Click Network Setting > WLAN to open this screen as shown next. Figure 49 WLAN Screen This screen contains the following fields: Table 32 WLAN LABEL DESCRIPTION WiFi Settings Enable WLAN Select this to activate the wireless LAN. WLAN Mode Select 802.11B/G mixed to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the WiMAX Device. Select 802.11B only to allow only IEEE 802.11b compliant WLAN devices to associate with the WiMAX Device.
Chapter 7 Network Setting Table 32 WLAN (continued) LABEL DESCRIPTION SSID WEP Settings Note: You will only see these options if you selected WEP as the Encryption Type. Authentication Method Select the type of authentication used to join the network: OPEN SYSTEM or SHARED KEY. WEP Encryption Length Select the length of the encryption key: 64-bit or 128-bit. Key 1 - 4 Pick one of four available keys. The key can be in either HexaDecimal (HEX) or ASCII format.
Chapter 7 Network Setting This screen contains the following fields: Table 33 WPS LABEL DESCRIPTION Enable WPS Select Enable and click Apply to activate WPS on the WiMAX Device. Select Disable and click Apply to deactivate WPS. Start WPS PBC This field is available after you select Enable in the Enable WPS field and click Apply. Click this to activate the Push Button Configuration. After clicking this you will be able to use the WPS button at the back of the device to add new wireless clients.
Chapter 7 Network Setting Table 34 MAC Address Filter (continued) LABEL DESCRIPTION MAC Address Enter the MAC addresses of the wireless devices that are allowed or denied access to the WiMAX Device in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc. Delete Click to delete a specific MAC address from the list. Add Click to add a MAC address to the list.
Chapter 7 Network Setting Click Add in the Network Setting > Route > Static Route screen to open this screen as shown next. Figure 53 Static Route Screen This screen contains the following fields: Table 36 Static Route LABEL DESCRIPTION Destination IP Enter the destination IP address of the static route. Subnet Mask Enter the subnet mask of the static route. Next Hop Select Interface and then select WAN or LAN for the next hop of the static route.
Chapter 7 Network Setting Click Network Setting > Route > RIP to open this screen as shown next. Figure 54 RIP Screen This screen contains the following fields: Table 37 RIP LABEL DESCRIPTION General Setup Enable Select this to enable RIP on the WiMAX Device. Redistribute Active This indicates whether a route is being redistributed. Type This indicates what type of route is being redistributed. Metric This indicates the metric that is being used for redistribution.
Chapter 7 Network Setting Table 37 RIP (continued) LABEL DESCRIPTION Authentication Use this option to enable or disable RIP authentication. Authentication ID Enter the authentication ID to use for RIP authentication. Authentication Key Enter the authentication key to use for RIP authentication. 7.14 Port Forwarding Use these settings to forward incoming service requests to the ports on your local network.
Chapter 7 Network Setting 7.14.1 Port Forwarding Wizard Use this wizard to set up a port forwarding rule for incoming service requests to the ports on your local network. Click Network Setting > NAT > Port Forwarding > Wizard to open this screen as shown next. Figure 56 Port Forwarding Wizard Screen This screen contains the following fields: Table 39 Port Forwarding Wizard LABEL DESCRIPTION Active Select this to make this port forwarding rule active.
Chapter 7 Network Setting Click Network Setting > NAT > Port Trigger to open this screen as shown next. Figure 57 Port Trigger Screen This screen contains the following fields: Table 40 Port Trigger LABEL DESCRIPTION Active This indicates whether the port trigger rule is active or not. Name The displays the name of the port trigger rule. Trigger Protocol This displays the protocol to which the port trigger rule applies.
Chapter 7 Network Setting 7.15.1 Port Trigger Wizard Use the wizard to create a port trigger rules that will allow the WiMAX Device to automate port forwarding and allow computers on local network to provide services that would normally require a fixed address on the local network.
Chapter 7 Network Setting 7.15.2 Trigger Port Forwarding Example The following is an example of trigger port forwarding. In this example, J is Jane’s computer and S is the Real Audio server. Figure 59 Trigger Port Forwarding Example 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the WiMAX Device to record Jane’s computer IP address. The WiMAX Device associates Jane's computer IP address with the "incoming" port range of 69707170.
Chapter 7 Network Setting Note: The configuration you set in this screen takes priority than the Network Setting > NAT > Port Forwarding screen. Figure 60 DMZ Screen This screen contains the following fields: Table 42 DMZ LABEL DESCRIPTION DMZ Enable Click this check box to enable DMZ. DMZ Host Enter the IP address of your network DMZ host, if you have one. 0.0.0.0 means this feature is disabled. 7.
Chapter 7 Network Setting Table 43 ALG (continued) LABEL DESCRIPTION Enable RTSP ALG Turns on the RTSP ALG to detect RTSP traffic and helps build RTSP sessions through the WiMAX Device’s NAT. Enable SIP ALG Turns on the SIP ALG to detect SIP traffic and helps build SIP sessions through the WiMAX Device’s NAT. SIP Port If you are using a custom UDP port number (not 5060) for SIP traffic, enter it here. Enable SIP ALG Set BSID Check this box to add the base station ID to the outgoing SIP messages.
Chapter 7 Network Setting Click Network Setting > UPnP to open this screen as shown next. Figure 63 UPnP Screen This screen contains the following fields: Table 45 UPnP LABEL DESCRIPTION Enable UPnP Select this to enable UPnP on the WiMAX Device. Enable NAT-PMP Select this to enable NAT Port Mapping Protocol on the WiMAX Device. 7.19.1 Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 114 1 Click Start > Control Panel. 2 Double-click Network Connections.
Chapter 7 Network Setting 4 The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. 5 In the Networking Services window, select the Universal Plug and Play check box. 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 7.19.1.1 Auto-discover Your UPnP-enabled Network Device in Windows XP This section shows you how to use the UPnP feature in Windows XP.
Chapter 7 Network Setting 116 2 Right-click the icon and select Properties. 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 7 Network Setting 4 You may edit or delete the port mappings or click Add to manually add port mappings. 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. 7 Double-click on the icon to display your current Internet connection status.
Chapter 7 Network Setting 7.19.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the WiMAX Device without finding out the IP address of the WiMAX Device first. This becomes helpful if you do not know the IP address of the WiMAX Device. Follow the steps below to access the web configurator: 118 1 Click Start and then Control Panel. 2 Double-click Network Connections. 3 Select My Network Places under Other Places.
Chapter 7 Network Setting 6 Right-click on the icon for your WiMAX Device and select Properties. A properties window displays with basic information about the WiMAX Device. 7.20 VLAN Use this screen to configure port-based VLAN settings on the WiMAX Device. This screen allows you to assign port(s) to specific virtual LAN(s) in order to isolate traffic from different VLAN groups. See Section 4.12 on page 50 for example configurations for VLANs.
Chapter 7 Network Setting Click Network Setting > VLAN to open the screen as shown next. Figure 64 VLAN Screen This screen contains the following fields: Table 46 VLAN LABEL DESCRIPTION VLAN Utility Enable VLAN Select Yes to enable the VLAN function on the WiMAX Device. Note: To use VLAN on the WiMAX Device, you must switch the operation mode to “bridge” on the Network Setting > WAN screen. It will then require system restart to take effect.
Chapter 7 Network Setting Table 46 VLAN (continued) LABEL DESCRIPTION Priority Enter a priority level (1~7) that the WiMAX Device assigns to packets belonging to this VLAN. Enter “0” for no priority assigned. CFI Select Yes if the CFI (Canonical Format Indicator) field in a received packet is set to 1, indicating non-Canonical Format. In this case, the packet should not be forwarded as it is to an untagged port. Tag/Untag You can only select Tag if the port is configured as a Trunk or Hybrid port.
Chapter 7 Network Setting Click Network Setting > DDNS Figure 65 DDNS Screen This screen contains the following fields: Table 47 DDNS LABEL DESCRIPTION Enable Dynamic DNS Select this to enable dynamic DNS on the WiMAX Device. Service Provider Select the dynamic DNS service provider for the WiMAX Device. Service Type Select the dynamic DNS service type. Domain Name Enter the domain name. Login Name Enter the user name. Password Enter the password.
Chapter 7 Network Setting 7.22 IGMP Proxy IGMP proxy allows the WiMAX Device to get subscribing information and maintain a joined member list for each multicast group. It can reduce multicast traffic significantly. Use this screen to enable IGMP Proxy on the WiMAX Device. Click Network Setting > IGMP Proxy to open this screen as shown next.
Chapter 7 Network Setting This screen contains the following fields: Table 49 Content Filter LABEL DESCRIPTION URL List Enable URL Filter Select this employ the content filter to allow (“whitelist”) or block (“blacklist”) specific URL connections made through the WiMAX Device. Blacklist/ Whitelist Select whether the current filtering applies to the blacklist (sites that are blocked) or the whitelist (sites that are allowed).
C HAPT ER 8 Security 8.1 Overview This chapter shows you how to configure the WiMAX Device’s network settings. 8.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. About the WiMAX Device’s Security Features The WiMAX Device security features are designed to protect against Denial of Service attacks when activated as well as block access to and from specific URLs and MAC addresses.
Chapter 8 Security This screen contains the following fields: Table 50 IP Filter LABEL DESCRIPTION Active Indicates whether the current IP filter is active or not. Source IP This displays the source IP address for the IP filter rule. Click Add to create a new, empty rule, then enter the incoming IP address for the WiMAX Device to block. If you want to delete this rule, click the Delete icon. Source Port This displays the source port number for the IP filter rule.
Chapter 8 Security Click Security > Firewall > MAC Filter to open this screen as shown next. Figure 69 MAC Filter Screen This screen contains the following fields: Table 51 MAC Filter LABEL DESCRIPTION Blacklist/Whitelist Select either whitelist or blacklist for viewing and editing. Source MAC This displays the source MAC for the MAC filter rule. Click Add to create a new, empty rule, then enter the incoming MAC address for the WiMAX Device to block.
Chapter 8 Security Click Security > Firewall > DDOS to open this screen as shown next. Figure 70 DDOS Screen This screen contains the following fields: Table 52 DDOS LABEL DESCRIPTION Prevent from TCP SYN Flood Select this to monitor for and block TCP SYN flood attacks. Prevent from UDP Flood Select this to monitor for and block UDP flood attacks. Prevent from ICMP Flood Select this to monitor for and block ICMP flood attacks.
Chapter 8 Security Table 52 DDOS (continued) LABEL DESCRIPTION Prevent from PING of Death Select this to monitor for and block ping of death attacks. Prevent from PING from WAN Select this to ignore ping requests from the WAN. A Ping of Death (POD) attack is one where larger-than-allowed ping packets are fragmented then sent against a client device. This results in the client device suffering from a buffer overflow and subsequent system crash. 8.
Chapter 8 Security Table 53 PPTP Server (continued) LABEL Auth Protocol DESCRIPTION Select the Authentication Protocol allowed for the connection. Options are: • • • • MPPE Encryption PAP - Password Authentication Protocol (PAP) authentication occurs in clear text and does not use encryption. It’s probably not a good idea to rely on this for security. CHAP - Challenge Handshake Authentication Protocol (CHAP) provides authentication through a shared secret key and uses a three way handshake.
Chapter 8 Security Click Security > PPTP VPN > PPTP Client to open this screen as shown next. Figure 72 PPTP Client This screen contains the following fields: Table 54 PPTP Client LABEL DESCRIPTION # This is the index number of the connection. Profile Name This is the name of this client connection. Server IP This is the IP address of the PPTP VPN server. Assign IP This is the local IP address the client assigns to itself or is assigned by the server.
Chapter 8 Security Click Security > PPTP VPN > PPTP Client > Add to open this screen as shown next. Figure 73 PPTP Client: Add This screen contains the following fields: Table 55 PPTP Client: Add LABEL DESCRIPTION Profile Name Enter the name for this client connection. NAT Mode? Select Yes if the client will be located behind a NAT enabled router. This will allow multiple clients using NAT to connect with PPTP at the same time.
Chapter 8 Security Table 55 PPTP Client: Add (continued) LABEL DESCRIPTION Get IP automatically Select Yes to have the PPTP server assign a local IP address to the client. Assign IP Address Enter the IP address for the client. Ensure that the IP address is configured to be allowed on the PPTP server. Idle Timeout Enter the time in minutes to timeout PPTP connections. 8.8 L2TP VPN Server Use this screen to configure settings for Layer 2 Tunneling Protocol (L2TP) server.
Chapter 8 Security Table 56 L2TP Server (continued) LABEL DESCRIPTION Support Protocol Version Select the L2TP Protocol Version: All, 2, or 3. L2TPv2 is a standard method for tunneling Point-to-Point Protocol (PPP) while L2TPv3 provides improved support for other types of networks including frame relay and ATM. Auth Protocol Select the Authentication Protocol allowed for the connection.
Chapter 8 Security Table 56 L2TP Server (continued) LABEL DESCRIPTION Link Time(s) This displays the duration of the L2TP connection. Disconnect Select a client and click this button to disconnect the selected client. 8.9 L2TP VPN Client Use this screen to view settings for Layer 2 Tunneling Protocol (L2TP) clients. Click Security > L2TP VPN > L2TP Client to open this screen as shown next.
Chapter 8 Security Click Security > L2TP VPN > L2TP Client > Add to open this screen as shown next. Figure 76 L2TP Client: Add This screen contains the following fields: Table 58 L2TP Client: Add LABEL DESCRIPTION Profile Name Enter the name for this client connection. L2TP Protocol Version Select the L2TP Protocol Version 2 or 3. L2TPv2 is a standard method for tunneling Point-to-Point Protocol (PPP) while L2TPv3 provides improved support for other types of networks including frame relay and ATM.
Chapter 8 Security Table 58 L2TP Client: Add (continued) LABEL DESCRIPTION Password Enter the password for connecting to the L2TP server. Retype Retype the password for connecting to the L2TP server. Get IP automatically Select Yes to have the L2TP server assign a local IP address to the client. Assign IP Address Enter the IP address for the client. Ensure that the IP address is configured to be allowed on the L2TP server. Idle Timeout Enter the time in minutes to timeout L2TP connections. 8.
Chapter 8 Security Table 59 IPSec VPN (continued) 138 LABEL DESCRIPTION Remote Network This displays the single (static) IP address on the LAN behind the remote IPSec router or the IP address and subnet mask of a network behind the remote IPSec router. Add Click this button to add an item to the list.
Chapter 8 Security 8.11.1 IPSec VPN: Add Use these settings. Click Security > IPSec VPN > Add to open this screen as shown next.
Chapter 8 Security This screen contains the following fields: Table 60 IPSec VPN: Add LABEL DESCRIPTION Property Enable Select Enable to activate this VPN policy. Connection Name Enter the name of the VPN connection. Connection Type Select the scenario that best describes your intended VPN connection. • • • Initiator - Choose this to connect to an IPSec server. The WiMAX Device is the client (dial-in user) and can initiate the VPN connection.
Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL Remote ID Type DESCRIPTION Select IP to identify the remote IPSec router by its IP address. Select Domain Name to identify the remote IPSec router by a domain name. Select E-mail to identify the remote IPSec router by an e-mail address. Content The configuration of the remote content depends on the remote ID type. For IP, type the IP address of the computer with which you will make the VPN connection. If you configure this field to 0.0.0.
Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION SA Life Time Type the maximum number of seconds the IKE SA can last. When this time has passed, the WiMAX Device and remote IPSec router have to update the encryption and authentication keys and re-negotiate the IKE SA. This does not affect any existing IPSec SAs, however.
Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION Address Type Select Single address or Subnet address to specify if the VPN connection terminates at an IP address or subnet. Start IP Address If Single address is selected, enter a (static) IP address on the LAN behind the remote IPSec’s router. If Subnet address is selected, specify IP addresses on a network by their subnet mask by entering a (static) IP address on the LAN behind the remote IPSec’s router.
Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL Perfect Forward Secrecy (PFS) DESCRIPTION Select whether or not you want to enable Perfect Forward Secrecy (PFS). PFS changes the root key that is used to generate encryption keys for each IPSec SA. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group. Save Click Apply to save your changes back to the WiMAX Device.
Chapter 8 Security The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for the AH and ESP protocols. Key Management Key management allows you to determine whether to use IKE (ISAKMP) or manual key configuration in order to set up a VPN. 8.12.2 Encapsulation The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. At the time of writing, the WiMAX Device supports Tunnel mode only.
Chapter 8 Security • Inside header: The inside IP header contains the destination IP address of the final system behind the VPN gateway. The security protocol appears after the outer IP header and before the inside IP header. 8.12.3 IKE Phases There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate SAs for IPSec.
Chapter 8 Security 8.12.4 Negotiation Mode The phase 1 Negotiation Mode you select determines how the Security Association (SA) will be established for each connection through IKE negotiations. • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1). It uses 6 messages in three round trips: SA negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random number).
Chapter 8 Security 8.12.6 VPN, NAT, and NAT Traversal NAT is incompatible with the AH protocol in both transport and tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet, but a NAT device between the IPSec endpoints rewrites the source or destination address.
Chapter 8 Security enables the WiMAX Device to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. Regardless of the ID type and content configuration, the WiMAX Device does not allow you to save multiple active rules with overlapping local and remote IP addresses. With main mode (see Section 8.12.4 on page 147), the ID type and content are encrypted to provide identity protection.
Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). It is called “pre-shared” because you have to share it with another party before you can communicate with them over a secure connection. 8.12.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communications channel.
C HAPT ER 9 The VoIP General Screens 9.1 VoIP Overview The features mentioned in this chapter are for models that has phone port(s) and you can make telephone calls over the Internet using the WiMAX Device. The VOICE > General screens allow you to set up global SIP and Quality of Service (QoS) settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol.
Chapter 9 The VoIP General Screens Type Of Service (ToS) Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Device) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. The ToS field is consist of 8 bits. The first 3 bits indicate the priority of the packet.
Chapter 9 The VoIP General Screens 9.2 Media Click VoIP > General > Media to set up and maintain global VoIP settings. Figure 84 Media The following table describes the labels in this screen. Table 66 Media LABEL DESCRIPTION Port Range Media Port Start Media Port End Enter the listening port number(s) for RTP traffic on the WiMAX Device, if your VoIP service provider gave you this information. Otherwise, keep the default values.
Chapter 9 The VoIP General Screens Table 66 Media (continued) LABEL DESCRIPTION Packet Loss Concealment Packets may be dropped due to an overwhelming amount of traffic on the network. Some degree of packet loss will not be noticeable to the end user, but as packet loss increases the quality of sound degrades. Select this to have the WiMAX Device to improve the voice quality when packet loss occurs. T.38 Static Jitter Length T.
Chapter 9 The VoIP General Screens 9.4 SIP Settings Click VoIP > General > SIP to set up session timer on the WiMAX Device. See Section 10.8 on page 167 for more information on SIP. Figure 86 SIP The following table describes the labels in this screen. Table 68 SIP LABEL DESCRIPTION Session Timer Enable Select this to activate the WiMAX Device’s SIP Session Timer. SIP Session Timer is a function used by both of the communication peers to determine if the call session is still active (alive) or not.
Chapter 9 The VoIP General Screens Table 69 Speed Dial (continued) LABEL DESCRIPTION Short Number This field displays the abbreviated number you want to use to substitute for the real (actual) phone number in the following Real Number field. When the rule is activated, you can press the assigned Short Number to dial the Real Number. Real Number This field displays the actual phone number you want the WiMAX Device to call when you use the specified Short Number.
C HAPTER 10 The VoIP Account Screens 10.1 Overview The features mentioned in this chapter are for models with VoIP function. Use the VoIP > Account 1 (or Account 2) screens to configure your VoIP account information on the WiMAX Device. You need to have a VoIP account set up first. Note: If your WiMAX Device has only one phone port, there is only one account. Note: You can identify the number of phone ports available on your WiMAX Device by its model name. See Section 1.1 on page 17 for more information.
Chapter 10 The VoIP Account Screens SIP User Agent A SIP user agent can make and receive VoIP telephone calls. This means that SIP can be used for peer-to-peer communications even though it is a client-server protocol. In the following figure, either A or B can act as a SIP user agent client to initiate a call. A and B can also both act as a SIP user agent to receive the call.
Chapter 10 The VoIP Account Screens 3 The WiMAX Device uses the public IP address and port number in the SIP packets that it sends to the SIP server (C). Figure 91 STUN NAT A 1 2 3 Outbound Proxy Your VoIP service provider may host a SIP outbound proxy server to handle all of the WiMAX Device’s VoIP traffic. This allows the WiMAX Device to work with any type of NAT router and eliminates the need for STUN or a SIP ALG.
Chapter 10 The VoIP Account Screens 10.2 Status Click VoIP > Account 1 (or Account 2) > Status to view VoIP settings and current status. Figure 92 Status The following table describes the labels in this screen. Table 70 Status LABEL DESCRIPTION Server Status SIP Register This field displays the IP address (or domain name) and service port number of the register server, if you have configured one.
Chapter 10 The VoIP Account Screens Table 70 Status (continued) LABEL DESCRIPTION Account Status This indicates whether the SIP account is activated or not. Enable means activated and Disable means deactivated. Phone Status This field displays the phone status, such as Idle, Calling, Ringing, Connecting, InCall, Hold, and Disconnecting.
Chapter 10 The VoIP Account Screens Table 71 Server (continued) LABEL SIP Service Domain DESCRIPTION Enter the IP address or domain name of a SIP server, if your VoIP service provider gave you one. Otherwise, enter the same address that you have entered in the Registrar Server field. You can use up to 63 printable ASCII characters. Register Period Time Enter the registration expiry time in seconds for the SIP account specified in Section 10.4 on page 163. The allowable range is 60~65535 seconds.
Chapter 10 The VoIP Account Screens 10.4 SIP Click VoIP > Account 1 (or Account 2) > SIP to configure SIP settings. Figure 94 SIP The following table describes the labels in this screen. Table 72 SIP LABEL DESCRIPTION SIP Account Enable Select this if you want the WiMAX Device to use this account. Clear it if you do not want the WiMAX Device to use this account. SIP Local Port Enter the WiMAX Device’s listening port number, if your VoIP service provider gave you one.
Chapter 10 The VoIP Account Screens Table 72 SIP (continued) LABEL 1st Codec, 2nd Codec, 3rd Codec DESCRIPTION Select the WiMAX Device’s first, second, and third choices of the type of voice coder/decoder (codec) that you want the phone line to use when communicating with the SIP server. The following codecs (shown in highest quality to lowest quality order) are supported by the WiMAX Device: • G.711 aLaw (typically used in Europe) • G.711 muLaw (typically used in North America and Japan) • G.
Chapter 10 The VoIP Account Screens 10.5 Feature Click VoIP > Account 1 (or Account 2) > Feature to configure advanced VoIP features such as DTMF, Call Forwarding and Call Waiting. Figure 95 Feature The following table describes the labels in this screen. Table 73 Feature LABEL DESCRIPTION Feature Settings Block Anonymous Call Select this to have the WiMAX Device block all incoming calls from phone that do not send caller ID.
Chapter 10 The VoIP Account Screens Table 73 Feature (continued) LABEL MWI (Message Waiting Indication) DESCRIPTION Select this to enable Message Waiting Indicator (MWI) function for this SIP account specified in Section 10.4 on page 163. When there is at least one new voice mail for the SIP account, the voice LED turns yellow and the WiMAX Device sends a beeping tone to the phone while user picks-up the phone to make calls.
Chapter 10 The VoIP Account Screens The following table describes the labels in this screen. Table 74 Dialing LABEL DESCRIPTION Inter-digit Timeout Set the time in seconds (1~5) the WiMAX Device waits for each digit input of a complete callee number after you press the first key on the phone. If the WiMAX Device cannot receive the next digit entered within this time period, the WiMAX Device processes digits you have dialed.
Chapter 10 The VoIP Account Screens uses proxy server P. Messages include Session Expiry (SE) and Minimum Session Expiry (MSE) time values. When the duration of the call reaches half of the SE time period, the session is refreshed. Table 76 SIP Call Progression A P B 1. INVITE SE: 60 ------------------> 2. 422 MSE: 3600 <----------------------3. ACK ------------------> 4. INVITE SE: 3600 MSE: 3600 ------------------> 5. INVITE SE: 3600 MSE: 3600 ------------------------> 6.
Chapter 10 The VoIP Account Screens Table 76 SIP Call Progression (continued) A P B 13. UPDATE SE: 3600 ------------------> 14. UPDATE SE:3600 -----------------------> --------------------> 15. OK SE: 3600 <---------------------- <------------------- 16. OK SE: 3600 <-----------------17. BYE ------------------> 18. OK <------------------- 1 A sends a SIP INVITE request. This message is an invitation for B to participate in a SIP telephone call. A’s INVITE specifies a SE of 60 seconds.
Chapter 10 The VoIP Account Screens 14 The UPDATE request is forwarded by P to B. 15 B receives the UPDATE request and responds with an OK message. 16 The OK message is received by A. 17 After talking, A hangs up and sends a BYE request. 18 B replies with an OK response confirming receipt of the BYE request and the call is terminated. 10.8.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests.
C HAPTER 11 The VoIP Line Screens 11.1 Overview The features mentioned in this chapter are for models with VoIP function. The VoIP > Line 1 (or Line 2) screens allow you to configure the volume, echo cancellation, VAD settings and custom tones for the phone port which maps to the SIP account (see Chapter 10 on page 157). Note: If your WiMAX Device has only one phone port, there is only one line. Note: You can identify the number of phone ports available on your WiMAX Device by its model name.
Chapter 11 The VoIP Line Screens 11.2 Phone Click VoIP > Line 1 (or Line 2) > Phone to configure phone related settings. Figure 98 Phone The following table describes the labels in this screen. Table 77 Phone LABEL DESCRIPTION Phone Hook Flash Detect Upper Bound Enter the number of milliseconds for the upper bound of a quick on-hook and offhook cycle in order to recognize a hook flash event.
Chapter 11 The VoIP Line Screens Table 78 Voice (continued) LABEL DESCRIPTION LEC - Line Echo Cancellation Line Echo Canceller Tail Length Select the maximum number of milliseconds of an echo length (16 ms, 32 ms or 48 ms) the WiMAX Device can handle and eliminate the effect. An echo is normally caused by the sound of your voice reverberating in the telephone receiver while you talk. Select Disable to turn this feature off. 11.
Chapter 11 The VoIP Line Screens 174 WiMAX Device Configuration User’s Guide
C HAPTER 12 Maintenance 12.1 Overview Use these screens to manage and maintain your WiMAX Device. 12.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. Remote Management Limitations Remote management over LAN or WAN will not work when: 1 You have disabled that service in one of the remote management screens. 2 The IP address in the Secured Client IP field does not match the client IP address.
Chapter 12 Maintenance Note: SNMP is only available if TCP/IP is configured. TR-069 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipment (CPE), such as the WiMAX Device. It can be managed over a WAN by means of an Auto Configuration Server (ACS). TR-069 is based on sending Remote Procedure Calls (RPCs) between the ACS and the client device. RPCs are sent in Extensible Markup Language (XML) format over HTTP or HTTPS.
Chapter 12 Maintenance SNMP An SNMP managed network consists of two main types of component: agents and a manager. Figure 102 SNMP Management Model An agent is a management software module that resides in a managed device (the WiMAX Device). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions.
Chapter 12 Maintenance The WiMAX Device sends traps to the SNMP manager when any of the following events occurs: Table 80 SNMP Traps TRAP NAME DESCRIPTION 0 coldStart (defined in RFC-1215) A trap is sent after booting (power on). 1 warmStart (defined in RFC-1215) A trap is sent after booting (software reboot). 4 authenticationFailure (defined in RFC-1215) A trap is sent to the manager when receiving any SNMP get or set requirements with the wrong community (password).
Chapter 12 Maintenance multiple disparate types of data over HTTP. Security encryption for communication is handled by different processes configured elsewhere in the WiMAX Device’s web configurator Basic Access Authentication – Sends a person’s user name and password in Base64. This authentication protocol is supported by all browsers that are HTTP 1.0/1.1 compliant.
Chapter 12 Maintenance Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server. Not all servers use the same format. Time A network protocol for retrieving the current time from a server.
Chapter 12 Maintenance 12.3 HTTP Use this screen to allow remote access to the WiMAX Device from a network connection over HTTP. Click Maintenance > Remote MGMT > HTTP to open this screen as shown next. Figure 106 HTTP Screen This screen contains the following fields: Table 82 HTTP LABEL DESCRIPTION HTTP Server Enable Select this to enable remote management using this service. Port Number Enter the port number this service can use to access the WiMAX Device.
Chapter 12 Maintenance Click Maintenance > Remote MGMT > Telnet to open this screen as shown next. Figure 107 Telnet Screen This screen contains the following fields: Table 83 Telnet LABEL DESCRIPTION Enable Select this to enable remote management using this service. Port Number Enter the port number this service can use to access the WiMAX Device. The computer must use the same port number. Allow Connection from WAN Select this to allow connections using this service that originate on the WAN.
Chapter 12 Maintenance 12.6 SNMP Use this screen to allow remote access to the WiMAX Device from a network connection over SNMP. Click Maintenance > Remote MGMT > SNMP to open this screen as shown next. Figure 109 SNMP Screen This screen contains the following fields: Table 85 SNMP LABEL DESCRIPTION Enable Select this to enable remote management using this service. Location Enter the location of the SNMP server (for example, “Engineering Dept., Floor 6, Building A, New York City”).
Chapter 12 Maintenance Click Maintenance > Remote MGMT > CWMP to open this screen as shown next. Figure 110 CWMP Screen This screen contains the following fields: Table 86 CWMP LABEL DESCRIPTION Enable Select this to enable remote management using this service. ACS Server URL Enter the URL or IP address of the auto-configuration server. Bootstrap Enable Select this to enable bootstrap events.
Chapter 12 Maintenance Table 86 CWMP (continued) LABEL DESCRIPTION Connection Request Password Enter the connection request password that the ACS must send to the WiMAX Device when it requests a connection. You can enter up to 31 alphanumeric characters (a-z, A-Z, 0-9) and underscores but spaces are not allowed. Note: This must be provided by the ACS administrator. CA Certificate File Click Browse to upload a Certificate Authority (CA) certificate to the WiMAX Device.
Chapter 12 Maintenance Table 87 OMA-DM (continued) LABEL DESCRIPTION Server Port Enter the port number for the IP address of the OMA-DM server set up in the preceding field. Server Auth Type Select the encryption algorithm scheme used by the OMA-DM server to communicate with client devices. If the scheme selected here does not match the actual scheme used by the server, then server will challenge the WiMAX Device to automatically update its settings. • • • • None - No authentication.
Chapter 12 Maintenance 12.9 Date/Time Use these settings to set the system time or configure an NTP server for automatic time synchronization. Click Maintenance > Date/Time > Date to open this screen as shown next. Figure 112 Date Screen This screen contains the following fields: Table 88 Date LABEL DESCRIPTION Manual New Time Enter the new time in this field. New Date Enter the new date in this field. Get from Time Server Time Protocol Select the time service protocol that your time server uses.
Chapter 12 Maintenance Click Maintenance > Date/Time > Time Zone to open this screen as shown next. Figure 113 Time Zone Screen This screen contains the following fields: Table 89 Time Zone LABEL DESCRIPTION Time Zone Select the time zone at your location. Enable Daylight Savings Time Select this if your location uses daylight savings time.
Chapter 12 Maintenance This screen contains the following fields: Table 90 Upgrade File LABEL DESCRIPTION Upgrade File Click Browse then browse to the location of a firmware upgrade file and select it. Upgrade Click this to begin uploading the selected file. This may take up to two minutes. Note: Do not turn off the device while firmware upload is in progress! 12.11.1 The Firmware Upload Process When the WiMAX Device uploads new firmware, the process usually takes about two minutes.
Chapter 12 Maintenance Click Maintenance > Firmware Upgrade > CWMP Upgrade to open this screen as shown next. Figure 116 CWMP Upgrade Screen This screen contains the following fields: Table 92 CWMP Upgrade LABEL DESCRIPTION Upgrade Click this to begin upgrading firmware using CWMP Request. This may take up to two minutes. Note: Do not turn off the device while firmware upload is in progress! 12.14 Backup/Restore Use this screen to backup your current WiMAX Device settings to a local computer.
Chapter 12 Maintenance Click Maintenance > Backup/Restore > Restore to open this screen as shown next. Figure 118 Restore Screen This screen contains the following fields: Table 94 Restore LABEL DESCRIPTION Configuration File Click Browse... then browse to the location of a firmware upgrade file and select it. Click File Restore to upload the specified configuration to the WiMAX Device and replace the current settings.
Chapter 12 Maintenance Click Maintenance > Backup/Restore > Factory Defaults to open this screen as shown next. Figure 119 Factory Defaults Screen This screen contains the following fields: Table 95 Factory Defaults LABEL DESCRIPTION Reset Click this to clear all user-entered configuration information and return the WiMAX Device to its factory defaults. There is no warning screen. 12.17 Log Setting Use this screen to configure which type of events on the WiMAX Device are logged.
Chapter 12 Maintenance Click Maintenance > LOG > Log Display to open this screen as shown next. Figure 121 Log Display Screen This screen contains the following fields: Table 97 Log Display LABEL DESCRIPTION Display Level Select the type of logs to display from this menu. Refresh Click this to refresh the logs in the display window. 12.19 Network Test Use this screen to test network connectivity using ping. Click Maintenance > Network Test > Ping to open this screen as shown next.
Chapter 12 Maintenance 12.20 Traceroute Use this screen to test network connectivity using traceroute. Click Maintenance > Network Test > Traceroute to open this screen as shown next. Figure 123 Traceroute Screen This screen contains the following fields: Table 99 Traceroute LABEL DESCRIPTION IP Address Enter the IP address or domain name of a target device to which this test will send. Traceroute Click this to start the test. The result will show at the bottom of the screen. 12.
Chapter 12 Maintenance This screen contains the following fields: Table 100 About LABEL DESCRIPTION System Model Name This field displays the WiMAX Device system name. It is used for identification. Software Version This field displays the Web Configurator software version that the WiMAX Device is currently running. CROM Version This field displays the CROM version number. Firmware Version This field displays the current version of the firmware inside the device.
Chapter 12 Maintenance 196 WiMAX Device Configuration User’s Guide
C HAPTER 13 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Device Access and Login • Internet Access • Reset the WiMAX Device to Its Factory Defaults 13.1 Power, Hardware Connections, and LEDs The WiMAX Device does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adapter or cord included with the WiMAX Device.
Chapter 13 Troubleshooting 13.2 WiMAX Device Access and Login I forgot the IP address for the WiMAX Device. 1 The default IP address is 192.168.1.1http://192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the WiMAX Device by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 13 Troubleshooting 6 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the WiMAX Device using another service, such as Telnet. If you can access the WiMAX Device, check the remote management settings and firewall rules to find out why the WiMAX Device does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port.
Chapter 13 Troubleshooting 4 Check your WiMAX settings. The WiMAX Device may have been set to search the wrong frequencies for a wireless connection. See Chapter 6 on page 72. If you are unsure of the correct values, contact your service provider. 5 Disconnect all the cables from your WiMAX Device, and follow the directions in the Quick Start Guide again. 6 If the problem continues, contact your ISP. I cannot access the Internet any more.
Chapter 13 Troubleshooting 13.4 Wireless Internet Access (for Models with WiFi) What factors may cause intermittent or unstabled wireless connection? How can I solve this problem? The following factors may cause interference: • Obstacles: walls, ceilings, furniture, and so on. • Building Materials: metal doors, aluminum studs. • Electrical devices: microwaves, monitors, electric motors, cordless phones, and other wireless devices.
Chapter 13 Troubleshooting 13.6 Reset the WiMAX Device to Its Factory Defaults If you forget your password or cannot access the Web Configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to 1234. You will lose all of your changes when you push the Reset button. To reset the WiMAX Device, 1 Make sure the Power LED is on and not blinking.
C HAPTER 14 Product Specifications Table 102 LEDs Status for Indoor Device LED STATE DESCRIPTION Power Off The WiMAX Device is not receiving power. Red The WiMAX Device is receiving power but has been unable to start up correctly or is not receiving enough power. See the Troubleshooting section for more information. Green Solid: The WiMAX Device is receiving power and functioning correctly. Off The WiMAX Device is not connected to a wireless (WiMAX) network.
Chapter 14 Product Specifications Table 103 LEDs Status for Outdoor Device LED STATE Strength Indicator The Strength Indicator LEDs display the Received Signal Strength Indication (RSSI) of the wireless (WiMAX) connection. Buzzer Behavior Activity Indicator DESCRIPTION 5 Signal LEDs The signal strength is greater than or equal to -50 dBm. 4 Signal LEDs The signal strength is between -50 and -60 dBm. 3 Signal LEDs The signal strength is between -60 and -70 dBm.
Chapter 14 Product Specifications Table 104 Voice Features Phone config The phone configuration table allows you to customize the phone keypad combinations you use to access certain features on the WiMAX Device, such as call waiting, call return, call forward, etc. The phone configuration table is configurable in command interpreter mode.
Chapter 14 Product Specifications Table 105 Star (*) and Pound (#) Code Support *69 Return last call received *70 Followed by the 10 digit phone number to cancel Call Waiting on a single call basis *72 Activate Call Forwarding (*72 followed by the 10 digit phone number that is requesting call forwarding service) *720 Activate Call Forwarding (*720 followed by the 10 digit phone number that is requesting deactivation of call forwarding service) *73 Plus the forward to phone number to activate Call
A PPENDIX A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a user’s identity and level of authorization.
Appendix A WiMAX Security • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your base station acts as a message relay between the MS/SS and the network RADIUS server.
Appendix A WiMAX Security • Authorization request and reply The MS/SS presents its public certificate to the base station. The base station verifies the certificate and sends an authentication key (AK) to the MS/SS. • Key request and reply The MS/SS requests a transport encryption key (TEK) which the base station generates and encrypts using the authentication key. • Encrypted traffic The MS/SS decrypts the TEK (using the authentication key).
Appendix A WiMAX Security 210 WiMAX Device Configuration User’s Guide
A PPENDIX B Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix B Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 126 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix B Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 129 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix B Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 131 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 132 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix B Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 134 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 135 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
Appendix B Importing Certificates 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 138 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix B Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 140 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix B Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 142 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 143 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix B Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 147 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix B Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 149 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 150 5 222 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix B Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 151 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix B Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 153 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 154 Firefox 2: Delete Web Site Certificates 5 224 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix B Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix B Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences. Figure 157 Opera 9: Tools Menu 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix B Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 159 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix B Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 161 6 Next, click OK. Figure 162 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix B Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 163 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix B Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 165 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix B Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 166 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 167 Konqueror 3.
Appendix B Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 168 Konqueror 3.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 169 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 170 Konqueror 3.
Appendix B Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 172 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 173 Konqueror 3.
Appendix B Importing Certificates 236 WiMAX Device Configuration User’s Guide
A PPENDIX C Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix C Common Services Table 106 Commonly Used Services (continued) 238 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program.
Appendix C Common Services Table 106 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215).
Appendix C Common Services 240 WiMAX Device Configuration User’s Guide
A PPENDIX D Open Software Announcements End-User License Agreement for "MAX208M, MAX218M, MAX208M2W, MAX218M2W, MAX218M1W, MAX218MW, MAX318M2W, MAX308M, and MAX318M" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix D Open Software Announcements The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.
Appendix D Open Software Announcements THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.
Appendix D Open Software Announcements Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.
Appendix D Open Software Announcements authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix D Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
Appendix D Open Software Announcements operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4.
Appendix D Open Software Announcements "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10.
Appendix D Open Software Announcements The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
Appendix D Open Software Announcements ACME Labs Freeware License All the free software available on the ACME Labs web site has a copyright notice like this one: Copyright © 2000 by Jef Poskanzer . All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix D Open Software Announcements Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix D Open Software Announcements and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.
Appendix D Open Software Announcements associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it).
Appendix D Open Software Announcements interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5.
Appendix D Open Software Announcements with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7.
Appendix D Open Software Announcements 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.
Appendix D Open Software Announcements /* ============================================================= ======= * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2.
Appendix D Open Software Announcements * permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit (http://www.openssl.
Appendix D Open Software Announcements Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.
Appendix D Open Software Announcements * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3.
Appendix D Open Software Announcements Ftp Server * Copyright (c) 1985, 1988, 1990, 1992, 1993, 1994, 2002 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2.
Appendix D Open Software Announcements */ This Product includes net-snmp software under the following license Various copyrights apply to this package, listed in various separate parts below. Please make sure that you read all the parts.
Appendix D Open Software Announcements WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Appendix D Open Software Announcements THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix D Open Software Announcements * The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix D Open Software Announcements Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix D Open Software Announcements ---- Part 5: Sparta, Inc copyright notice (BSD) ----- Copyright (c) 2003-2009, Sparta, Inc All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix D Open Software Announcements OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 6: Cisco/BUPTNIC copyright notice (BSD) ----- Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved.
Appendix D Open Software Announcements CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Appendix D Open Software Announcements THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix D Open Software Announcements from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix D Open Software Announcements notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Appendix D Open Software Announcements The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. Portions of the documentation and some code used as part of the build process might fall under other licenses. The details here are unclear. We do not worry about the licensing of the documentation and build code so much because none of these things are part of the core deliverable SQLite library.
Appendix D Open Software Announcements A template copyright release is available in PDF or HTML. You can use this release to make future changes Copyright Release for Contributions To SQLite SQLite is software that implements an embeddable SQL database engine. SQLite is available for free download from http://www.sqlite.org/. The principal author and maintainer of SQLite has disclaimed all copyright interest in his contributions to SQLite and thus released his contributions into the public domain.
Appendix D Open Software Announcements Signature: Date: Name (printed): This Product includes Stunnel software under the stunnel license. stunnel license (see COPYRIGHT.GPL for detailed GPL conditions) Copyright (C) 1998-2011 Michal Trojnara This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
Appendix D Open Software Announcements /* zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.3, July 18th, 2005 Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.
A PPENDIX E Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
Appendix E Legal Information This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page.
Appendix E Legal Information Regulatory Information European Union The following information applies if you use the product within the European Union. Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance Information for 2.
Appendix E Legal Information [Italian] Con la presente ZyXEL dichiara che questo attrezzatura è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. [Latvian] Ar šo ZyXEL deklarē, ka iekārtas atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. [Lithuanian] Šiuo ZyXEL deklaruoja, kad šis įranga atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
Appendix E Legal Information [Icelandic] Hér með lýsir, ZyXEL því yfir að þessi búnaður er í samræmi við grunnkröfur og önnur viðeigandi ákvæði tilskipunar 1999/5/EC. [Norwegian] Erklærer herved ZyXEL at dette utstyret er I samsvar med de grunnleggende kravene og andre relevante bestemmelser I direktiv 1999/5/ EF. [Romanian] Prin prezenta, ZyXEL declară că acest echipament este în conformitate cu cerinţele esenţiale şi alte prevederi relevante ale Directivei 1999/5/EC.
Appendix E Legal Information Overview of Regulatory Requirements for Wireless LANs Max Power Level Frequency Band (MHz) (EIRP)1 (mW) 2400-2483.5 100 5150-5350 200 5470-5725 1000 Indoor ONLY Indoor and Outdoor V V V Belgium The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for more details.
Appendix E Legal Information Location Indoor (No restrictions) Outdoor Frequency Range(GHz) 2.4 – 2.4835 2.4 – 2.454 2.454 – 2.4835 Power (EIRP) 100mW (20dBm) 100mW (20dBm) 10mW (10dBm) Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy. Unless this wireless LAN product is operating within the boundaries of the owner's property, its use requires a “general authorization.” Please check http://www.sviluppoeconomico.gov.
Index Index A C AAA 68 CA 69, 70 AbS 151 CBC-MAC 209 accounting server see AAA CCMP 207, 209 ACK message 169 certificates 207 CA 69 formats 69 verification 209 activity 68 Advanced Encryption Standard see AES AES 209 AH 144 ALG 93 algorithms 144 analysis-by-synthesis 151 Application Layer Gateway see ALG authentication 68, 207 inner 209 key server 68 types 209 cell 67 certification notices 278 viewing 279 Certification Authority, see CA chaining 209 chaining message authentication see CCMP circ
Index DH 150 DHCP 91 server 91 G G.168 171 diameter 68 G.711 151 Differentiated Services see DiffServ G.729 151 Diffie-Hellman key groups 150 DiffServ 152 DiffServ Code Point (DSCP) 152 marking rule 156 digital ID 70, 207 H hybrid waveform codec 151 DS field 156 DSCP see DiffServ I DTMF 159 dual-tone multi-frequency see DTMF ID type and content 148 Dynamic Host Configuration Protocol see DHCP idle timeout 175 identity 68, 207 IEEE 802.16 67, 207 IEEE 802.16e 67 IGD 1.
Index L O L2TP VPN 133 outbound proxy 159 SIP 159 Layer 2 Tunneling Protocol VPN see L2TP VPN outbound proxy server 159 outside header 145 M P MAC 209 MAN 67 pattern-spotting 209 Management Information Base (MIB) 177 PBX services 151 Message Authentication Code see MAC PCM 151 message integrity 209 PHB (per-hop behavior) 156 Metropolitan Area Network see MAN phone services 159 microwave 67, 68 PKMv2 68, 207, 209 mobile station see MS plain text encryption 209 per-hop behavior 156 MS 68
Index Message Types 208 Messages 208 Shared Secret Key 208 servers 170 service domain 157 URI 157 user agent 158 Real-time Transport Protocol see RTP SIP outbound proxy 159 register server SIP 157 SNMP 175 manager 177 registration product 279 sound quality 151 related documentation 3 STUN 158, 159 remote management and NAT 175 remote management limitations 175 subscriber station see SS required bandwidth 151 supplementary phone services 159 RFC 1889 152 system timeout 175 SS 67, 68 RFC 348
Index see UPnP UPnP 93 application 94 auto-discovery 115 security issues 94 Windows XP 114 wizard setup 25 WPS 102 adding stations 103 push button 103 use NAT 158 user authentication 207 V VAD 171 verification 209 virtual LAN see VLAN VLAN 119 examples 50 voice activity detection 171 coding 151 mail 151 Voice over IP see VoIP VoIP 151 W waveform codec 151 WiFi Protected Setup, see WPS WiMAX 67–68 security 208 WiMAX Forum 67 Wireless Interoperability for Microwave Access see WiMAX wireless LAN WPS 102 a
Index 290 WiMAX Device Configuration User’s Guide