ZyXEL Communications MAX-306 User Manual
ZyXEL Communications MAX-306 User Manual

ZyXEL Communications MAX-306 User Manual

Max-306hw2 series
Table of Contents

Advertisement

MAX-306HW2 Series
Models: MAX-306 ODU (2.5 GHz), MAX-316 ODU (3.5 GHz), MAX-306HW2 IDU
WiMAX MIMO Indoor/Outdoor
CPE (2.5GHz & 3.5GHz)
Default Login Details
IP Address:
http://192.168.100.1
User Name:
Password:
Firmware Version 3.6
www.zyxel.com
Edition 2, 05/2009
www.zyxel.com
admin
1234
Copyright © 2009
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications MAX-306

  • Page 1 MAX-306HW2 Series Models: MAX-306 ODU (2.5 GHz), MAX-316 ODU (3.5 GHz), MAX-306HW2 IDU WiMAX MIMO Indoor/Outdoor CPE (2.5GHz & 3.5GHz) Default Login Details IP Address: http://192.168.100.1 User Name: admin Password: 1234 Firmware Version 3.6 www.zyxel.com Edition 2, 05/2009 www.zyxel.com Copyright © 2009...
  • Page 3: About This User's Guide

    Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
  • Page 4: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your WiMAX Device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 5: Table 1 Common Icons

    Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Device icon is not an exact representation of your WiMAX Device.\ Table 1 Common Icons Wireless Signal Internet Cloud Computer Notebook Server WiMAX Base Station Telephone...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7 Safety Warnings • The Power over Ethernet (PoE) device that supplies power must be indoors. • Do not use the Indoor Unit’s PoE feature to supply power to any other device other than the Outdoor Unit models specified in this User’s Guide. •...
  • Page 8 Safety Warnings User’s Guide...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview Introduction and Wizards ...................... 29 Getting Started ........................... 31 Introducing the Web Configurator ....................37 Internet Connection Wizard ....................... 47 VoIP Connection Wizard ......................59 Basic Screens ........................65 The Setup Screens ........................67 Advanced Screens ......................... 73 The LAN Configuration Screens ....................
  • Page 10 Contents Overview User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Contents Overview ........................9 Table of Contents........................11 List of Figures ......................... 19 List of Tables........................... 25 Part I: Introduction and Wizards............29 Chapter 1 Getting Started ........................
  • Page 12 Table of Contents 3.1.4 Authentication Settings ....................54 3.1.5 IP Address ........................56 3.1.6 Setup Complete ......................58 Chapter 4 VoIP Connection Wizard......................59 4.1 Overview ..........................59 4.2 Welcome to the ZyXEL Setup Wizard ................. 59 4.2.1 First Voice Account Settings ..................60 4.2.2 Setup Complete ......................
  • Page 13 Table of Contents 6.7.2 DHCP Setup ....................... 85 6.7.3 LAN TCP/IP ........................ 85 6.7.4 DNS Server Address ....................86 6.7.5 RIP Setup ........................86 6.7.6 Multicast ........................87 Chapter 7 The WAN Configuration Screens................... 89 7.1 Overview ..........................89 7.1.1 What You Can Do in This Chapter ................89 7.1.2 What You Need to Know ....................
  • Page 14 Table of Contents Chapter 10 The NAT Configuration Screens..................125 10.1 Overview .......................... 125 10.1.1 What You Can Do in This Chapter ................. 125 10.2 General ..........................125 10.3 Port Forwarding ......................126 10.3.1 Port Forwarding Options ..................127 10.3.2 Port Forwarding Rule Setup ................... 129 10.4 Trigger Port ........................
  • Page 15 Table of Contents 12.4.4 SIP Proxy Server ....................160 12.4.5 SIP Redirect Server ....................161 12.4.6 NAT and SIP ......................162 12.4.7 DiffServ ........................162 12.4.8 DSCP and Per-Hop Behavior ................. 163 Chapter 13 The Phone Screens....................... 165 13.1 Overview .......................... 165 13.1.1 What You Can Do in This Chapter .................
  • Page 16 Table of Contents 15.3.2 Trusted CA Import ....................197 15.4 Technical Reference ......................198 15.4.1 Certificate Authorities ..................... 198 15.4.2 Verifying a Certificate ..................... 200 Chapter 16 The Firewall Screens ......................203 16.1 Overview .......................... 203 16.1.1 What You Can Do in This Chapter ................. 203 16.1.2 What You Need to Know ..................
  • Page 17 Table of Contents 19.1 Overview .......................... 227 19.1.1 What You Can Do in This Chapter ................. 227 19.1.2 What You Need to Know ..................227 19.2 View Logs ........................229 19.3 Log Settings ........................231 19.4 Log Message Descriptions ....................233 Chapter 20 The UPnP Screen ........................
  • Page 18 Table of Contents Part VII: Appendices and Index ............277 Appendix A WiMAX Security ....................279 Appendix B Setting Up Your Computer’s IP Address ............283 Appendix C Wireless LANs ....................311 Appendix D Pop-up Windows, JavaScripts and Java Permissions ........327 Appendix E IP Addresses and Subnetting ................
  • Page 19: List Of Figures

    List of Figures List of Figures Figure 1 The IDU/ODU Setup ......................... 31 Figure 2 WiFi Access Point ........................32 Figure 3 WiMAX Device and Base Station ..................... 32 Figure 4 WiMAX Device’s VoIP Features - Peer-to-Peer Calls .............. 33 Figure 5 WiMAX Device’s VoIP Features - Calls via VoIP Service Provider ..........
  • Page 20 List of Figures Figure 39 ADVANCED > WAN Configuration > Traffic Redirect ............. 99 Figure 40 ADVANCED > WAN Configuration > Advanced .............. 101 Figure 41 ADVANCED > Wi-Fi Configuration > General ..............104 Figure 42 ADVANCED > Wi-Fi Configuration > WPA/WPA2 Optionsl ..........106 Figure 43 ADVANCED >...
  • Page 21 List of Figures Figure 82 VOICE > Phone Book > Speed Dial ..................178 Figure 83 TOOLS > Certificates > My Certificates ................184 Figure 84 TOOLS > Certificates > My Certificates > Create ..............186 Figure 85 TOOLS > Certificates > My Certificates > Edit ..............189 Figure 86 TOOLS >...
  • Page 22 List of Figures Figure 125 DHCP Table ........................260 Figure 126 VoIP Statistics ........................261 Figure 127 WiMAX Profile ........................263 Figure 128 Windows XP: Start Menu ....................284 Figure 129 Windows XP: Control Panel ....................284 Figure 130 Windows XP: Control Panel > Network Connections > Properties ........285 Figure 131 Windows XP: Local Area Connection Properties ...............
  • Page 23 List of Figures Figure 168 Infrastructure WLAN ......................313 Figure 169 RTS/CTS ........................... 314 Figure 170 WPA(2) with RADIUS Application Example ............... 323 Figure 171 WPA(2)-PSK Authentication ....................324 Figure 172 Pop-up Blocker ........................327 Figure 173 Internet Options: Privacy ....................328 Figure 174 Internet Options: Privacy ....................
  • Page 24 List of Figures Figure 211 Firefox 2: Certificate Manager ................... 363 Figure 212 Firefox 2: Select File ......................363 Figure 213 Firefox 2: Tools Menu ......................364 Figure 214 Firefox 2: Options ....................... 364 Figure 215 Firefox 2: Certificate Manager ................... 365 Figure 216 Firefox 2: Delete Web Site Certificates ................
  • Page 25: List Of Tables

    List of Tables List of Tables Table 1 Common Icons ..........................5 Table 2 The WiMAX Device ........................34 Table 3 Main > Icons ..........................40 Table 4 Main ............................42 Table 5 Main > Icons ..........................43 Table 6 Main ............................44 Table 7 Internet Connection Wizard >...
  • Page 26 List of Tables Table 38 Advanced> VPN Transport > Customer Interface ..............119 Table 39 ADVANCED > VPN Transport > Customer Interface .............119 Table 40 ADVANCED > VPN Transport > Customer Interface Setup ..........120 Table 41 Advanced> VPN Transport > Customer Interface ..............122 Table 42 ADVANCED >...
  • Page 27 List of Tables Table 81 TOOLS > Content Filter > Filter .................... 215 Table 82 TOOLS > Content Filter > Schedule ..................216 Table 83 Remote Management ......................217 Table 84 TOOLS > Remote Management > WWW ................219 Table 85 TOOLS > Remote Management > Telnet ................220 Table 86 TOOLS >...
  • Page 28 List of Tables Table 124 Wireless Security Levels ..................... 316 Table 125 Comparison of EAP Authentication Types ................320 Table 126 Wireless Security Relational Matrix ..................324 Table 127 IP Address Network Number and Host ID Example ............338 Table 128 Subnet Masks ........................339 Table 129 Maximum Host Numbers ....................
  • Page 29: Introduction And Wizards

    Introduction and Wizards Getting Started (31) Introducing the Web Configurator (37) Internet Connection Wizard (47) VoIP Connection Wizard (59)
  • Page 31: Getting Started

    H A P T E R Getting Started 1.1 Overview This product is a WiMAX subscriber station system comprised of an outdoor unit (ODU) and an indoor unit (IDU). The ODU connects to the WiMAX network while the IDU is the management point between the WiMAX network (via the ODU) and your computer/local area network.
  • Page 32: Wi-Fi Access Point

    Chapter 1 Getting Started 1.1.1 Wi-Fi Access Point Activate the WiMAX Device’s built-in IEEE 802.11g (also known as ‘Wi-Fi’ or ‘WLAN’) feature to allow it to function as a wireless Access Point (AP). The illustration below shows a group of notebook computers connecting wirelessly to the WiMAX Device and then to the Internet through a WiMAX base station (BS).
  • Page 33: Make Calls Via Internet Telephony Service Provider

    Chapter 1 Getting Started Use content filtering to block access to web sites with URLs containing keywords that you specify. You can define time periods and days during which content filtering is enabled and include or exclude particular computers on your network from content filtering 1.1.3 Make Calls via Internet Telephony Service Provider In a home or small office environment, you can use the WiMAX Device to make...
  • Page 34: Wimax Device Hardware

    Chapter 1 Getting Started 1.2 WiMAX Device Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Device. Figure 6 The WiMAX Device’s LEDs The following table describes your WiMAX Device’s LEDs (from right to left). Table 2 The WiMAX Device STATE DESCRIPTION...
  • Page 35: Good Habits For Managing The Wimax Device

    Chapter 1 Getting Started Table 2 The WiMAX Device STATE DESCRIPTION The Power over Ethernet (PoE) link is not functioning. Green The PoE link is functioning correctly Blinking Green The WiMAX Device is trasmitting and receiving data over the PoE link. WLAN The Wi-Fi network is not operational.
  • Page 36 Chapter 1 Getting Started User’s Guide...
  • Page 37: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher.
  • Page 38 Chapter 2 Introducing the Web Configurator A password screen displays. The default password (“1234”) displays in non- readable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login.
  • Page 39 Chapter 2 Introducing the Web Configurator Click Apply in the next screen to create a certificate using your WiMAX Device’s MAC address which is specific to this device. This certificate is used for authentication when using a secure HTTPS connection over the Internet. A screen displays to let you choose whether to go to the wizard or the advanced screens.
  • Page 40: The Reset Button

    Chapter 2 Introducing the Web Configurator 2.1.2 The Reset Button If you forget your password or cannot access the web configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”.
  • Page 41 Chapter 2 Introducing the Web Configurator Table 3 Main > Icons (continued) ICON DESCRIPTION VOICE Click to go to the Voice screen, where you can configure your voice service and phone settings. TOOLS Click to go the Tools screen, where you can configure your firewall, QoS, and content filter, among other things.
  • Page 42: Table 4 Main

    Chapter 2 Introducing the Web Configurator The following table describes the labels in this screen. Table 4 Main LABEL DESCRIPTION Help Click to open the web configurator’s online help. Wizard Click to run the Internet Connection and VoIP Connection Setup Wizard.
  • Page 43: Figure 7 Main Screen

    Chapter 2 Introducing the Web Configurator Figure 7 Main Screen The following table describes the icons in this screen. Table 5 Main > Icons DESCRIPTION ICON MAIN Click to return to the Main screen. SETUP Click to go the Setup screen, where you can configure LAN and DHCP settings.
  • Page 44: Table 6 Main

    Chapter 2 Introducing the Web Configurator Table 5 Main > Icons (continued) DESCRIPTION ICON STATUS Click to go to the Status screen, where you can view status and statistical information for all connections and interfaces. Strength Indicator Displays a visual representation of the quality of your WiMAX connection.
  • Page 45 Chapter 2 Introducing the Web Configurator Table 6 Main (continued) LABEL DESCRIPTION WiMAX Uptime This field indicates how long the WiMAX Device has been connected to the WiMAX network. This resets every time you disconnect from the WiMAX network, shut the device down, or restart it.
  • Page 46 Chapter 2 Introducing the Web Configurator User’s Guide...
  • Page 47: Internet Connection Wizard

    H A P T E R Internet Connection Wizard 3.1 Overview This chapter provides information on the Internet Connection Wizard screens. The wizard guides you through several steps in which you can configure your most basic (and essential) Internet settings. Note: Screens are presented here in order of appearance as you work through the Internet Connection Wizard.
  • Page 48: System Information

    Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Device’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (Section 11.2 on page 137). Figure 9 Internet Connection Wizard >...
  • Page 49: Wireless Lan

    Chapter 3 Internet Connection Wizard 3.1.3 Wireless LAN This Internet Connection Wizard screen follows the System Information screen and allows you to configure your wireless network’s security settings. The settings here correspond to the Advanced > WiFi Configuration > General screen, Security sub-section (Section 8.2 on page 104).
  • Page 50 Chapter 3 Internet Connection Wizard Table 8 Internet Connection Wizard > Wireless LAN Screen (continued) LABEL DESCRIPTION Security Select an encryption method for your network. This is to discourage people from accessing your network without authorization. Choose an encryption method compatible with all of your anticipated network clients.
  • Page 51: Figure 11 Internet Connection Wizard > Basic (Wep) Screen

    Chapter 3 Internet Connection Wizard 3.1.3.1 Wireless LAN - Basic (WEP) This screen appears as a result of selecting Basic WEP as your Security option in the previous screen. It allows you to configure WEP encryption for your wireless network. The settings here correspond to the Advanced > WiFi Configuration >...
  • Page 52: Table 9 Internet Connection Wizard > Basic (Wep) Screen

    Chapter 3 Internet Connection Wizard The following table describes the labels in this screen. Table 9 Internet Connection Wizard > Basic (WEP) Screen LABEL DESCRIPTION Passphrase Enter a password in this field if you want to have the WiMAX Device create a unique Hex-based key for you. After entering your password, click the Generate button.
  • Page 53: Figure 12 Internet Connection Wizard > Extended (Wpa-Psk) Screen

    Chapter 3 Internet Connection Wizard 3.1.3.2 Wireless LAN -Extended (WPA-PSK / WPA2-PSK) This screen appears as a result of selecting either WPA-PSK or WPA2-PSK as your Security option in the previous screen. It allows you to configure WPA-PSK / WPA2-PSK encryption for your wireless network. The settings here correspond to the Advanced >...
  • Page 54: Authentication Settings

    Chapter 3 Internet Connection Wizard 3.1.4 Authentication Settings This Internet Connection Wizard screen follows the Wireless LAN security setup screens and allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (Section 7.2 on page 93).
  • Page 55 Chapter 3 Internet Connection Wizard Table 11 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL DESCRIPTION This field displays the Privacy Key Management version number. PKM provides security between the WiMAX Device and the base station. At the time of writing, the WiMAX Device supports PKMv2 only.
  • Page 56: Ip Address

    Chapter 3 Internet Connection Wizard 3.1.5 IP Address This Internet Connection Wizard screen follows the Authentication Settings screen and allows you to configure the method with which your WiMAX Device acquires its IP address. The settings here correspond to the SETUP > Set IP Address screen (Section 5.2 on page 68).
  • Page 57: Figure 15 Internet Connection Wizard > Ip Address Assignment

    Chapter 3 Internet Connection Wizard Table 12 Internet Connection Wizard > IP Address (continued) LABEL DESCRIPTION Use Fixed IP Address Select this option to enter static IP address or a fixed IP that your ISP gives you. Note: Selecting this option takes you to the IP Address Assignment screen.
  • Page 58: Setup Complete

    Chapter 3 Internet Connection Wizard The following table describes the labels in this screen. Table 13 Internet Connection Wizard > IP Address LABEL DESCRIPTION WAN IP Address Assignment My WAN IP Address Enter your ISP-assigned IP Address here. My WAN IP Subnet Enter a subnet mask in dotted decimal notation.
  • Page 59: Voip Connection Wizard

    H A P T E R VoIP Connection Wizard 4.1 Overview This chapter provides information on the VoIP Connection Wizard screens. The wizard guides you through several steps in which you can configure the minimum required settings for placing phone calls over the Internet. You can configure the WiMAX Device to use up to two SIP-based VoIP accounts.
  • Page 60: First Voice Account Settings

    Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 12.2 on page 149 for more information).
  • Page 61: Figure 18 Voip Connection > Sip Registration Test

    Chapter 4 VoIP Connection Wizard Table 14 VoIP Connection > First Voice Account Settings (continued) LABEL DESCRIPTION Configure the second Select this check box if you have a second SIP account that voice account you want to use. You will need to configure the same fields as displayed on this screen for the second SIP account.
  • Page 62: Figure 19 Voip Connection > Sip Registration Fail

    Chapter 4 VoIP Connection Wizard Internet connection was already working, you can click Back and try re-entering your SIP account settings. Figure 19 VoIP Connection > SIP Registration Fail User’s Guide...
  • Page 63: Setup Complete

    Chapter 4 VoIP Connection Wizard 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings. Figure 20 VoIP Connection > Finish This screen displays if your SIP account registration was successful. User’s Guide...
  • Page 64 Chapter 4 VoIP Connection Wizard User’s Guide...
  • Page 65: Basic Screens

    Basic Screens The Main Screen (40) The Setup Screens (67)
  • Page 67: The Setup Screens

    H A P T E R The Setup Screens 5.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 5.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 5.2 on page 68) lets you configure the WiMAX Device’s IP address and subnet mask.
  • Page 68: Before You Begin

    Chapter 5 The Setup Screens you entered. You do not need to change the computer subnet mask unless you are instructed to do so. Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server.
  • Page 69: Dhcp Client

    Chapter 5 The Setup Screens The following table describes the labels in this screen. Table 15 SETUP > Set IP Address LABEL DESCRIPTION IP Address Enter the IP address of the WiMAX Device on the LAN. Note: This field is the IP address you use to access the WiMAX Device on the LAN.
  • Page 70: Time Setting

    Chapter 5 The Setup Screens 5.4 Time Setting Click SETUP > Time Setting to set the date, time, and time zone for the WiMAX Device. Figure 23 SETUP > Time Setting The following table describes the labels in this screen. Table 17 SETUP >...
  • Page 71: Pre-Defined Ntp Time Servers List

    Chapter 5 The Setup Screens Table 17 SETUP > DHCP Client (continued) LABEL DESCRIPTION Time Protocol Select the time service protocol that your time server uses.Check with your ISP or network administrator, or use trial- and-error to find a protocol that works. Daytime (RFC 867) - This format is day/month/year/time zone.
  • Page 72: Resetting The Time

    Chapter 5 The Setup Screens Table 18 Pre-defined NTP Time Servers (continued) time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw 5.4.2 Resetting the Time The WiMAX Device automatically resets the time in the following circumstances: • When the device starts up, such as when you press the Power button. •...
  • Page 73: Advanced Screens

    Advanced Screens The LAN Configuration Screens (75) The WAN Configuration Screens (89) The VPN Transport Screens (113) The NAT Configuration Screens (125) The System Configuration Screens (135)
  • Page 75: The Lan Configuration Screens

    H A P T E R The LAN Configuration Screens 6.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Device on the LAN. You can configure its IP address and subnet mask, DHCP services, and other subnets. You can also control how the WiMAX Device sends routing information using RIP.
  • Page 76: Dhcp Setup

    Chapter 6 The LAN Configuration Screens communicate across the network. These networking devices are also known as hosts. Subnet Masks Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa.
  • Page 77: Table 19 Advanced > Lan Configuration > Dhcp Setup

    Chapter 6 The LAN Configuration Screens The following table describes the labels in this screen. Table 19 ADVANCED > LAN Configuration > DHCP Setup LABEL DESCRIPTION DHCP Setup Enable DHCP Select this if you want the WiMAX Device to be the DHCP server on the Server LAN.
  • Page 78: Static Dhcp

    Chapter 6 The LAN Configuration Screens 6.3 Static DHCP Click ADVANCED > LAN Configuration > Static DHCP to assign specific IP addresses to specific computers on the LAN. Note: This screen has no effect if the DHCP server is not enabled. You can enable it in ADVANCED >...
  • Page 79: Ip Alias

    Chapter 6 The LAN Configuration Screens 6.4 IP Alias Click ADVANCED > LAN Configuration > IP Alias to add subnets on the LAN port. You can also control what routing information is sent and received by each subnet. Figure 26 ADVANCED > LAN Configuration> IP Alias The following table describes the labels in this screen.
  • Page 80 Chapter 6 The LAN Configuration Screens Table 21 ADVANCED > LAN Configuration> IP Alias (continued) LABEL DESCRIPTION RIP Version Select which version of RIP the WiMAX Device uses when it sends or receives information on the subnet. • RIP-1 - The WiMAX Device uses RIPv1 to exchange routing information.
  • Page 81: Ip Static Route

    Chapter 6 The LAN Configuration Screens 6.5 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Device. Note: The first static route is the default route and cannot be modified or deleted. Figure 27 Advanced>...
  • Page 82: Ip Static Route Setup

    Chapter 6 The LAN Configuration Screens 6.5.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Device. Figure 28 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen.
  • Page 83: Other Settings

    Chapter 6 The LAN Configuration Screens Table 24 Management > Static Route > IP Static Route > Edit (continued) LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 6.6 Other Settings Click ADVANCED >...
  • Page 84: Technical Reference

    Chapter 6 The LAN Configuration Screens Table 25 ADVANCED > LAN Configuration > Other Settings (continued) LABEL DESCRIPTION Multicast You do not have to enable multicasting to use RIP-2M. (See RIP Version.) Select which version of IGMP the WiMAX Device uses to support multicasting on the LAN.
  • Page 85: Dhcp Setup

    Chapter 6 The LAN Configuration Screens Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.100.1, for your WiMAX Device, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address.
  • Page 86: Dns Server Address

    Chapter 6 The LAN Configuration Screens 6.7.4 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask.
  • Page 87: Multicast

    Chapter 6 The LAN Configuration Screens • None - the WiMAX Device will not send any RIP packets and will ignore any RIP packets received. The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Device sends (it recognizes both formats when receiving). RIP-1 is universally supported;...
  • Page 88 Chapter 6 The LAN Configuration Screens User’s Guide...
  • Page 89: The Wan Configuration Screens

    H A P T E R The WAN Configuration Screens 7.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Device’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet.
  • Page 90: Figure 30 Wimax: Mobile Station

    Chapter 7 The WAN Configuration Screens from one base station to another base station (handover) while subscriber stations use other standards that do not have this capability (IEEE 802.16-2004, for example). The following figure shows an MS-equipped notebook computer MS1 moving from base station BS1’s coverage area and connecting to BS2. Figure 30 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations.
  • Page 91: Figure 32 Using An Aaa Server

    Chapter 7 The WAN Configuration Screens Authentication When authenticating a user, the base station uses a third-party RADIUS or Diameter server known as an AAA (Authentication, Authorization and Accounting) server to authenticate the mobile or subscriber stations. The following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to access the Internet.
  • Page 92: Figure 34 Traffic Redirect Lan Setup

    Chapter 7 The WAN Configuration Screens two or three logical networks with the WiMAX Device itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2). Configure a LAN to LAN/WiMAX Device firewall rule that forwards packets from the protected LAN (Subnet 1) to the backup gateway (Subnet 2).
  • Page 93: Internet Connection

    Chapter 7 The WAN Configuration Screens 7.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Device’s Internet settings. Note: Not all WiMAX Device models have all the fields shown here. Figure 35 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
  • Page 94 Chapter 7 The WAN Configuration Screens Table 26 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Anonymous Enter the anonymous identity provided by your Internet Service Identity Provider. Anonymous identity (also known as outer identity) is used with EAP-TTLS encryption.
  • Page 95: Wimax Configuration

    Chapter 7 The WAN Configuration Screens Table 26 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Auth Mode Select the authentication mode from the drop-down list box. This field is not available in all WiMAX Devices. Check with your service provider for details.
  • Page 96: Figure 36 Advanced > Wan Configuration >Wimax Configuration

    Chapter 7 The WAN Configuration Screens Radio frequency is measured in Hertz (Hz). Table 27 Radio Frequency Conversion 1 kHz = 1000 Hz 1 MHz = 1000 kHz (1000000 Hz) 1 GHz = 1000 MHz (1000000 kHz) Figure 36 ADVANCED > WAN Configuration >WiMAX Configuration The following table describes the labels in this screen.
  • Page 97: Frequency Ranges

    Chapter 7 The WAN Configuration Screens 7.3.1 Frequency Ranges The following figure shows the WiMAX Device searching a range of frequencies to find a connection to a base station. Figure 37 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Device is capable of using to transmit and receive (see the Product Specifications appendix for details).
  • Page 98: Using The Wimax Frequency Screen

    Chapter 7 The WAN Configuration Screens Note: It may take several minutes for the WiMAX Device to find a connection. • The WiMAX Device searches the DL Frequency settings in ascending numerical order, from [1] to [19]. Note: The Bandwidth field is not user-configurable; when the WiMAX Device finds a WiMAX connection, its frequency is displayed in this field.
  • Page 99: Traffic Redirect

    Chapter 7 The WAN Configuration Screens In the DL Frequency [4] field, enter 2625000. Leave the rest of the DL Frequency fields at zero. The screen appears as follows. Figure 38 Completing the WiMAX Frequency Screen Click Apply. The WiMAX Device stores your settings. When the WiMAX Device searches for available frequencies, it scans all frequencies from DL Frequency [1] to DL Frequency [4].
  • Page 100: Table 30 Advanced > Wan Configuration > Traffic Redirect

    Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 30 ADVANCED > WAN Configuration > Traffic Redirect LABEL DESCRIPTION Active Select this check box to have the WiMAX Device use traffic redirect if the normal WAN connection goes down.
  • Page 101: Advanced

    Chapter 7 The WAN Configuration Screens 7.5 Advanced Click ADVANCED > WAN Configuration > Advanced to configure your DNS server, RIP, Multicast and Windows Networking settings. Figure 40 ADVANCED > WAN Configuration > Advanced The following table describes the labels in this screen. Table 31 ADVANCED >...
  • Page 102 Chapter 7 The WAN Configuration Screens Table 31 ADVANCED > WAN Configuration > Advanced (continued) LABEL DESCRIPTION RIP & Multicast Setup RIP Direction Select the RIP direction from None, Both, In Only and Out Only. RIP Version Select the RIP version from RIP-1, RIP-2B and RIP-2M. Multicast IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group.
  • Page 103: The Wi-Fi Configuration Screens

    H A P T E R The Wi-Fi Configuration Screens 8.1 Overview Use the ADVANCED > Wi-Fi Configuration screens to set up your WiMAX Device’s Wi-Fi network features. 8.1.1 What You Can Do in This Chapter • The General screen (Section 8.2 on page 104) allows you to set up your WiMAX Device’s basic Wi-Fi settings and security.
  • Page 104: General

    Chapter 8 The Wi-Fi Configuration Screens using RTS/CTS initiates the delay as soon as a data frame over a specified size enters the network. The length of the delay is specified in the RTS/CTS configuration parameters. Fragmentation On a wireless network, fragmentation refers to the mechanism used to ensue data integrity during transmission.
  • Page 105 Chapter 8 The Wi-Fi Configuration Screens Table 32 ADVANCED > Wi-Fi Configuration > General (continued) LABEL DESCRIPTION Name (SSID) Enter the SSID name that the wireless network signal will be listed as on compatible Wi-Fi clients. Hide SSID Select this option to mask your Wi-Fi network signal. While this may “hide”...
  • Page 106: Figure 42 Advanced > Wi-Fi Configuration > Wpa/Wpa2 Optionsl

    Chapter 8 The Wi-Fi Configuration Screens The subsequent screens describe the individual Security Mode options. Figure 42 ADVANCED > Wi-Fi Configuration > WPA/WPA2 Optionsl User’s Guide...
  • Page 107: Figure 43 Advanced > Wi-Fi Configuration > Wpa-Psk/Wpa2-Psk Optionsl

    Chapter 8 The Wi-Fi Configuration Screens The following table describes the Security Mode options for both WPA and WPA2. Table 33 ADVANCED > Wi-Fi Configuration > General LABEL DESCRIPTION Security Mode Select WPA or WPA2 to display the following Wi-Fi network security options.
  • Page 108: Table 34 Advanced > Wi-Fi Configuration > General

    Chapter 8 The Wi-Fi Configuration Screens The following table describes the Security Mode options for both WPA-PSK and WPA2-PSK. Table 34 ADVANCED > Wi-Fi Configuration > General LABEL DESCRIPTION Security Mode Select WPA-PSK or WPA2-PSK to display the following Wi-Fi network security options.
  • Page 109: Mac Filter

    Chapter 8 The Wi-Fi Configuration Screens 8.3 MAC Filter Click ADVANCED > Wi-Fi Configuration > MAC Filter. This screen allows you to create a list of MAC addresses that you will allow or deny on your network. Note: If you do not want to enable this feature, enter 00:00:00:00:00:00 in the MAC address fields.
  • Page 110: Advanced

    Chapter 8 The Wi-Fi Configuration Screens 8.4 Advanced Click ADVANCED > Wi-Fi Configuration > Advanced. This screen allows to adjust your advanced Wi-Fi network settings. Note: For more information on RTS/CTS and Fragmentation Thresholds, see Appendix C on page 313. Figure 45 ADVANCED >...
  • Page 111 Chapter 8 The Wi-Fi Configuration Screens Table 36 ADVANCED > Wi-Fi Configuration > Advanced (continued) LABEL DESCRIPTION 802.11 Mode Select the Wi-Fi protocol to use while broadcasting. • 802.11b - This protocol is one of the older ones and is not nearly as robust as later versions (b, g, n).
  • Page 112 Chapter 8 The Wi-Fi Configuration Screens User’s Guide...
  • Page 113: The Vpn Transport Screens

    H A P T E R The VPN Transport Screens 9.1 Overview This chapter describes the ADVANCED > VPN Transport screens, where you can configure the WiMAX Device to allow traffic from multiple users to pass through the WiMAX network to the service provider’s router. Each user has his own personal connection to the service provider, even though there is only a single WiMAX connection.
  • Page 114: What You Can Do In This Chapter

    Chapter 9 The VPN Transport Screens 9.1.1 What You Can Do in This Chapter • The General screen (Section 9.2 on page 116) lets you turn VPN transport on or off, and to set the VPN transport endpoint (your service provider’s router). •...
  • Page 115: Before You Begin

    Chapter 9 The VPN Transport Screens When the packets reach the WiMAX Device (D), their source is identified by examining their VLAN tags. Figure 47 Identifying Users PORT 1 VLAN 1 PORT 2 VLAN 2 PORT 1 PORT 2 9.1.3 Before You Begin Before you start configuring your WiMAX Device to use VPN transport, ensure that you have the following from the service provider: •...
  • Page 116: General

    Chapter 9 The VPN Transport Screens 9.2 General Click ADVANCED > VPN Transport to turn VPN transport on or off and to set the VPN transport endpoint (your service provider’s router). Figure 48 ADVANCED > VPN Transport > General The following table describes the labels in this screen. Table 37 ADVANCED >...
  • Page 117: Multi-Protocol Label Switching

    Chapter 9 The VPN Transport Screens interface is simply a set of information that takes frames from a VLAN and put them on an Ethernet pseudowire, and vice versa. In this example, the WiMAX Device takes frames tagged with two different VLAN IDs (10 and 20) and using the customer interfaces, assigns them to specific pseudowires (PW1 and PW2).
  • Page 118: Customer Interface Options

    Chapter 9 The VPN Transport Screens It is necessary to encapsulate the Ethernet pseudowire since the WiMAX connection is IP-only. MPLS information is carried in a packet’s Ethernet header and, without encapsulation, would be stripped from the packet prior to the packet’s transmission over the WiMAX link.
  • Page 119: Table 38 Advanced> Vpn Transport > Customer Interface

    Chapter 9 The VPN Transport Screens The following table describes the icons in this screen. Table 38 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 39 ADVANCED >...
  • Page 120: Customer Interface Setup

    Chapter 9 The VPN Transport Screens 9.3.4 Customer Interface Setup Click the Edit icon in the ADVANCED > VPN Transport > Customer Interface screen to open the Customer Interface Setup. Customer interfaces map traffic onto specific Ethernet pseudowires for transport over the WiMAX network.
  • Page 121: Ethernet Pseudowire

    Chapter 9 The VPN Transport Screens Table 40 ADVANCED > VPN Transport > Customer Interface Setup (continued) LABEL DESCRIPTION DSCP If you wish to prioritize an interface, enter a DiffServ Code Point value of six bits in binary notation. The higher the value, the higher the interface’s priority on the WiMAX Device’s WiMAX link.
  • Page 122: Table 41 Advanced> Vpn Transport > Customer Interface

    Chapter 9 The VPN Transport Screens The following table describes the icons in this screen. Table 41 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 42 ADVANCED >...
  • Page 123: Ethernet Pseudowire Setup

    Chapter 9 The VPN Transport Screens 9.4.1 Ethernet Pseudowire Setup Click a pseudowire entry’s Edit icon in the ADVANCED > VPN Transport > Ethernet Pseudowire screen to set up or modify an Ethernet pseudowire’s configuration. Figure 55 ADVANCED > VPN Transport > Ethernet Pseudowire Setup The following table describes the labels in this screen.
  • Page 124: Statistics

    Chapter 9 The VPN Transport Screens 9.5 Statistics Click ADVANCED > VPN Transport > Statistics to view details and performance information of each active customer interface and its associated Ethernet pseudowire. Figure 56 ADVANCED > VPN Transport > Statistics The following table describes the labels in this screen. Table 44 ADVANCED >...
  • Page 125: The Nat Configuration Screens

    H A P T E R The NAT Configuration Screens 10.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Device. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network.
  • Page 126: Port Forwarding

    Chapter 10 The NAT Configuration Screens The following table describes the labels in this screen. Table 45 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Select this if you want to use port forwarding, trigger ports, or any Address Translation of the ALG.
  • Page 127: Port Forwarding Options

    Chapter 10 The NAT Configuration Screens For example, let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address.
  • Page 128: Table 46 Advanced> Vpn Transport > Customer Interface

    Chapter 10 The NAT Configuration Screens The following table describes the icons in this screen. Table 46 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 47 ADVANCED >...
  • Page 129: Port Forwarding Rule Setup

    Chapter 10 The NAT Configuration Screens 10.3.2 Port Forwarding Rule Setup Click a port forwarding rule’s Edit icon in the ADVANCED > NAT Configuration > Port Forwarding screen to activate, deactivate, or edit it. Figure 60 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup The following table describes the labels in this screen.
  • Page 130: Trigger Port

    Chapter 10 The NAT Configuration Screens 10.4 Trigger Port Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN).
  • Page 131: Trigger Port Forwarding Example

    Chapter 10 The NAT Configuration Screens Table 49 ADVANCED > NAT Configuration > Trigger Port (continued) LABEL DESCRIPTION Start Port Enter the incoming port number or range of port numbers you want to End Port forward to the IP address the WiMAX Device records. To forward one port number, enter the port number in the Start Port and End Port fields.
  • Page 132: Alg

    Chapter 10 The NAT Configuration Screens Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the WiMAX Device to record Jane’s computer IP address. The WiMAX Device associates Jane's computer IP address with the "incoming"...
  • Page 133: Figure 63 Advanced > Nat Configuration > Alg

    Chapter 10 The NAT Configuration Screens Click ADVANCED > NAT Configuration > ALG to enable and disable SIP (VoIP), FTP (file transfer), and H.323 (audio-visual) ALG in the WiMAX Device. Figure 63 ADVANCED > NAT Configuration > ALG The following table describes the labels in this screen. Table 50 ADVANCED >...
  • Page 134 Chapter 10 The NAT Configuration Screens User’s Guide...
  • Page 135: The System Configuration Screens

    H A P T E R The System Configuration Screens 11.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 11.1.1 What You Can Do in This Chapter •...
  • Page 136 Chapter 11 The System Configuration Screens • In Windows XP: Click Start > My Computer > View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the WiMAX Device System Name. Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN.
  • Page 137: General

    Chapter 11 The System Configuration Screens 11.2 General Click ADVANCED > System Configuration > General to change the WiMAX Device’s mode, set up its system name, domain name, idle timeout, and administrator password. Figure 64 ADVANCED > System Configuration > General The following table describes the labels in this screen.
  • Page 138: Dynamic Dns

    Chapter 11 The System Configuration Screens Table 51 ADVANCED > System Configuration > General (continued) LABEL DESCRIPTION Retype to Enter the new password again. Confirm Apply Click to save your changes. Reset Click to restore your previously saved settings. 11.3 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU- SeeMe, etc.).
  • Page 139: Figure 65 Advanced > System Configuration > Dynamic Dns

    Chapter 11 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Device as a dynamic DNS client. Figure 65 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 52 ADVANCED >...
  • Page 140: Firmware

    Chapter 11 The System Configuration Screens Table 52 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Enable offline This field is available when CustomDNS is selected in the DDNS Type option field. Select this if your Dynamic DNS service provider redirects traffic to a URL that you can specify while you are off line.
  • Page 141: The Firmware Upload Process

    Chapter 11 The System Configuration Screens The following table describes the labels in this screen. Table 53 ADVANCED > System Configuration > Firmware LABEL DESCRIPTION File Path Enter the location of the *.bin file you want to upload, or click Browse...
  • Page 142: Configuration

    Chapter 11 The System Configuration Screens 11.5 Configuration Click ADVANCED > System Configuration > Configuration to back up or restore the configuration of the WiMAX Device. You can also use this screen to reset the WiMAX Device to the factory default settings. Figure 67 ADVANCED >...
  • Page 143: The Restore Configuration Process

    Chapter 11 The System Configuration Screens 11.5.1 The Restore Configuration Process When the WiMAX Device restores a configuration file, the device automatically restarts. This causes a temporary network disconnect. Note: Do not turn off the device while configuration file upload is in progress. If the WiMAX Device’s IP address is different in the configuration file you selected, you may need to change the IP address of your computer to be in the same subnet as that of the default management IP address (192.168.5.1).
  • Page 144: The Restart Process

    Chapter 11 The System Configuration Screens 11.6.1 The Restart Process When you click Restart, the the process usually takes about two minutes. Once the restart is complete you can log in again. User’s Guide...
  • Page 145: Voice Screens

    Voice Screens The Service Configuration Screens (147) The Phone Screens (165) The Phone Book Screens (175)
  • Page 147: The Service Configuration Screens

    H A P T E R The Service Configuration Screens 12.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network.
  • Page 148 Chapter 12 The Service Configuration Screens multimedia sessions over the Internet. SIP signaling is separate from the media for which it handles sessions. The media that is exchanged during the session can use a different path from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched telephone networks.
  • Page 149: Before You Begin

    Chapter 12 The Service Configuration Screens 12.1.3 Before you Begin • Ensure that you have all of your voice account information on hand. If not, contact your voice account service provider to find out which settings in this chapter you should configure in order to use your telephone with the WiMAX Device.
  • Page 150: Table 56 Voice > Service Configuration > Sip Setting

    Chapter 12 The Service Configuration Screens The following table describes the labels in this screen. Table 56 VOICE > Service Configuration > SIP Setting LABEL DESCRIPTION SIP Account Select the SIP account you want to see in this screen. If you change this field, the screen automatically refreshes.
  • Page 151: Advanced Sip Settings

    Chapter 12 The Service Configuration Screens 12.2.1 Advanced SIP Settings This section describes the features of the Advanced SIP settings screen. 12.2.1.1 STUN STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) allows the WiMAX Device to find the presence and types of NAT routers and/or firewalls between it and the public Internet.
  • Page 152: Voice Coding

    Chapter 12 The Service Configuration Screens 12.2.1.3 Voice Coding A codec (coder/decoder) codes analog voice signals into digital signals and decodes the digital signals back into voice signals. The WiMAX Device supports the following codecs. • G.711 is a Pulse Code Modulation (PCM) waveform codec. PCM measures analog signal amplitudes at regular time intervals (sampling) and converts them into digital bits (quantization).
  • Page 153: Figure 71 Voice > Service Configuration > Sip Settings > Advanced

    Chapter 12 The Service Configuration Screens 12.2.1.5 Advanced SIP Settings Options Click Advanced in VOICE > Service Configuration > SIP Settings to set up and maintain advanced settings for each SIP account. Figure 71 VOICE > Service Configuration > SIP Settings > Advanced The following table describes the labels in this screen.
  • Page 154 Chapter 12 The Service Configuration Screens Table 57 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Enter the number of seconds your SIP account is registered with the Duration SIP register server before it is deleted. The WiMAX Device automatically tries to re-register your SIP account when one-half of this time has passed.
  • Page 155 Chapter 12 The Service Configuration Screens Table 57 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Active Select this if all of the following conditions are satisfied. • There is a NAT router between the WiMAX Device and the SIP server.
  • Page 156: Table 58 Custom Tones Details

    Chapter 12 The Service Configuration Screens Table 57 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Time Keep the default value, unless your VoIP service provider tells you to change it. Enter the number of seconds the SIP server should provide the message waiting service each time the WiMAX Device subscribes to the service.
  • Page 157 Chapter 12 The Service Configuration Screens Table 58 Custom Tones Details LABEL DESCRIPTION Maximum Time per 20 seconds Individual Tone Total Number of Tones Recordable You can record up to eight different custom tones but the total time must be 128 seconds or less. Use the following steps if you would like to create new tones or change your tones: Pick up the phone and press **** on your phone’s keypad and wait for the...
  • Page 158: Qos

    Chapter 12 The Service Configuration Screens 12.3 QoS Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Device) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks.
  • Page 159: Technical Reference

    Chapter 12 The Service Configuration Screens Table 59 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Device has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure.
  • Page 160: Sip Client Server

    Chapter 12 The Service Configuration Screens After talking, A hangs up and sends a BYE request. B replies with an OK response confirming receipt of the BYE request and the call is terminated. 12.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests.
  • Page 161: Sip Redirect Server

    Chapter 12 The Service Configuration Screens The SIP proxy server forwards the call invitation to C. Figure 74 SIP Proxy Server 12.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request.
  • Page 162: Nat And Sip

    Chapter 12 The Service Configuration Screens Client device A then sends the call invitation to client device C. Figure 75 SIP Redirect Server 12.4.6 NAT and SIP The WiMAX Device must register its public IP address with a SIP register server. If there is a NAT router between the WiMAX Device and the SIP register server, the WiMAX Device probably has a private IP address.
  • Page 163: Dscp And Per-Hop Behavior

    Chapter 12 The Service Configuration Screens 12.4.8 DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels.
  • Page 164 Chapter 12 The Service Configuration Screens User’s Guide...
  • Page 165: The Phone Screens

    H A P T E R The Phone Screens 13.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Device. You can also select which SIP account to use for making outgoing calls. 13.1.1 What You Can Do in This Chapter •...
  • Page 166: Analog Phone

    Chapter 13 The Phone Screens Supplementary Phone Services Overview Supplementary services such as call hold, call waiting, call transfer, etc. are generally available from your VoIP service provider. The WiMAX Device supports the following services: • Call Hold • Call Waiting •...
  • Page 167: Table 61 Voice > Phone > Analog Phone

    Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 61 VOICE > Phone > Analog Phone LABEL DESCRIPTION Phone Port Select the phone port you want to see in this screen. If you change this Settings field, the screen automatically refreshes.
  • Page 168: Advanced Analog Phone Setup

    Chapter 13 The Phone Screens 13.2.1 Advanced Analog Phone Setup Click the Advanced button in VOICE > Phone > Analog Phone to edit advanced settings for each phone port. Figure 78 VOICE > Phone > Analog Phone > Advanced The following table describes the labels in this screen. Table 62 VOICE >...
  • Page 169: Common

    Chapter 13 The Phone Screens Table 62 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION Back Click this to return to the Analog Phone screen without saving your changes. Apply Click to save your changes. Reset Click to restore your previously saved settings. 13.3 Common Click VOICE >...
  • Page 170: Region

    Chapter 13 The Phone Screens 13.4 Region Click VOICE > Phone > Region to maintain settings that often depend on the region of the world in which the WiMAX Device is located. Figure 80 VOICE > Phone > Region The following table describes the labels in this screen. Table 64 VOICE >...
  • Page 171: Europe Type Supplementary Phone Services

    Chapter 13 The Phone Screens You can invoke all the supplementary services by using the flash key. 13.5.2 Europe Type Supplementary Phone Services This section describes how to use supplementary phone services with the Europe Type Call Service Mode. Commands for supplementary services are listed in the table below.
  • Page 172 Chapter 13 The Phone Screens • Reject the second call. Press the flash key and then press “0”. • Disconnect the first call and answer the second call. Either press the flash key and press “1”, or just hang up the phone and then answer the phone after it rings.
  • Page 173: Usa Type Supplementary Services

    Chapter 13 The Phone Screens 13.5.3 USA Type Supplementary Services This section describes how to use supplementary phone services with the USA Type Call Service Mode. Commands for supplementary services are listed in the table below. After pressing the flash key, if you do not issue the sub-command before the default sub-command timeout (2 seconds) expires or issue an invalid sub- command, the current operation will be aborted.
  • Page 174 Chapter 13 The Phone Screens USA Three-Way Conference allows you to make three-way conference calls. To do so: When you are making a call, press the flash key to put the call on hold and get a dial tone. Dial a phone number to make a second call. When the second call is answered, press the flash key to create a three-way conversation.
  • Page 175: The Phone Book Screens

    H A P T E R The Phone Book Screens 14.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Device’s phone book for making VoIP calls. 14.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 14.2 on page 176) lets you maintain rules for handling incoming calls.
  • Page 176: Incoming Call Policy

    Chapter 14 The Phone Book Screens 14.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 81 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen.
  • Page 177 Chapter 14 The Phone Book Screens Table 67 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer Select this if you want the WiMAX Device to forward incoming calls to Forward to the specified phone number if the call is unanswered. (See No Answer Number Waiting Time.) Specify the phone number in the field on the right.
  • Page 178: Speed Dial

    Chapter 14 The Phone Book Screens 14.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters. You can also create speed-dial entries for frequently-used SIP phone numbers.
  • Page 179: Table 69 Voice > Phone Book > Speed Dial

    Chapter 14 The Phone Book Screens The following table describes the labels in this screen. Table 69 VOICE > Phone Book > Speed Dial LABEL DESCRIPTION Speed Dial Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the WiMAX Device to call when you dial the speed-dial number.
  • Page 180 Chapter 14 The Phone Book Screens User’s Guide...
  • Page 181: Tools & Status Screens

    Tools & Status Screens The Certificates Screens (183) The Firewall Screens (203) Content Filter (213) The Remote Management Screens (217) The Logs Screens (227) The UPnP Screen (243) The Status Screen (253)
  • Page 183: The Certificates Screens

    H A P T E R The Certificates Screens 15.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Device. The WiMAX Device can use public key certificates (also sometimes called “digital IDs”) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
  • Page 184: My Certificates

    Chapter 15 The Certificates Screens WiMAX Device to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 15.2 My Certificates Click TOOLS > Certificates > My Certificates to generate and export self- signed certificates or certification requests and import the WiMAX Device’s CA- signed certificates.
  • Page 185 Chapter 15 The Certificates Screens Table 71 TOOLS > Certificates > My Certificates (continued) LABEL DESCRIPTION Name This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. Type This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate.
  • Page 186: My Certificates Create

    Chapter 15 The Certificates Screens 15.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Device create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
  • Page 187: Table 72 Tools > Certificates > My Certificates > Create

    Chapter 15 The Certificates Screens The following table describes the labels in this screen. Table 72 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
  • Page 188 Chapter 15 The Certificates Screens Table 72 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Create a Select Create a certification request and enroll for a certification certificate immediately online to have the WiMAX Device request and enroll generate a request for a certificate and apply to a certification for a certificate authority for a certificate.
  • Page 189: My Certificate Edit

    Chapter 15 The Certificates Screens Table 72 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. If you configured the My Certificate Create screen to have the WiMAX Device enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen.
  • Page 190: Table 73 Tools > Certificates > My Certificates > Edit

    Chapter 15 The Certificates Screens The following table describes the labels in this screen. Table 73 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Property Select Default self-signed certificate which signs the imported remote host certificates to use this certificate to sign the remote...
  • Page 191 Chapter 15 The Certificates Screens Table 73 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Valid To This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
  • Page 192: My Certificate Import

    Chapter 15 The Certificates Screens 15.2.3 My Certificate Import Click TOOLS > Certificates > My Certificates > Import to import a certificate that matches a corresponding certification request that was generated by the WiMAX Device. You must remove any spaces from the certificate’s filename before you can import it.
  • Page 193: Trusted Cas

    Chapter 15 The Certificates Screens 15.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs to display a summary list of certificates of the certification authorities that you have set the WiMAX Device to accept as trusted. The WiMAX Device accepts any valid certificate signed by a certification authority on this list as being trustworthy;...
  • Page 194 Chapter 15 The Certificates Screens Table 76 TOOLS > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
  • Page 195: Trusted Ca Edit

    Chapter 15 The Certificates Screens 15.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen to view in-depth certificate information and change the certificate’s name. Figure 88 TOOLS > Certificates > Trusted CAs > Edit The following table describes the labels in this screen.
  • Page 196 Chapter 15 The Certificates Screens Table 77 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
  • Page 197: Trusted Ca Import

    Chapter 15 The Certificates Screens Table 77 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment”...
  • Page 198: Technical Reference

    Chapter 15 The Certificates Screens Note: You must remove any spaces from the certificate’s filename before you can import the certificate. Figure 89 TOOLS > Certificates > Trusted CAs > Import The following table describes the labels in this screen. Table 78 TOOLS >...
  • Page 199: Advantages Of Certificates

    Chapter 15 The Certificates Screens people to verify whether data was signed by you, or by someone else. This process works as follows. Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way.
  • Page 200: Verifying A Certificate

    Chapter 15 The Certificates Screens • The WiMAX Device only has to store the certificates of the certification authorities that you decide to trust, no matter how many devices you need to authenticate. • Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys.
  • Page 201: Figure 90 Remote Host Certificates

    Chapter 15 The Certificates Screens 15.4.2.1 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certificate. Browse to where you have the certificate saved on your computer.
  • Page 202 Chapter 15 The Certificates Screens User’s Guide...
  • Page 203: The Firewall Screens

    H A P T E R The Firewall Screens 16.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Device’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall"...
  • Page 204: Firewall Setting

    Chapter 16 The Firewall Screens the Internet. The WiMAX Device can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The WiMAX Device is installed between the LAN and a WiMAX base station connecting to the Internet.
  • Page 205: Triangle Route

    Chapter 16 The Firewall Screens LAN-to-LAN/WiMAX Device means the LAN to the WiMAX Device LAN interface. This is always allowed, as this is how you manage the WiMAX Device from your local computer. WAN-to-LAN rules are Internet to your local network firewall rules. The default is to block all traffic from the Internet to your local network.
  • Page 206: Firewall Setting Options

    Chapter 16 The Firewall Screens 16.2.3 Firewall Setting Options Click TOOLS > Firewall > Firewall Setting to configure the basic settings for your firewall. Figure 94 TOOLS > Firewall > Firewall Setting The following table describes the labels in this screen. Table 79 TOOLS >...
  • Page 207: Service Setting

    Chapter 16 The Firewall Screens 16.3 Service Setting Click TOOLS > Firewall > Service Setting to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 95 TOOLS >...
  • Page 208: Technical Reference

    Chapter 16 The Firewall Screens Table 80 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Blocked This is a list of services (ports) that are inaccessible to computers on Services your LAN when service blocking is effective. To remove a service from this list, select the service, and click Delete.
  • Page 209: Guidelines For Enhancing Security With Your Firewall

    Chapter 16 The Firewall Screens 16.4.2 Guidelines For Enhancing Security With Your Firewall Change the default password via web configurator. Think about access control before you connect to the network in any way. Limit who can access your router. Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could present a potential security risk.
  • Page 210: Figure 96 "Triangle Route" Problem

    Chapter 16 The Firewall Screens As a result, the WiMAX Device resets the connection, as the connection has not been acknowledged. Figure 96 “Triangle Route” Problem 16.4.3.1 Solving the “Triangle Route” Problem If you have the WiMAX Device allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the WiMAX Device and its firewall protection.
  • Page 211: Figure 97 Ip Alias

    Chapter 16 The Firewall Screens The WiMAX Device then sends it to the computer on the LAN in Subnet 1. Figure 97 IP Alias User’s Guide...
  • Page 212 Chapter 16 The Firewall Screens User’s Guide...
  • Page 213: Content Filter

    H A P T E R Content Filter 17.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs.
  • Page 214: Filter

    Chapter 17 Content Filter 17.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective. Figure 98 TOOLS > Content Filter > Filter User’s Guide...
  • Page 215: Table 81 Tools > Content Filter > Filter

    Chapter 17 Content Filter The following table describes the labels in this screen. Table 81 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted You can allow a specific computer to access all Internet resources Computer IP without the restrictions you set in these screens.
  • Page 216: Schedule

    Chapter 17 Content Filter 17.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 99 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 82 TOOLS > Content Filter > Schedule LABEL DESCRIPTION Day to Block...
  • Page 217: The Remote Management Screens

    H A P T E R The Remote Management Screens 18.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Device on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Device interface (if any) from which computers.
  • Page 218: What You Need To Know

    Chapter 18 The Remote Management Screens • The DNS screen (Section 18.6 on page 224) lets you control DNS access to your WiMAX Device. • The Security screen (Section 18.7 on page 225) lets you control how your WiMAX Device responds to other types of requests. •...
  • Page 219: Www

    Chapter 18 The Remote Management Screens SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your WiMAX Device supports SNMP agent functionality, which allows a manager station to manage and monitor the WiMAX Device through the network.
  • Page 220: Telnet

    Chapter 18 The Remote Management Screens 18.3 Telnet Click TOOLS > Remote Management > Telnet to control Telnet access to your WiMAX Device. Figure 101 TOOLS > Remote Management > Telnet The following table describes the labels in this screen. Table 85 TOOLS >...
  • Page 221: Snmp

    Chapter 18 The Remote Management Screens The following table describes the labels in this screen. Table 86 TOOLS > Remote Management > FTP LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Device. The computer must use the same port number.
  • Page 222: Snmp Traps

    Chapter 18 The Remote Management Screens The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
  • Page 223: Snmp Options

    Chapter 18 The Remote Management Screens 18.5.2 SNMP Options Click TOOLS > Remote Management > SNMP to control SNMP access to your WiMAX Device. Figure 104 TOOLS > Remote Management > SNMP The following table describes the labels in this screen. Table 88 TOOLS >...
  • Page 224: Dns

    Chapter 18 The Remote Management Screens Table 88 TOOLS > Remote Management > SNMP (continued) LABEL DESCRIPTION Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the WiMAX Device using this service. Select All to allow any computer to access the WiMAX Device using this service.
  • Page 225: Security

    Chapter 18 The Remote Management Screens 18.7 Security Click TOOLS > Remote Management > Security to control how your WiMAX Device responds to other types of requests. Figure 106 TOOLS > Remote Management > Security The following table describes the labels in this screen. Table 90 TOOLS >...
  • Page 226 Chapter 18 The Remote Management Screens User’s Guide...
  • Page 227: The Logs Screens

    H A P T E R The Logs Screens 19.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Device’s log and alert settings. For a list of log messages, see Section 19.4 on page 233.
  • Page 228: Table 91 Syslog Logs

    Chapter 19 The Logs Screens can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs. Table 91 Syslog Logs LOG MESSAGE DESCRIPTION This message is sent by the system ("RAS" displays Event Log: <Facility*8 + as the system name if you haven’t configured one) Severity>Mon dd hr:mm:ss when the router generates a syslog.
  • Page 229: View Logs

    Chapter 19 The Logs Screens 19.2 View Logs Click TOOLS > Logs > View Log to look at log entries and alerts. Alerts are written in red. Figure 107 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order.
  • Page 230 Chapter 19 The Logs Screens Table 93 TOOLS > Logs > View Logs (continued) LABEL DESCRIPTION The number of the item in this list. Time This field displays the time the log entry was recorded. Message This field displays the reason for the log entry. See Section 19.4 on page 233.
  • Page 231: Log Settings

    Chapter 19 The Logs Screens 19.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Device sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded. Figure 108 TOOLS > Logs > Log Settings The following table describes the labels in this screen.
  • Page 232 Chapter 19 The Logs Screens Table 94 TOOLS > Logs > Log Settings LABEL DESCRIPTION Send Log to Enter the e-mail address to which log entries are sent by e-mail. Leave this field blank if you do not want to send logs by e-mail. Send Alerts to Enter the e-mail address to which alerts are sent by e-mail.
  • Page 233: Log Message Descriptions

    Chapter 19 The Logs Screens 19.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 95 System Error Logs LOG MESSAGE DESCRIPTION The WAN connection is down. You cannot access the WAN connection is down. network through this interface. This attempt to create a NAT session exceeds the %s exceeds the max.
  • Page 234: Table 97 Access Control Logs

    Chapter 19 The Logs Screens Table 96 System Maintenance Logs (continued) LOG MESSAGE DESCRIPTION The device was not able to connect to the NTP server. Connect to NTP server fail The device dropped an ICMP packet that was too Too large ICMP packet has large.
  • Page 235: Table 99 Packet Filter Logs

    Chapter 19 The Logs Screens Table 98 TCP Reset Logs (continued) LOG MESSAGE DESCRIPTION The router sent a TCP reset packet when a dynamic Firewall session time firewall session timed out. out, sent TCP RST The default timeout values are as follows: ICMP idle timeout: 3 minutes UDP idle timeout: 3 minutes TCP connection (three way handshaking) timeout: 270...
  • Page 236: Table 101 Ppp Logs

    Chapter 19 The Logs Screens Table 100 ICMP Logs (continued) LOG MESSAGE DESCRIPTION The router blocked a packet that didn’t have a Packet without a NAT table entry corresponding NAT table entry. blocked: ICMP The firewall does not support this kind of ICMP Unsupported/out-of-order ICMP: packets or the ICMP packets are out of order.
  • Page 237: Table 104 Attack Logs

    Chapter 19 The Logs Screens Table 103 Content Filtering Logs (continued) LOG MESSAGE DESCRIPTION The web site is in a trusted domain. %s: Trusted Web site When the content filter is not on according to the time schedule: The external content filtering server did not respond within Waiting content the timeout period.
  • Page 238: Table 105 Remote Management Logs

    Chapter 19 The Logs Screens Table 104 Attack Logs (continued) LOG MESSAGE DESCRIPTION The firewall classified a packet with no source routing ip spoofing - no routing entry as an IP spoofing attack. entry [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The firewall classified an ICMP packet with no source ip spoofing - no routing...
  • Page 239: Table 106 Icmp Notes

    Chapter 19 The Logs Screens Table 106 ICMP Notes TYPE CODE DESCRIPTION Echo Reply Echo reply message Destination Unreachable Net unreachable Host unreachable Protocol unreachable Port unreachable A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF) Source route failed Source Quench A gateway may discard internet datagrams if it does not have the...
  • Page 240: Table 107 Sip Logs

    Chapter 19 The Logs Screens Table 107 SIP Logs LOG MESSAGE DESCRIPTION The listed SIP account was successfully registered with a SIP Registration Success SIP register server. by SIP:SIP Phone Number An attempt to register the listed SIP account with a SIP SIP Registration Fail by register server was not successful.
  • Page 241: Table 111 Lifeline Logs

    Chapter 19 The Logs Screens Table 110 FSM Logs: Callee Side (continued) LOG MESSAGE DESCRIPTION A VoIP phone call was set up from the listed SIP number to VoIP Call Established the WiMAX Device. Ph[Phone Port] <- Outgoing Call Number A VoIP phone call that came into the WiMAX Device has VoIP Call End terminated.
  • Page 242 Chapter 19 The Logs Screens User’s Guide...
  • Page 243: The Upnp Screen

    H A P T E R The UPnP Screen 20.1 Overview Use the TOOLS > UPnP screen to enable the WiMAX Device’s UPnP feature. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 244: Upnp

    Chapter 20 The UPnP Screen • Learning public IP addresses • Assigning lease times to mappings Windows Messenger is an example of an application that supports NAT traversal and UPnP. Chapter 10 on page 125 for further information about NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
  • Page 245: Technical Reference

    Chapter 20 The UPnP Screen The following table describes the labels in this screen. Table 112 TOOLS > UPnP LABEL DESCRIPTION Device Name This field identifies your device in UPnP applications. Enable the Select this to activate UPnP. Be aware that anyone could use a UPnP Universal Plug application to open the web configurator's login screen without entering and Play (UPnP)
  • Page 246: Figure 111 Windows Optional Networking Components Wizard

    Chapter 20 The UPnP Screen The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. Figure 111 Windows Optional Networking Components Wizard In the Networking Services window, select the Universal Plug and Play check box.
  • Page 247: Figure 113 Network Connections

    Chapter 20 The UPnP Screen Make sure the computer is connected to a LAN port of the WiMAX Device. Turn on your computer and the WiMAX Device. Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. Right-click the icon and select Properties.
  • Page 248: Figure 115 Internet Connection Properties: Advanced Settings

    Chapter 20 The UPnP Screen You may edit or delete the port mappings or click Add to manually add port mappings. Figure 115 Internet Connection Properties: Advanced Settings Figure 116 Internet Connection Properties: Advanced Settings: Add When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
  • Page 249: Web Configurator Easy Access

    Chapter 20 The UPnP Screen Double-click on the icon to display your current Internet connection status. Figure 118 Internet Connection Status 20.3.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the WiMAX Device without finding out the IP address of the WiMAX Device first. This becomes helpful if you do not know the IP address of the WiMAX Device.
  • Page 250: Figure 119 Network Connections

    Chapter 20 The UPnP Screen Select My Network Places under Other Places. Figure 119 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your WiMAX Device and select Invoke. The web configurator login screen displays.
  • Page 251: Figure 121 Network Connections: My Network Places: Properties: Example

    Chapter 20 The UPnP Screen Right-click on the icon for your WiMAX Device and select Properties. A properties window displays with basic information about the WiMAX Device. Figure 121 Network Connections: My Network Places: Properties: Example User’s Guide...
  • Page 252 Chapter 20 The UPnP Screen User’s Guide...
  • Page 253: The Status Screen

    H A P T E R The Status Screen 21.1 Overview Use this screen to view a complete summary of your WiMAX Device connection status. 21.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts.
  • Page 254: Table 113 Status

    Chapter 21 The Status Screen The following tables describe the labels in this screen. Table 113 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Device to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Device system name.
  • Page 255 Chapter 21 The Status Screen Table 113 Status (continued) LABEL DESCRIPTION Cell ID A base station’s coverage area can be divided into multiple cells. This field shows the identification number of the cell in which the WiMAX Device is connected. Frequency This field displays the radio frequency of the WiMAX Device’s wireless connection to a base station.
  • Page 256 Chapter 21 The Status Screen Table 113 Status (continued) LABEL DESCRIPTION Tx Power This field shows the output transmission (Tx) level of the WiMAX Device. System Status System Uptime This field displays how long the WiMAX Device has been running since it last started up.
  • Page 257 Chapter 21 The Status Screen Table 113 Status (continued) LABEL DESCRIPTION DHCP Table Click this link to see details of computers to which the WiMAX Device has given an IP address. VoIP Statistics Click this link to view statistics about your VoIP usage. WiMAX Profile Click this link to view details of the current wireless security settings.
  • Page 258: Packet Statistics

    Chapter 21 The Status Screen 21.2.1 Packet Statistics Click Status > Packet Statistics to open this screen. This read-only screen displays information about the data transmission through the WiMAX Device. To configure these settings, go to the corresponding area in the Advanced screens. Figure 123 Packet Statistics The following table describes the fields in this screen.
  • Page 259: Wimax Site Information

    Chapter 21 The Status Screen 21.2.2 WiMAX Site Information Click Status > WiMAX Site Information to open this screen. This read-only screen shows WiMAX frequency information for the WiMAX Device. These settings can be configured in the ADVANCED > WAN Configuration > WiMAX Configuration screen.
  • Page 260: Dhcp Table

    Chapter 21 The Status Screen 21.2.3 DHCP Table Click Status > DHCP Table to open this screen. This read-only screen shows the IP addresses, Host Names and MAC addresses of the devices currently connected to the WiMAX Device. These settings can be configured in the ADVANCED > LAN Configuration >...
  • Page 261: Voip Statistics

    Chapter 21 The Status Screen 21.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 126 VoIP Statistics Each field is described in the following table.
  • Page 262 Chapter 21 The Status Screen Table 117 VoIP Statistics LABEL DESCRIPTION Last Outgoing This field displays the last number the SIP account called. It displays Number N/A if the SIP account has never dialed a number. Call Statistics Phone This field displays the WiMAX Device’s phone port number. Hook This field indicates whether the phone is on the hook or off the hook.
  • Page 263: Wimax Profile

    Chapter 21 The Status Screen 21.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. Note: Not all WiMAX Device models have all the fields shown here.
  • Page 264 Chapter 21 The Status Screen Table 118 The WiMAX Profile Screen (continued) LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station.
  • Page 265: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (267) Product Specifications (275)
  • Page 267: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Device Access and Login • Internet Access •...
  • Page 268: Wimax Device Access And Login

    Chapter 22 Troubleshooting Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adapter to the WiMAX Device. If the problem continues, contact the vendor. 22.2 WiMAX Device Access and Login I forgot the IP address for the WiMAX Device.
  • Page 269 Chapter 22 Troubleshooting • If you changed the IP address (Section 5.2 on page 68), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the WiMAX Device. Check the hardware connections, and make sure the LEDs are behaving as expected.
  • Page 270: Internet Access

    Chapter 22 Troubleshooting I cannot Telnet to the WiMAX Device. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. 22.3 Internet Access I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected.
  • Page 271 Chapter 22 Troubleshooting Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.2.1 on page Disconnect and re-connect the power adapter to the WiMAX Device. If the problem continues, contact your ISP. The Internet connection is slow or intermittent.
  • Page 272: Phone Calls And Voip

    Chapter 22 Troubleshooting 22.4 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. Check the telephone connections and telephone wire. Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 12 on page 147).
  • Page 273: Reset The Wimax Device To Its Factory Defaults

    Chapter 22 Troubleshooting 22.5 Reset the WiMAX Device to Its Factory Defaults If you reset the WiMAX Device, you lose all of the changes you have made. The WiMAX Device re-loads its default settings, and the password resets to 1234. You have to make all of your changes again.
  • Page 274 Chapter 22 Troubleshooting User’s Guide...
  • Page 275: Product Specifications

    H A P T E R Product Specifications This chapter gives details about your WiMAX Device’s hardware and firmware features. Table 119 IDU Hardware Specifications FEATURE DESCRIPTION Device Name MAX-306HW2-IDU Dimension (W x D x H) 216 mm x 164 mm x 52 mm Weight 450 g Power...
  • Page 276: Table 121 Odu Hardware Specifications

    Weight 4 kg including the mount kits Data/Power Port IDU end: RJ-45 Connector ODU end: RJ-45 Connector WiMAX Antenna MAX-306: CROSS- Polarization 12dBi (Built-in Antenna) MAX-316: CROSS- Polarization 14dBi (Built-in Antenna) Physical Connector 1 Vent Connector Operation Environmental Temperature: -40...
  • Page 277: Appendices And Index

    Appendices and Index WiMAX Security (279) Setting Up Your Computer’s IP Address (283) Pop-up Windows, JavaScripts and Java Permissions (327) IP Addresses and Subnetting (337) Importing Certificates (349) SIP Passthrough (381) Common Services (383) Legal Information (387) Customer Support (391)
  • Page 279: Appendix A Wimax Security

    P P E N D I X WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times.
  • Page 280 Appendix A WiMAX Security RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The base station is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users.
  • Page 281: Security Association

    Appendix A WiMAX Security the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Diameter Diameter (RFC 3588) is a type of AAA server that provides several improvements over RADIUS in efficiency, security, and support for roaming. Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA).
  • Page 282 Appendix A WiMAX Security Authentication The WiMAX Device supports EAP-TTLS authentication. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection (with EAP- TLS digital certifications are needed by both the server and the wireless clients for mutual authentication).
  • Page 283: Appendix B Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 284: Figure 128 Windows Xp: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. Figure 128 Windows XP: Start Menu In the Control Panel, click the Network Connections icon.
  • Page 285: Figure 130 Windows Xp: Control Panel > Network Connections > Properties

    Appendix B Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. Figure 130 Windows XP: Control Panel > Network Connections > Properties On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 131 Windows XP: Local Area Connection Properties User’s Guide...
  • Page 286: Figure 132 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Appendix B Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Figure 132 Windows XP: Internet Protocol (TCP/IP) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 287: Figure 133 Windows Vista: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. Figure 133 Windows Vista: Start Menu In the Control Panel, click the Network and Internet icon. Figure 134 Windows Vista: Control Panel Click the Network and Sharing Center icon.
  • Page 288: Figure 136 Windows Vista: Network And Sharing Center

    Appendix B Setting Up Your Computer’s IP Address Click Manage network connections. Figure 136 Windows Vista: Network and Sharing Center Right-click Local Area Connection and then select Properties. Figure 137 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
  • Page 289: Figure 138 Windows Vista: Local Area Connection Properties

    Appendix B Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 138 Windows Vista: Local Area Connection Properties User’s Guide...
  • Page 290: Figure 139 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    Appendix B Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 139 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 291: Figure 140 Mac Os X 10.4: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. Figure 140 Mac OS X 10.4: Apple Menu In the System Preferences window, click the Network icon.
  • Page 292: Figure 142 Mac Os X 10.4: Network Preferences

    Appendix B Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 142 Mac OS X 10.4: Network Preferences For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab.
  • Page 293: Figure 144 Mac Os X 10.4: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. •...
  • Page 294: Figure 145 Mac Os X 10.4: Network Utility

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click Apply Now and close the window. Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 145 Mac OS X 10.4: Network Utility User’s Guide...
  • Page 295: Figure 146 Mac Os X 10.5: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. Click Apple > System Preferences. Figure 146 Mac OS X 10.5: Apple Menu In System Preferences, click the Network icon. Figure 147 Mac OS X 10.5: Systems Preferences User’s Guide...
  • Page 296: Figure 148 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 148 Mac OS X 10.5: Network Preferences > Ethernet From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: •...
  • Page 297: Figure 149 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your WiMAX Device. Figure 149 Mac OS X 10.5: Network Preferences > Ethernet Click Apply and close the window. User’s Guide...
  • Page 298: Figure 150 Mac Os X 10.5: Network Utility

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 150 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 299: Figure 151 Ubuntu 8: System > Administration Menu

    Appendix B Setting Up Your Computer’s IP Address Click System > Administration > Network. Figure 151 Ubuntu 8: System > Administration Menu When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
  • Page 300: Figure 153 Ubuntu 8: Administrator Account Authentication

    Appendix B Setting Up Your Computer’s IP Address In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 153 Ubuntu 8: Administrator Account Authentication In the Network Settings window, select the connection that you want to configure, then click Properties.
  • Page 301: Figure 155 Ubuntu 8: Network Settings > Properties

    Appendix B Setting Up Your Computer’s IP Address The Properties dialog box opens. Figure 155 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
  • Page 302: Figure 156 Ubuntu 8: Network Settings > Dns

    Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 156 Ubuntu 8: Network Settings > DNS Click the Close button to apply the changes.
  • Page 303: Figure 157 Ubuntu 8: Network Tools

    Appendix B Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 157 Ubuntu 8: Network Tools User’s Guide...
  • Page 304: Figure 158 Opensuse 10.3: K Menu > Computer Menu

    Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 305: Figure 159 Opensuse 10.3: K Menu > Computer Menu

    Appendix B Setting Up Your Computer’s IP Address When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 159 openSUSE 10.3: K Menu > Computer Menu When the YaST Control Center window opens, select Network Devices and then click the Network Card icon.
  • Page 306: Figure 161 Opensuse 10.3: Network Settings

    Appendix B Setting Up Your Computer’s IP Address When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 161 openSUSE 10.3: Network Settings User’s Guide...
  • Page 307: Figure 162 Opensuse 10.3: Network Card Setup

    Appendix B Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 162 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 308: Figure 163 Opensuse 10.3: Network Settings

    Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 163 openSUSE 10.3: Network Settings Click Finish to save your settings and close the window.
  • Page 309: Figure 164 Opensuse 10.3: Knetwork Manager

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 164 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
  • Page 310 Appendix B Setting Up Your Computer’s IP Address User’s Guide...
  • Page 311: Appendix C Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 312: Figure 167 Basic Service Set

    Appendix C Wireless LANs with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 167 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 313: Figure 168 Infrastructure Wlan

    Appendix C Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 168 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
  • Page 314: Figure 169 Rts/Cts

    Appendix C Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 169 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 315: Fragmentation Threshold

    Appendix C Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 316: Table 123 Ieee 802.11G

    Appendix C Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 123 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/...
  • Page 317 Appendix C Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices.
  • Page 318: Types Of Eap Authentication

    Appendix C Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
  • Page 319 Appendix C Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
  • Page 320: Table 125 Comparison Of Eap Authentication Types

    Appendix C Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
  • Page 321 Appendix C Wireless LANs If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2.
  • Page 322 Appendix C Wireless LANs keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
  • Page 323: Figure 170 Wpa(2) With Radius Application Example

    Appendix C Wireless LANs The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
  • Page 324: Figure 171 Wpa(2)-Psk Authentication

    Appendix C Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 171 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 325: Antenna Characteristics

    Appendix C Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN.
  • Page 326: Types Of Antennas For Wlan

    Appendix C Wireless LANs Types of Antennas for WLAN There are two types of antennas used for wireless LAN applications. • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment.
  • Page 327: Appendix D Pop-Up Windows, Javascripts And Java Permissions

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 328: Figure 173 Internet Options: Privacy

    Appendix D Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 173 Internet Options: Privacy Click Apply to save this setting.
  • Page 329: Figure 174 Internet Options: Privacy

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 174 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. User’s Guide...
  • Page 330: Figure 175 Pop-Up Blocker Settings

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 175 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 331: Figure 176 Internet Options: Security

    Appendix D Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 176 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 332: Figure 177 Security Settings - Java Scripting

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 177 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 333: Figure 178 Security Settings - Java

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 178 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. User’s Guide...
  • Page 334: Figure 179 Java (Sun)

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 179 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
  • Page 335: Figure 181 Mozilla Firefox Content Security

    Appendix D Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 181 Mozilla Firefox Content Security User’s Guide...
  • Page 336 Appendix D Pop-up Windows, JavaScripts and Java Permissions User’s Guide...
  • Page 337: Appendix E Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 338: Figure 182 Network Number And Host Id

    Appendix E IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 182 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 339: Table 128 Subnet Masks

    Appendix E IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
  • Page 340: Table 130 Alternative Subnet Mask Notation

    Appendix E IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
  • Page 341: Figure 183 Subnetting Example: Before Subnetting

    Appendix E IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 183 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
  • Page 342: Figure 184 Subnetting Example: After Subnetting

    Appendix E IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 184 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
  • Page 343: Table 131 Subnet 1

    Appendix E IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 131 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
  • Page 344: Table 135 Eight Subnets

    Appendix E IP Addresses and Subnetting Table 134 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.100.193 192.168.100.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
  • Page 345: Configuring Ip Addresses

    Appendix E IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 137 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK HOST BITS SUBNETS SUBNET 255.255.128.0 (/17) 32766...
  • Page 346 Appendix E IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the WiMAX Device unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 347: Figure 185 Conflicting Computer Ip Addresses Example

    Appendix E IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 185 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers.
  • Page 348: Figure 187 Conflicting Computer And Router Ip Addresses Example

    Appendix E IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 187 Conflicting Computer and Router IP Addresses Example User’s Guide...
  • Page 349: Appendix F Importing Certificates

    P P E N D I X Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
  • Page 350: Figure 188 Internet Explorer 7: Certification Error

    Appendix F Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 351: Figure 190 Internet Explorer 7: Certificate Error

    Appendix F Importing Certificates In the Address Bar, click Certificate Error > View certificates. Figure 190 Internet Explorer 7: Certificate Error In the Certificate dialog box, click Install Certificate. Figure 191 Internet Explorer 7: Certificate User’s Guide...
  • Page 352: Figure 192 Internet Explorer 7: Certificate Import Wizard

    Appendix F Importing Certificates In the Certificate Import Wizard, click Next. Figure 192 Internet Explorer 7: Certificate Import Wizard If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 193 Internet Explorer 7: Certificate Import Wizard User’s Guide...
  • Page 353: Figure 194 Internet Explorer 7: Certificate Import Wizard

    Appendix F Importing Certificates Otherwise, select Place all certificates in the following store and then click Browse. Figure 194 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
  • Page 354: Figure 196 Internet Explorer 7: Certificate Import Wizard

    Appendix F Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 196 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 197 Internet Explorer 7: Security Warning User’s Guide...
  • Page 355: Figure 198 Internet Explorer 7: Certificate Import Wizard

    Appendix F Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 198 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
  • Page 356: Figure 200 Internet Explorer 7: Public Key Certificate File

    Appendix F Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 357: Figure 202 Internet Explorer 7: Tools Menu

    Appendix F Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer Open Internet Explorer and click TOOLS > Internet Options. Figure 202 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content >...
  • Page 358: Figure 204 Internet Explorer 7: Certificates

    Appendix F Importing Certificates In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 204 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 205 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes.
  • Page 359 Appendix F Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. User’s Guide...
  • Page 360: Figure 207 Firefox 2: Website Certified By An Unknown Authority

    Appendix F Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 361: Figure 208 Firefox 2: Page Info

    Appendix F Importing Certificates The certificate is stored and you can now connect securely to the web configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information.
  • Page 362: Figure 209 Firefox 2: Tools Menu

    Appendix F Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Firefox and click TOOLS >...
  • Page 363: Figure 211 Firefox 2: Certificate Manager

    Appendix F Importing Certificates In the Certificate Manager dialog box, click Web Sites > Import. Figure 211 Firefox 2: Certificate Manager Use the Select File dialog box to locate the certificate and then click Open. Figure 212 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
  • Page 364: Figure 213 Firefox 2: Tools Menu

    Appendix F Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click TOOLS > Options. Figure 213 Firefox 2: Tools Menu In the Options dialog box, click ADVANCED > Encryption > View Certificates. Figure 214 Firefox 2: Options User’s Guide...
  • Page 365: Figure 215 Firefox 2: Certificate Manager

    Appendix F Importing Certificates In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 215 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 216 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 366: Figure 217 Opera 9: Certificate Signer Not Found

    Appendix F Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 367: Figure 218 Opera 9: Security Information

    Appendix F Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 218 Opera 9: Security information User’s Guide...
  • Page 368: Figure 219 Opera 9: Tools Menu

    Appendix F Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click TOOLS >...
  • Page 369: Figure 220 Opera 9: Preferences

    Appendix F Importing Certificates In Preferences, click ADVANCED > Security > Manage certificates. Figure 220 Opera 9: Preferences User’s Guide...
  • Page 370: Figure 221 Opera 9: Certificate Manager

    Appendix F Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 221 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 222 Opera 9: Import certificate User’s Guide...
  • Page 371: Figure 223 Opera 9: Install Authority Certificate

    Appendix F Importing Certificates In the Install authority certificate dialog box, click Install. Figure 223 Opera 9: Install authority certificate Next, click OK. Figure 224 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 372: Figure 225 Opera 9: Tools Menu

    Appendix F Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. Open Opera and click TOOLS > Preferences. Figure 225 Opera 9: Tools Menu In Preferences, ADVANCED > Security > Manage certificates. Figure 226 Opera 9: Preferences User’s Guide...
  • Page 373: Figure 227 Opera 9: Certificate Manager

    Appendix F Importing Certificates In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 227 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 374: Figure 228 Konqueror 3.5: Server Authentication

    Appendix F Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 375: Figure 230 Konqueror 3.5: Kde Ssl Information

    Appendix F Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 230 Konqueror 3.5: KDE SSL Information User’s Guide...
  • Page 376: Figure 231 Konqueror 3.5: Public Key Certificate File

    Appendix F Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 377 Appendix F Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. User’s Guide...
  • Page 378: Figure 234 Konqueror 3.5: Settings Menu

    Appendix F Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. Open Konqueror and click Settings > Configure Konqueror. Figure 234 Konqueror 3.5: Settings Menu In the Configure dialog box, select Crypto. On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
  • Page 379 Appendix F Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. User’s Guide...
  • Page 380 Appendix F Importing Certificates User’s Guide...
  • Page 381: Appendix G Sip Passthrough

    P P E N D I X SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Device SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Device, use the ip alg disable ALG_SIP command to turn off the SIP ALG.
  • Page 382 Appendix G SIP Passthrough User’s Guide...
  • Page 383: Appendix H Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
  • Page 384 Appendix H Common Services Table 138 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 385 Appendix H Common Services Table 138 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL User-Defined PPTP (Point-to-Point Tunneling (GRE) Protocol) enables secure transfer of data over public networks.
  • Page 386 Appendix H Common Services Table 138 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution.
  • Page 387: Appendix I Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 388 Appendix I Legal Information Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 389: Zyxel Limited Warranty

    Appendix I Legal Information 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à...
  • Page 390 Appendix I Legal Information implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
  • Page 391: Appendix J Customer Support

    • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-3-578-3942 • Fax: +886-3-578-2439 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan China - ZyXEL Communications (Beijing) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn •...
  • Page 392 Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 - Modrany, Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk •...
  • Page 393 Appendix J Customer Support • Fax: +358-9-4780-8448 • Web: www.zyxel.fi • Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest,...
  • Page 394 • Support E-mail: support@zyxel.com • Support Telephone: +1-800-978-7222 • Sales E-mail: sales@zyxel.com • Sales Telephone: +1-714-632-0882 • Fax: +1-714-632-0858 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806-2001, U.S.A. Norway • Support E-mail: support@zyxel.no User’s Guide...
  • Page 395 Appendix J Customer Support • Sales E-mail: sales@zyxel.no • Telephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • Web: www.zyxel.no • Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland • E-mail: info@pl.zyxel.com • Telephone: +48-22-333 8250 • Fax: +48-22-333 8251 •...
  • Page 396 • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 • Fax: +46-31-744-7701 • Web: www.zyxel.se • Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Taiwan • Support E-mail: support@zyxel.com.tw • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-2-27399889 •...
  • Page 397 • Support E-mail: support@zyxel.co.uk • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) User’s Guide...
  • Page 398 Appendix J Customer Support User’s Guide...
  • Page 399: Index

    Index Index links BYE request accounting server see AAA ACK message activity 183, 199, 319 Advanced Encryption Standard and certificates see AES call See AES. Europe type service mode hold 281, 321 171–173 service mode 171–173 transfer 172–173 alternative subnet mask notation waiting 171–173 analysis-by-synthesis...
  • Page 400 Index authority, see CA digital ID notices DL frequency 98, 99 requests 183, 187, 188 domain name viewing download frequency chaining see DL frequency chaining message authentication DS field see CCMP DSCP channel see DiffServ interference dynamic DNS circuit-switched telephone networks Dynamic Host Configuration Protocol Class of Service (CoS) see DHCP...
  • Page 401 Index request and reply G.168 G.711 G.729 listening port hidden node hybrid waveform codec Management Information Base (MIB) manual site survey 98, 99 Message Authentication Code see MAC IANA message integrity IBSS Message Integrity Check (MIC) identity 91, 279 message waiting indication idle timeout Metropolitan Area Network IEEE 802.11g...
  • Page 402 Index shared secret key Real-time Transport Protocol see RTP OK response redirect server outbound proxy 151, 162 server register server registration product related documentation remote management and NAT Pairwise Master Key (PMK) 321, 323 remote management limitations pattern-spotting required bandwidth PBX services RFC 1889 RFC 2510.
  • Page 403 Index authentication see TEK authentication password transport layer security BYE request see TLS call progression triangle route client problem client server solutions identities trigger port forwarding INVITE request process number 60, 148 TTLS 55, 94, 279, 282 OK response tunneled TLS outbound proxy see TTLS proxy server...
  • Page 404 Index activity detection coding mail Voice over IP see VoIP VoIP waveform codec Wi-Fi Protected Access WiMAX 89–90 security WiMAX Forum wireless client WPA supplicants Wireless Interoperability for Microwave Access see WiMAX Wireless Metropolitan Area Network see MAN wireless network access standard wireless security...
  • Page 405 Index User’s Guide...

This manual is also suitable for:

Max-306 oduMax-316 oduMax-306hw2 idu

Table of Contents