The document contains “70” pages. Document ident. no.: “KSS692500-EDE-020” Document Title: “Management Guide” Iskratel 2012. All rights reserved. Technical specifications and features are binding insofar as they are specifically and expressly agreed upon in a written contract. Technical modifications possible.
Management Guide Safety precautions When using this equipment, consider the following precautions and requirements: Fiber cable, when operating, transmits a beam of infrared laser light You shall not look at the optical cable if it is at one side connected to the optical transmitter while the other end is not connected.
About this document About this document Purpose This document contains a description of the web interface for configuring and managing the Innbox V50-U home gateway. Intended audience This document is intended for the administrators and maintenance staff. Document organization Table 1-1: Document organization Chapter...
D. Management guide 1.4.2 Graphical user interface (GUI) Table 1-3: Conventions for GUI text formatting Format Description Elements of the application windows: window and dialog box titles, menus, data element fields, buttons, tabs... Value you must choose or enter. value The >...
Starting the WEB management interface Starting the WEB management interface To start the Innbox V50-U Home Gateway web interface: 1. Enter the Innbox V50-U IP address in the web browser address bar. 2. A dialog box requiring user authentication opens: Figure 2-1: Dialog box 3.
D. Management guide Navigation The management interface enables you to view your router settings, edit and configure them. Figure 2-2: Main page The interface is divided into two frames: left frame - navigation tree The navigation tree is intended for navigating and accessing the router configuration pages. The elements listed in the tree are hyperlinks.
Device info Device info This section introduces the basic information about the device and its current settings in use. Click any of the submenus to view the corresponding information. Select Device Info > Summary. The Summary page opens. The first table indicates Device info. The second table displays the current status of WAN connection information.
D. Management guide Advanced Setup Select Advanced Setup. Click any of the submenus to configure the corresponding function, for example Layer2 Interface, WAN Service, LAN, NAT, Security, Parental Control, Quality of Service, Routing, DNS, DSL, UPnP, DNS Proxy, Interface Grouping, Port Configuration and Multicast. 3.2.1 Layer2 Interface Select Advanced Setup >...
ATM PVC configuration 3.2.1.1.1 ATM PVC configuration Select Advanced Setup > Layer2 Interface > ATM Interface > Add. Figure 3-3: ATM PVC Configuration page VPI/VCI: the VPI and VCI values provided by your ISP. Do not change them unless it was required by your ISP.
D. Management guide 3.2.1.2 PTM Interface Select Advanced Setup > Layer2 Interface > PTM Interface. The following page opens: Figure 3-4: PTM Interface Add: Click the button to add a new interface. Remove: Select the checkbox in the table on the page above and then click Remove. The corresponding interface will be deleted.
ETH Interface Select IP QoS Scheduler Algorithm: If you want to adopt QoS (Quality of Service) for the connection, select Strict Priority or Weighted Fair Queuing. 3.2.1.3 ETH Interface Select Advanced Setup > Layer2 Interface > ETH Interface. The following page opens: Figure 3-6: ETH WAN Interface ...
D. Management guide 3.2.2 WAN Service You can configure a WAN service over a selected interface. Select Advanced Setup > WAN Service. The following page opens: Figure 3-8: WAN Service Setup There are five different configurations for the connection types: PPPoE, IPoE, Bridge, PPPoA, and IPoA. You can select the corresponding types according to your needs.
Page 19
WAN Service Interface configuration 2. Select a layer 2 interface for this service and click Next. The following page opens: Figure 3-10: WAN Service Configuration - service type 3. Select the WAN service type: PPP over Ethernet (PPPoE), IP over Ethernet or Bridging. If your ISP provides a PPPoE connection, select PPPoE option.
Page 20
D. Management guide 5. Enter or select: PPP Username/Password: Enter the user name and password provided by your ISP. These fields are case-sensitive. PPPoE Service Name: Enter the service name if it was provided by your ISP. If you leave it blank, the default name will be the same as the service description on the previous page.
Page 21
WAN Service Interface configuration 7. Select a preferred WAN interface as the system default gateway and click Next. The following page opens: Figure 3-13: WAN - DNS Server configuration • Select DNS Server Interface from available WAN Interface: You can select this option to automatically get DNS server information from the selected WAN interface.
D. Management guide 3.2.3 You can configure Local Area Network (LAN) in this page. Select Advanced Setup > LAN. The following page opens: Figure 3-15: LAN Setup Configure the device IP Address and Subnet Mask for LAN Interface. • IP Address: Enter the device local IP Address, then you can access to the Web-based Utility via the IP Address, the default value is 192.168.1.1.
• Leased Time (hour): The Leased Time is the amount of time in which a network user will be allowed connection to the device with their current dynamic IP address. Enter the amount of time, in hours, then the user will be “leased” this dynamic IP address. After the dynamic IP address has expired, the user will be automatically assigned a new dynamic IP address.
D. Management guide Internal Port Start: The base number of internal ports. You can type a service port or leave it blank. Internal Port End: The end number of internal ports. You can type a service port or leave it blank. ...
Port Triggering 3.2.4.2 Port Triggering Some applications require that specific ports in the device firewall should be opened for access by remote devices. Port Trigger dynamically opens up the 'Open Ports' in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote device using the triggering ports.
D. Management guide 2. Select the application from the drop-down list. If the list does not have the application that you want, select the Custom application radio button, and type the name of the custom application in the text box. 3.
Outgoing IP filtering 3.2.5.1.1 Outgoing IP filtering The Outgoing IP Filtering feature allows you to control some IP traffic from LAN to access specific addresses. By default, all outgoing IP traffic from LAN is allowed, but some IP traffic can be BLOCKED by setting up filters.
D. Management guide Note: When you add an Outgoing IP Filtering entry, you must configure at least one condition on the preceding page except the Filter name. If you leave the Protocol blank, it means that the rule is effective to all protocols, if you leave the Source IP Address and/or Destination IP Address blank, it suggests that all Source IP Addresses and/or Destination IP Addresses are controlled by the rule, if you leave the Source Port and/or Destination Port blank, it suggests that all Source Ports and/or Destination Ports are...
Page 29
Incoming IP Filtering Add IP filter -- Incoming 1. Select Advanced Setup > Security > IP Filtering > Incoming > Add. The following page opens: Figure 3-24: Add IP Filter - Incoming 2. Enter the Filter name for the rule, it is exclusive and must be filled in. 3.
D. Management guide 3.2.5.2 MAC Filtering The feature allows you to control access to the Internet by users on your local network based on their MAC address. Select Advanced Setup > Security > MAC Filtering. The following page opens: Figure 3-25: MAC Filtering Setup ...
Add MAC Filter 3.2.5.2.1 Add MAC Filter 1. Select Advanced Setup > Security > MAC Filtering > Add. The following page opens: Figure 3-26: Add MAC Filter 2. Select Protocol Type in the drop-down list for the rule. 3. Enter Destination MAC Address and Source MAC Address in the fields. 4.
D. Management guide 3.2.6.1 Time Restriction With time restriction you can add the time of the day to restrict access to a specific device connected to the router. Select Advanced Setup > Parental Control > Time Restriction. The following page opens: Figure 3-27: Access Time Restriction ...
URL Filter Note: Before you configure time restriction, you must set the internet time (Management > Internet Time). Otherwise the time restriction will not work properly. 3.2.6.2 URL Filter With URL filter you can configure the filter rules based on URL to control the computers in the LAN to access the specified port.
D. Management guide 3.2.7 Quality of Service QoS helps to prioritize data as it enters your device. By attaching special identification marks or headers to incoming packets, QoS determines which queue the packets enter, based priority. This is useful when there are certain types of data you want to give higher priority, such as voice data packets will be given a higher priority than Web data packets.
D. Management guide 3.2.7.1.1 QoS Queue Configuration Configure a QoS queue and assign it to a specific layer2 interface. 1. Select Advanced Setup > Quality of Service > Queue Config > Add. The following page opens: Figure 3-33: QoS Queue Configuration 2.
Add Network Traffic Class Rule 3.2.7.2.1 Add Network Traffic Class Rule 1. Select Advanced Setup > Quality of Service > QoS Classification > Add. The following page opens. Figure 3-35: Add Network Traffic Class Rule 2. After you specify the conditions, click Apply/Save to save the entry. 3.2.8 Routing You can configure:...
D. Management guide 3.2.8.1 Default Gateway Default gateway interface list can have multiple WAN interfaces served as system default gateways but only one will be used according to the priority with the first being the highest and the last one the lowest priority if the WAN interface is connected.
Routing -- Static Route Add 3.2.8.2.1 Routing -- Static Route Add Select Advanced Setup > Routing > Static Route > Add. The following page opens: Figure 3-38: Routing - Static Route Add Destination IP address: The destination IP address is the address of the network or host that you want to assign to a static route.
D. Management guide 3.2.8.3.1 Policy Routing Setup 1. Select Advanced Setup > Routing > Policy Route > Add. The following page opens: Figure 3-40: Policy Routing Setup 2. Enter the policy name, policies and WAN interface. 3. Click Apply/Save to add the entry to the policy routing table. 3.2.8.4 Routing Information Protocol (RIP) is a process of moving a packet from one node to another by forwarding the packet to the next router.
Enabled: Click the checkbox to enable RIP for the selected interface, version and operation. Apply/Save: Save the settings. 3.2.9 You can configure a DNS server and Dynamic DNS in this page. 3.2.9.1 DNS Server Select Advanced Setup > DNS > DNS Server. The following page opens: Figure 3-42: DNS Server Configuration...
D. Management guide Select DNS Server Interface from available WAN interfaces: DNS Server Interfaces can have multiple WAN interfaces served as system DNS servers but only one will be used according to the priority with the first being the highest and the last one the lowest priority if the WAN interface is connected. Priority order can be changed by removing all and adding them back in again.
Add Dynamic DNS 3.2.9.2.1 Add Dynamic DNS 1. Select Advanced Setup > DNS > Dynamic DNS > Add. The following page opens: Figure 3-44: Add Dynamic DNS 2. Select D-DNS provider in the drop-down list. 3. Enter the Hostname of the DNS Server, and select the corresponding Interface for the DDNS. 4.
D. Management guide 3.2.10 Configure the modulation type, phone line pair and the capability of Bitswap or SRA. To Select Advanced Setup > DSL. The following page opens: Figure 3-45: DSL Settings Advanced Settings: Click this button to open the Advanced settings page. Select the test mode: normal, reverb, medley, no retrain, and L3.
UPnP Apply: Save the settings. Tone Selection: Click this button to open the Tone settings page: Figure 3-47: DSL Tone Settings The frequency band of DSL is split into 256 separate tones, each spaced 4.3125 kHz apart. Each tone carries separate data, so the device operates as if 256 separate devices were running in parallel.
D. Management guide 3.2.12 DNS Proxy Enable or disable DNS proxy. Select Advanced Setup > DNS Proxy. The following page opens: Figure 3-49: DNS Proxy Configuration Host name of the Broadband router: Enter the hostname of the device (router) ...
Interface Grouping Configuration 3.2.13.1 Interface Grouping Configuration 1. Select Advanced Setup > Interface Grouping > Add. The following page opens: Figure 3-51: Interface Grouping Configuration 2. Enter a unique name for Group Name. 3. Select the interface which you want to use from the drop-down list. Note: If you want to automatically add LAN clients to a WAN Interface in the new group, add the DHCP vendor ID string.
D. Management guide 3.2.14 Port Configuration You can specify how the local ports of device are used. Select Advanced Setup > Port Configuration. The following page opens: Figure 3-52: Port Configuration To change the service for interface click Change..A new page opens: Figure 3-53: Port Configuration - Setup ...
Multicast 3.2.15 Multicast Internet Protocol (IP) multicast is a routing technique that allows IP traffic to be sent from one source or multiple sources and delivered to multiple destinations. On the local network, multicast delivery is controlled by Internet Group Management Protocol (IGMP). To modify default values of IGMP protocol configuration, select Advanced Setup >...
D. Management guide Wireless Select Wireless. Click any of the submenus to configure the corresponding function of the wireless network: Basic, Security, MAC Filter, Wireless Bridge, Advanced and Station Info. 3.3.1 Basic Select Wireless > Basic. The following page opens: Figure 3-55: Wireless - Basic ...
Security 3.3.2 Security You can configure security features of the wireless LAN interface in this page. 1. Select Wireless > Security. The Wireless--Security page opens. Figure 3-56: Wireless Security Configuration You may setup security configuration manually or through Wi-Fi Protected Setup (WPS). Note: Using WEP network authentication is not recommended because it does not offer reliable security.
D. Management guide 3.3.2.1 Manual Setup AP You can set the network authentcation method, select data encryption, specify whether a network key is required to authenticate to this wireless network and specify the encryption strength. Figure 3-57: Manual Setup AP - Open 1.
3.3.2.1.1 WEP is a basic encryption method offering two levels of encryption, 64-bit and 128-bit encryption. To configure the WEP encryption, there are three ways: Keep the Network Authentication of Open and select Enable from the WEP Encryption drop-down list (shown in 3-57).
Page 54
D. Management guide Figure 3-59: Manual Setup AP - X802.1X RADIUS Server IP Address: The IP address of the RADIUS server. RADIUS Port: The port of the RADIUS server. The default number is 1812. RADIUS key: The password of the RADIUS server. ...
3.3.2.1.2 WPA security for wireless communication has been developed to overcome some of the shortcomings of WEP. WPA combines generation with the authentication services of a RADIUS server. Figure 3-60: Manual Setup AP - WPA WPA Group ReKey Interval: Enter the Key Renewal period, which tells the home gateway how often it should change encryption keys.
D. Management guide 3.3.2.1.3 WPA-PSK WPA-PSK requires a shared key and does not use a separated server for authentication. PSK keys can be ASCII or Hex type. Figure 3-61: Manual Setup AP - WPA-PSK WPA/WAPI passphrase: Enter the key shared by the home gateway and your other network devices. It must have 8-63 ASCII characters or 64 Hexadecimal digits.
WPA2 3.3.2.1.4 WPA2 To configure WPA2 settings, select the WPA2 option from the drop-down list. The menu will change to offer the appropriate settings. The steps of these settings are similar to WPA settings. Figure 3-63: Manual Setup AP - WPA2 ...
D. Management guide 3.3.2.1.5 WPA2-PSK To configure WPA2-PSK settings, select the WPA2-PSK option from the drop-down list. The menu will change to offer the appropriate settings. WPA2-PSK requires a shared key and does not use a separated server for authentication. PSK keys can be ASCII or Hex type. Figure 3-64: Manual Setup AP - WPA2-PSK...
Mixed WPA2/WPA 3.3.2.1.6 Mixed WPA2/WPA To configure Mixed WPA2/WPA settings, select the WPA2/WPA option from the drop-down list. The menu will change to offer the appropriate settings. The steps to these settings are similar to those for WPA-PSK. Figure 3-65: Manual Setup AP - WPA2/WPA...
D. Management guide 3.3.2.1.7 Mixed WPA2/WPA-PSK To configure Mixed WPA2/WPA-PSK settings, select the WPA2/WPA-PSK option from the drop-down list. The menu will change to offer the appropriate settings. The steps to these settings are the same with WPA-PSK. Figure 3-66: Manual Setup AP - WPA2/WPA-PSK...
WPS Setup 3.3.2.2 WPS Setup Wi-Fi protected setup (WPS) is a standard for easy and secure establishment of a wireless home network. The goal of the standard is to simplify the process of configuring security on wireless networks.The Innbox V50-U home gateway supports two different ways of adding a device to the wireless network: ...
D. Management guide 3.3.3 MAC Filter The Wireless MAC Filter feature allows you to control which wireless-equipped PCs or devices may or may not communicate on your wireless network depending on their MAC address. If you do not wish to filter users by MAC Address, select Disabled.
Wireless Bridge 3.3.4 Wireless Bridge The device can also be configured as a wireless bridge. The wireless bridge mode will turn the access point into a wireless bridge. Wireless clients will not be able to connect to the access point in this mode. Select Wireless >...
D. Management guide 3.3.5 Advanced Select Wireless > Advanced. The following page opens: Figure 3-71: Wireless Advanced Band: Select the band. Channel: Select the channel you want to use from the drop-down list. This field determines which operating frequency will be used. It is not necessary to change the wireless channel unless you notice interference problems with another nearby access point.
Station info RTS Threshold: When set in bytes, specifies the packet size beyond which the WLAN card invokes its RTS/CTS mechanism. Packets that exceed the specified RTS threshold trigger the RTS/CTS mechanism. The NIC transmits smaller packet without using RTS/CTS. The default setting of 2347 (maximum length) disables RTS threshold.
D. Management guide Voice This chapter describes the various options for configuration of the SIP voice service. Session Initiation Protocol (SIP) is a peer-to-peer protocol used for Internet conferencing, telephony, events notification, presence and instant messaging. SIP is designed to address the functions of signalling and session management within a packet telephony network.
Page 67
SIP Basic Settings To view or modify more SIP Basic Settings click Service provider tab. The following page opens: Figure 3-74: SIP basic settings - Service Provider tab Local Selection: Set tone, ring type and physical characteristics for each specific country. ...
D. Management guide Use SIP Registrar: Enable the SIP Registrar by selecting the checkbox and setting registrar parameters. • SIP Registrar: Input IP address or domain name of the registrar server. • SIP Registrar port: The value is set by VoIP provider and is normaly port 5060. ...
Page 69
SIP Advanced Settings For view or modify more SIP Advanced Settings click Service provider tab. The following page opens: Figure 3-76: SIP advanced settings - Service Provider tab Line: Ports TEL1 and TEL2. Call waiting: Select the checkbox to enable this option. ...
D. Management guide DND: Select the checkbox to enable this option. Enable T38 support: Enable or disable T.38 Fax mode support with this checkbox. You can plug a fax machine into either phone port to send or receive faxes. Functionality depends upon FAX support by your VoIP service provider.
Diagnostics For view or modify more SIP Debug Settings click Service provider tab. The following page opens: Figure 3-78: SIP debug settings- Service Provider tab SIP log server IP Address: Input IP address of the SIP log server. SIP log server port: Port number of the SIP log server.
D. Management guide Ethernet Connection • Pass: indicates that the Ethernet interface from your computer is connected to the LAN port of your device. A flashing or solid green LAN LED on the device also signifies that an Ethernet connection is present and that this test is successful.
Update settings 3.6.2 Update settings You can update the current configuration of your device from your saved files. Select Management > Settings > Update. The following page opens: Figure 3-81: Update Settings Settings File Name: Enter the path to the settings file. ...
D. Management guide 3.6.4 System Log You can view and configure the system log options in the System Log page. Select Management > System Log. The following page opens: Figure 3-84: System Log View System Log: Click this button to view the system log. ...
Security Log 3.6.5 Security Log You can view the security log and configure the security log options. Select Management > Security Log. The following page opens: Figure 3-86: Security Log Right-click here to save Security Log to a file: This will save the security log to a file on your PC. ...
D. Management guide ACS URL: URL for the device to connect to ACS. ACS URL from HDCP: ACS URL configuration via DHCP. ACS User Name: User name used to authenticate the device making a connection to ACS. ...
Access Control - Passwords 3.6.8 Access Control - Passwords Select Management > Access Control > Passwords. The following page opens: Figure 3-89: Access Control - Passwords User Name: Enter user name. Old Password: Enter the old password. New Password: Enter the new password.
D. Management guide 3.6.10 Reboot Select Management > Reboot. The following page opens: Figure 3-91: Reboot Reboot: Click this button to reboot the device. Wait for about 2 minutes before attempting to use the device.
Need help?
Do you have a question about the Innbox V50-U and is the answer not in the manual?
Questions and answers