Advertisement

OV804WV
User Manual
1

Advertisement

Table of Contents
loading

Summary of Contents for Ovislink OV804WV

  • Page 1 OV804WV User Manual...
  • Page 2: Table Of Contents

    Error! Use the Home tab to apply 标题 to the text that you want to appear here.Error! Use the Home tab to apply 标题 to the text that you want to appear here. Contents Introduction ................1 Application ............. 1 Features ..............
  • Page 3 4.2.5 Quick Setup Completion ......37 DSL Router Device information ......38 4.3.1 Summary of Device information ....38 4.3.2 WAN Interface Information ......40 4.3.3 Statistics ............40 4.3.4 Route Table Information ....... 46 4.3.5 ARP Table Information ......... 47 4.3.6 DHCP IP Lease Information ......
  • Page 4 4.9.6 Update Software ........221 4.9.7 Save/Reboot ..........221...
  • Page 5: Introduction

    Use the Home tab to apply 标题 to the text that you want to appear here. 1 Introduction The OV804WV (also called the device or the DSL Router hereinafter), a VDSL2 integrated access device (IAD), is an advanced all-in-one gateway. It incorporates VoIP, Ethernet switch, and wireless home networking access point, and complies with IEEE 802.11b/g standards.
  • Page 6: Wireless Specifications

     Several pre-configured popular games. Just enable the game and the port settings are automatically configured.  Configurable as a DHCP server on your network  Compatible with all standard Internet applications  Industry standard and interoperable DSL interface  Support virtual server, IP filter, and DMZ host ...
  • Page 7  802.11.b: Mbps, Mbps, 5.5 Mbps, 11 Mbps Auto-sensing  802.11g: 6 Mbps, 9 Mbps, data rate 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps 1 Mbps DBPSK @ 0.81 Mbps 2 Mbps DQPSK @ 1.58 Mbps 5.5 Mbps CCK @ 4.07 Mbps 6 Mbps...
  • Page 8: Compliance Certificates

    DHCP Support server  Outdoors: 120~400 Radio Cover Rage  Indoors: 35~100 Internal diversity with connector: 2dBi Antenna Type 1.4 Compliance Certificates  FCC Class B  CE Mark 1.5 Standards Compatibility Compliance  RFC 2684 Multiprotocol Encapsulation over Adaptation Layer 5 ...
  • Page 9: Supported Encapsulation

     IEEE 802.11b  IEEE 802.11g  RFC3261 (SIP for VoIP) 1.6 Supported Encapsulation  RFC 1483 bridge  RFC 1483 router  Classical IP over ATM (RFC 1577)  PPP over ATM (RFC 2364)  PPP over Ethernet (RFC 2516) 1.7 Environment Requirements ...
  • Page 10 Item Description computer. If you are setting up the router for multiple virtual connections, you need to configure the VPI and VCI as instructed by your VDSL service provider additional connections. You can change the settings by accessing the WAN menu the Web management interface.
  • Page 11 Item Description the user name previously mentioned, to log in to the network of your VDSL service provider. It is used to verify the identity of your account. LAN IP addresses This is the IP address you enter in the address for the DSL Router field in the Web browser to access the configuration graphical user interface (GUI) of...
  • Page 12: Package List (According To The Actual Package)

    (that computers as DHCP clients.) 1.9 Package List (according to the actual package)  1 x OV804WV  1 x external splitter  1 x power adapter  2 x telephone lines (RJ-11)  1 x Ethernet cable (RJ-45) ...
  • Page 13: Led Status Description

    source exits or high temperature occurs. Avoid the device from direct sunshine.  Do not put this device close to a place where is over damp or watery. Do not spill any fluid on this device.  Do not connect this device to any PC or electronic product, unless our customer engineer or your broadband provider instructs you to do this, because any wrong connection may cause power or fire risk.
  • Page 14: Rear Panel

    Indicator Status Description VoIP phone is not registered. DSL line is connected. Blinks DSL line is transmitting. DSL line is disconnected. Internet Blinks DSL traffic is flowing. USB connection is normal. Blinks USB data is transmitting. USB connection failed. 1.11.2 Rear Panel Interface Description...
  • Page 15: Hardware Installation

    2 Hardware Installation The DSL router has three separate interfaces, an Ethernet LAN, a wireless LAN and a VDSL (WAN) interface. Place the DSL router in a location where it can be connected to various devices as well as to a power source. The router should not be located in places where it is exposed to moisture or excessive heat.
  • Page 16: Connecting The Vdsl Router

    or ceiling can reduce the range of wireless LAN devices by 1~30 meters. Position your wireless devices so that the number of walls or ceilings obstructing the signal path is minimized.  Consider the direct line between access points and workstations: A wall that is 0.5 meters thick, at a 45 degree angle appears to be almost 1 meter thick.
  • Page 17: Factory Reset Button

    card of the PC via an Ethernet cable. Step 3 Plug one end of the power adapter to the wall outlet and connect the other end to the power port of the DSL router. The following figure displays the connection of the DSL router, PC, and telephones.
  • Page 18: Connection

    Error! Use the Home tab to apply 标题 to the text that you want to appear here.Error! Use the Home tab to apply 标题 to the text that you want to appear here. 3 Connection 3.1 About DSL Router DSL router is a scalable suite of software infrastructure and technologies that original equipment manufacturers (OEMs) require in order to bring residential gateways/IADs to market.
  • Page 19: Setup

     DSL router is targeted at the following platforms: DSL Routers, wireless access points and bridge. 3.2 Setup Connecting your computer or home network to the DSL router is a simple procedure, varying slightly depending on the operating system. This chapter guides you to seamlessly integrate DSL router with your computer or home network.
  • Page 20: Pc Network Configuration

    telephone cable. If it has an Ethernet socket for the wide area network (WAN), connect it to the external DSL Router you have, or to the Ethernet socket you might have, by using an Ethernet cable. LAN Connection Your computer can connect to the gateway in various ways (Ethernet, wireless, etc.), each requiring a different physical connection.
  • Page 21 Figure 2 IP and DNS configuration TCP/IP configuration instructions for all supported operating systems are as follows. Windows XP Step 1 Choose Start > Control Panel > Access Network Connections from the desktop. Step 2 Right-click Ethernet Connection icon and choose Properties.
  • Page 22 Connections from the desktop. Step 2 Right-click Ethernet connection icon and choose Properties. Step 3 Select Internet Protocol (TCP/IP) component and click Properties. Step 4 The Internet Protocol (TCP/IP) Properties page appears. Step 5 Select Obtain an IP address automatically radio button.
  • Page 23: Web-Based Management

    Error! Use the Home tab to apply 标题 to the text that you want to appear here.Error! Use the Home tab to apply 标题 to the text that you want to appear here. 4 Web-Based Management This chapter describes how to use Web-based management of the DSL router, which allows you to configure and control all of DSL router features and system parameters in a user-friendly GUI.
  • Page 24: Logging In To The Dsl Router

    Figure 3 Web-based management-home page 4.1 Logging In to the DSL Router 4.1.1 First-Time Login When you log in to the DSL router for the first time, the login wizard appears. Step 1 Open the Web browser on your computer. Step 2 Enter http://192.168.1.1 (default IP address of the DSL router) in the address bar.
  • Page 25: Quick Setup

    Step 3 Enter a user name and the password. The default user name and password of the super user are admin and admin. The user name and password of the common user are user and user. You need not to enter the user name and password again if you select the option Remember my password.
  • Page 26: Wan Interface Setup

    The Quick Setup page mainly includes the following three functions:  WAN interface setup  LAN interface setup  Wireless interface setup Quick setup enables fast and accurate configuration of your Internet connection and other important parameters. The following sections describe these various configuration parameters.
  • Page 27 by ATM PVC. The following introduction guides you through the necessary steps to configure your DSL router. According to your ISP instructions, specify the following parameters:  VPI (Virtual Path Identifier): virtual path between two points in an ATM network. The valid value range is from 0 to 255.
  • Page 28: Encapsulation Mode

    4.2.1.2 Selecting Internet Connection Type and Encapsulation Mode You can select your connection type from the following list. Each connection type corresponds to several encapsulation modes.  PPP over ATM (PPPoA) PPPoA Encapsulation Mode: VC/MUX – LLC/ENCAPSULATION –  PPP over Ethernet (PPPoE) PPPoE Encapsulation Mode: LLC/SNAP-BRIDGING –...
  • Page 29 Figure 6 Internet connection type and encapsulation mode For example, set the connection type of PVC 0/35 to Bridging. Select Bridging, and set Encapsulation Mode to LLC/SNAP-BRIDGING (depending on the uplink equipment). 4.2.1.3 Internet Connection Type-PPP over ATM (PPPoA) Step 1 In the PVC and its QoS Configuration page, configure a PVC and its QoS.
  • Page 30 Figure 7 PPP over ATM (PPPoA) Step 3 Click Next and the PPP Information Configuration page appears. Figure 8 PPP information configuration Your ISP should provide you with the following information:  PPP username  PPP password  Authentication method You can also select another service function as follows:...
  • Page 31  Dial on demand (with idle timeout timer)  PPP IP extension  Use static IP address  Retry PPP password on authentication error  Enable PPP debug mode Step 4 Click Next and the PPPoA IGMP and WAN Function Configuration page appears.
  • Page 32 Figure 10 PPP over Ethernet (PPPoE) Step 3 Click Next and the PPP Information Configuration page appears. Figure 11 PPP information configuration Your ISP should provide you with the following information:  PPP username  PPP password  Authentication method You can also select another service function as follows:...
  • Page 33  Dial on demand (with idle timeout timer)  PPP IP extension  Use static IP address  Retry PPP password on authentication error  Enable PPP debug mode Step 4 Click Next and PPPoE IGMP and WAN Function Configuration page appears. To use IGMP service on PPPoA PVC, select the Enable IGMP Multicast check box.
  • Page 34 Figure 13 MAC encapsulation routing (MER) Step 3 Click Next and the WAN IP Configuration page appears. Figure 14 WAN IP configuration You can select the service function as follows:  Obtain an IP address automatically (use DHCP to obtain WAN IP) ...
  • Page 35 gateway IP)  Use the following default gateway (use static gateway IP)  Obtain DNS server addresses automatically (use DHCP to obtain DNS server IP)  Use the following DNS server addresses (use static DNS server IP) Step 4 Click Next and the MER IGMP and WAN Function Configuration page appears.
  • Page 36 Mode page, set the Connection Type to IP over ATM (IPoA) and select the encapsulation mode. Figure 16 IP over ATM (IPoA) Step 3 Click Next and the WAN IP Configuration page appears. Figure 17 WAN IP configuration You can select the service function as follows: ...
  • Page 37  Use the following DNS server addresses (static DNS server IP) Step 4 Click Next and the IPoA IGMP and WAN Function Configuration page appears. To use IGMP service on IPoA PVC, select the Enable IGMP Multicast check box. In the MER mode, you can configure the following functions: ...
  • Page 38: Lan Interface Setup

    Figure 19 Bridging Step 3 Click Next and the Bridging service Configuration page appears. Figure 20 Bridging service configuration 4.2.2 LAN Interface Setup The LAN interface setup page is as follows.
  • Page 39: Wireless Interface Setup

    Figure 21 LAN interface setup 4.2.3 Wireless Interface Setup Enable Wireless: select or deselect the check box to enable or disable wireless connection. SSID: it is the network name shared among all points in a wireless network. The SSID must be identical for all points in the wireless network.
  • Page 40: Wan Setup Summary

    Figure 22 Wireless setup 4.2.4 WAN Setup Summary In WAN setup summary, you can view the following properties of the added PVC:  PORT/VPI/VCI  Connection Type:  Service Name:  Service Category:  IP Address:  Service State:  ...
  • Page 41: Quick Setup Completion

    minutes to reboot. Figure 24 DSL router reboot 4.2.5 Quick Setup Completion After the previous setup, you can immediately start using your gateway to:  Share a broadband connection among multiple users (HTTP, FTP, Telnet and NetMeeting) and among all of the computers connected to your home network.
  • Page 42: Dsl Router Device Information

    If your gateway is equipped with multiple LAN ports, you can connect additional devices directly to the gateway. Otherwise, connect a hub or switch to the LAN port, to which you can connect additional devices. In both cases, configure newly connected devices to automatically obtain IP address as previously described.
  • Page 43  B0 Line Rate – Upstream(kbps)  B0 Line Rate –Downstream(kbps)  B1 Traffic Type  B1 Line Rate – Upstream(kbps)  B1 Line Rate –Downstream(kbps)  LAN IP address: the management IP address  Default gateway: in the bridging mode, there is no gateway.
  • Page 44: Wan Interface Information

    Figure 26 Summary of device information 4.3.2 WAN Interface Information Click WAN and the following page appears. The WAN Info page displays the status. This page contains the following informations for each WAN connection:  Port/VPI/VCI  VLAN  Connection ID ...
  • Page 45  Statistics of WAN  Statistics of ATM  Statistics of VDSL 4.3.3.1 Statistics of LAN Select Statistics > LAN and the following page appears. You can query information of packets recevied at the Ethernet and wireless interfaces. Click Reset Statistics to restore the values to zero and recount them.
  • Page 46 Figure 28 Statistics of LAN 4.3.3.2 Statistics of WAN Select Statistics > WAN and the following page appears. You can query information of packets recevied at the WAN interfaces. Click Reset Statistics to restore the values to zero and recount them. Information is as follows: ...
  • Page 47 Drops: drop packets of received –  Transmitted Bytes: bytes of transmitted – Pkts: packets of transmitted – Errs: error packets of transmitted – Drops: drop packets of transmitted – Figure 29 Statistics of WAN 4.3.3.3 Statistics of ATM Select Statistics > ATM and the following page appears. You can query information of packets recevied at the ATM interfaces.
  • Page 48 Figure 30 Statistics of ATM 4.3.3.4 Statistics of VDSL Select Statistics > VDSL and the following page appears. If the DSL line is activated, the following page appears.
  • Page 49 Figure 31 Statistics of VDSL You can view the following information of the VDSL line:  Mode: T1.413, VDSL 2.  Status: Link Down, No Defect, Training  Rate (Kbps): B0, B1 Upstream Line Rate, Downstream...
  • Page 50: Route Table Information

    Line Rate. Click Close at the bottom to restore the values to zero and recount them. 4.3.4 Route Table Information Click Route and the following page appears. You can view the following information of each route in the route table: ...
  • Page 51: Arp Table Information

    Figure 32 Route table 4.3.5 ARP Table Information Click ARP and the following page appears. You can query the MAC and IP address information of the equipment attached to the DSL Router and the information includes the following:  IP address ...
  • Page 52: Advanced Setup

    the MAC Address Figure 34 DHCP leases list 4.4 Advanced Setup Click Advanced Setup and the Advanced system setup page appears. The information is as follows:  WAN: wide area network interface  LAN: local area network interface  NAT: network address translation ...
  • Page 53: Wan Configuration

    Figure 35 Advance setup menu 4.4.1 WAN Configuration Select Advanced Setup > WAN and two circumstances may occur. In this page, you can perform the following operations:   Edit  Remove  Save/Reboot Figure 36 WAN configuration Click Add. The configure page displayed contains the following information: ...
  • Page 54 PPP IP extension –  Add PPPoA PVC  Add MER PVC  Add Bridge PVC  Add IPoA PVC Figure 37 PVC and its QoS configuration This page is the same as the Quick Setup page. For configuration of the PVC and its QoS, refer to the configuration in Quick Setup page.
  • Page 55 Step 2 To add an ATM PVC, click Add. Step 3 To delete a PVC, select the Remove check box in the table and click Remove. Step 4 Click Save/Reboot to apply the changes and reboot the DSL Router. Note: After a PVC is deleted or modified, the system must be rebooted.
  • Page 56  VLAN Mux: Config VlanID over a single pvc  Service Category: UBR Without PCR, UBR With PCR, CBR, Non Realtime VBR and Realtime VBR.  Enable Quality Of Service: enable or disable QoS. In this example, PVC 8/35 is to be modified and the default values of service category and QoS remain.
  • Page 57 Figure 41 PPP over Ethernet (PPPoE) Click Next and the following page appears. Step 3 In this page, you can modify the PPP user name, PPP password, and authentication method.
  • Page 58 Figure 42 PPP information and other functions PPP Username: the correct user name that your ISP provides to you. PPP Password: the correct password that your ISP provides to you. PPPoE Service Name: if your ISP provides it to you, please enter it.
  • Page 59 preset minutes, if the DSL Router does not detect the flow of the user continuously, the DSL Router automatically stops the PPPoE connection. Once it detects the flow (like access to a Web page), the DSL Router restarts the PPPoE dial-up. If this function is disabled, the DSL Router performs PPPoE dial-up all the time.
  • Page 60 Figure 43 PPPoE IGMP and WAN service IGMP Multicast: IGMP proxy. For example, if you wish that the PPPoE mode supports IPTV, enable this function. WAN Service: enable it unless you do not want to active the PVC. Click Next and the following page appears. This page shows all the configuration.
  • Page 61 Figure 44 PPPoE setup summary To save the settings, click Save. To make any modifications, click Back. After you click Save, the following page appears. Note: You need to reboot the DSL Router to activate this WAN interface and further configure services in this interface.
  • Page 62 Figure 45 PPPoE setup-completed 4.4.1.2 PPPoE PVC Network Application Description In this example, the DSL Router is connected to the DSLAM through PVC 8/35 and the access mode is the built-in PPPoE+NAT. The encapsulation of the BRAS downlink port is PPP over Ethernet, the authentication is AUTO, the IP address is 136.1.1.1, the IP pool is 136.1.1.*, and the IP address of uplink port is 10.61.92.157.
  • Page 63 Setting Procedure Step 1 Open the Internet browser and enter 192.168.1.1 in the address bar to log in to the DSL Router. Step 2 Choose Advanced Setup > WAN and click Add. Step 3 In the page, set VPI/VCI to 8/35 ATM PVC Configuration and click Next.
  • Page 64 4.4.1.3 PPPoE PVC IP Extension Mode Description In this example, the DSL Router is connected to the DSLAM through PVC 8/35; the PPPoE is located between the WAN interface of the DSL Router and BRAS. The encapsulation of the downlink interface of BRAS is PPP over Ethernet, the authentication is AUTO, the IP address is 10.28.106.200, the IP pool is 10.28.106.*, and the IP address of the uplink interface is 10.61.92.157.
  • Page 65 Step 3 In the ATM PVC Configuration page, set VPI/VCI to 8/35 and click Next. Step 4 In the Connection Type page, select PPP over Ethernet (PPPoE) and set the Encapsulation Mode to LLC/SNAP-BRIDGING, and then click Next. Step 5 In the PPP User name and Password page, enter the user name and password provided by your ISP.
  • Page 66 Figure 46 PVC and its QoS configuration VPI (Virtual Path Identifier): virtual path between two points in an ATM network. Its valid value range is from 0 to 255. VCI (Virtual Channel Identifier): virtual channel between two points in an ATM network. Its valid value range is from 32 to 65535 (1 to 31 are reserved for known protocols).
  • Page 67 Figure 47 Internet connection type and encapsulation mode Change the connection type of PVC 1/35 to PPP over ATM (PPPoA) and set the Encapsulation Mode to VC/MUX (according to the uplink equipment). Figure 48 PPP over ATM (PPPoA) Click Next and the following page appears. In this page, you can modify the information including PPP user name, PPP password, and authentication method.
  • Page 68 Figure 49 PPP information and other functions PPP Username: the correct user name that your ISP provides to you. PPP Password: the correct password that your ISP provides to you. Authentication Method: the value can be AUTO, PAP, CHAP, or MSCHAP. Usually, you can select AUTO. Dial on demand (with idle timeout timer): if this function is enabled, you need to enter the idle timeout time.
  • Page 69 Router (at this time, the DSL Router connects to only one PC). From the aspect of the PC user, the PC dials up to obtain an IP addres. But actually, the dial-up is done by the DSL Router. If this function is disabled, the DSL Router itself obtains the WAN IP address.
  • Page 70 Figure 51 PPPoA setup summary To save the settings, click Save. To make any modifications, click Back. After you click Save, the following page appears. Note: You need to reboot the DSL Router to activate this WAN interface and further configure services in this interface.
  • Page 71 Figure 52 PPPoA setup-completed 4.4.1.5 PPPoA PVC Network Application Description In this example, the DSL Router is connected to the DSLAM through PVC 1/35 and the access mode is the built-in PPPoA+NAT. The encapsulation of the BRAS downlink port is PPP over ATM, the authentication is AUTO, the IP address is 10.28.106.200, the IP pool is 10.28.106.*, and the IP address of uplink port is 10.61.92.157.
  • Page 72 Setting Procedure Step 1 Open the Internet browser and enter 192.168.1.1 in the address bar to log in to the DSL Router. Step 2 Select Advanced Setup > WAN and click Add. Step 3 In the page, set VPI/VCI to 1/35 ATM PVC Configuration and click Next.
  • Page 73 Figure 53 PVC and its QoS configuration In this page, you can modify VPI/VCI, service category and QoS. VPI (Virtual Path Identifier): the virtual path between two points in an ATM network, and its valid value is from 0 to 255. VCI (Virtual Channel Identifier): virtual channel between two points in an ATM network.
  • Page 74 Figure 54 Internet connection type and encapsulation mode Change the connection type of PVC 2/35 to MAC Encapsulation Routing (MER) and set the Encapsulation Mode to LLC/SNAP-BRIDGING (according to the uplink equipment). Figure 55 MAC encapsulation routing (MER) Click Next and the following page appears. In this page, you can modify the WAN IP address, default gateway, and DNS server settings.
  • Page 75 Figure 56 MER WAN IP configuration Obtain an IP address automatically: the DSL Router obtains a (WAN) IP address automatically and at this time it enables DHCP client functions. The WAN IP address is obtained from the uplink equipment like BAS, and the uplink equipment is required to enable the DHCP server functions.
  • Page 76 Use WAN Interface: as to BAS equipment, it is the IP address of the downlink interface. Obtain DNS server address automatically: to obtain the IP address of the DNS server assigned by the uplink equipment such as BAS. Use the following DNS server addresses: If you want to manually enter the IP address of the DNS server, select this check box and enter the information in the fields.
  • Page 77 Enable Firewall: enable or disable IP filtering. IGMP Multicast: IGMP proxy. If you wish that the MER mode supports IPTV, enable this function. WAN Service: enable it, unless you do not want to activate the PVC. Click Next and the following page appears. This page shows all the configuration.
  • Page 78 Figure 59 MER setup completed 4.4.1.7 MER PVC Network Application Description In this example, the DSL Router is connected to the DSLAM through PVC 2/35 and the access mode is the MER+NAT. The downlink interface of BRAS is encapsulated in 1483B, the IP address is 10.28.108.1 and the DHCP server is enabled, the address pool is 10.28.108.* (2~254), and the IP address of the uplink interface is 10.61.92.157.
  • Page 79 public address 10.28.108.* (2~254) dynamically assigned by BRAS for accessing ISP. The IP address of the PC can be fixed (as in this example) or assigned through DHCP server of the DSL Router. If it is assigned by the DHCP server, the DHCP functions of the DSL Router must be enabled.
  • Page 80 If Enable NAT is disabled during the configuration, you must configure the route on the BRAS. Otherwise, you cannot access your ISP. In actual application, Enable NAT check box must be selected. 4.4.1.8 Adding an IPoA PVC This section describes the procedure for adding PVC 3/35 (IPoA mode).
  • Page 81 In this example, PVC 8/35 is to be modified and the default values of service category and QoS remain. In actual applications, you can modify them as required. After proper modifications, click Next and the following page appears. In this page, you can modify the Internet connection type and encapsulation mode.
  • Page 82 Figure 62 IP over ATM (IPoA) Click Next and the following page appears. In this page, you can modify the WAN IP, default gateway, and DNS server settings. Figure 63 IPoA WAN IP setting WAN IP Address: enter the IP address of the WAN interface provided by your ISP.
  • Page 83 Use the following DNS server addesses: if you want to manually enter the IP address of the DNS server, select this check box and enter the information in the fields. Primary DNS server: enter the IP address of the primary DNS server.
  • Page 84 Click Next and the following page appears. This page shows all the configuration. Figure 65 IPoA setup summary To save the settings, click Save. To make any modifications, click Back. After you click Save, the following page appears. Note: You need to reboot to the DSL Router to activate this WAN interface and further configure services in this interface.
  • Page 85 4.4.1.9 IPoA PVC Network Application Description In this example, the DSL Router is connected to the DSLAM through PVC 3/35 and the access mode is the IPoA+NAT. The downlink interface of BRAS is encapsulated in 1483R, the IP address is 20.1.1.1, the IP address of the uplink interface is 10.61.92.157, and the WAN IP address of the DSL Router is assigned as 20.1.1.2.
  • Page 86 Step 3 In the ATM PVC Configuration page, set VPI/VCI to 3/35 and click Next. Step 4 In the Connection Type page, select IP over ATM (IPoA) Encapsulation Mode LLC/SNAP-ROUTING, and then click Next. Step 5 In the WAN Settings page, enter the IP address, subnet mask, and DNS server address provided by your ISP.
  • Page 87 Figure 67 PVC and its QoS configuration In this page, you can modify VPI/VCIs, service categories, and QoS. VPI (Virtual Path Identifier): Virtual path between two points in an ATM network. Its valid value range is from 0 to 255. VCI (Virtual Channel Identifier): Virtual channel between two points in an ATM network.
  • Page 88 Figure 68 Bridge Internet connection type and encapsulation mode Click Next and the following page appears. In this page, you can modify the service name. Figure 69 Bridge service Bridge Service: enable it, unless you do not want to activate the PVC.
  • Page 89 Figure 70 Bridge setup summary To save the settings, click Save. To make any modifications, click Back. After you click Save, the following page appears. Figure 71 Bridge setup-completed Note: You need to reboot the DSL Router to activate this WAN interface and further configure services in this interface.
  • Page 90 4.4.1.11 Bridge PVC Network Application Description In this example, the DSL Router is connected to the DSLAM through PVC 4/35 and the access mode is pure Bridging. The uplink interface of BRAS is encapsulated as 1483B, the IP address is 10.28.108.1, and the IP address of the uplink interface is 10.61.92.157.
  • Page 91: Lan Configuration

    settings are consistent with the data provided by your ISP. Then, click Save. Step 7 Click Save/Reboot to apply the changes and reboot the DSL Router. You can also modify the PVC4/35. Modify the LAN IP address and DHCP server information in LAN of Advanced Setup. Note: In the pure bridging mode, there is no interface at the WAN side of the DSL Router.
  • Page 92 Figure 72 LAN configuration setup 4.4.2.1 Defining the Private IP Address for the DSL Router In this page, you can change the IP address of the device. The preset IP address is 192.168.1.1. This is the private IP address of the DSL router, under which the device can be reached in the local network.
  • Page 93 Windows XP or Windows ME. Please refer to the User Guide of your PC. After you install UPnP in the operating system of a PC and activate it in the router, applications on this PC (e.g. Microsoft Messenger) can communicate via the Internet without authorization.
  • Page 94 Figure 73 Disabling IGMP snooping Figure 74 Enabling IGMP snooping Internet Group Management Protocol IGMP is an Internet protocol that enables an Internet computer to inform neighboring routers that it is a member of a multicast group. With multicasting, a computer can send content on the Internet to several other computers that have registered an interest in the content of the first computer.
  • Page 95: Configuring The Dhcp Server

    Note: If IGMP snooping function is enabled, the DSL router capability improves. 4.4.2.4 Configuring the DHCP Server Figure 75 DHCP server The DSL router has a DHCP server for which the factory setting is active. Consequently, the IP addresses of the PCs are automatically assigned by the DSL router.
  • Page 96 Note:  If the DHCP server for the DSL router is enabled, you can configure the network settings on the PC so that the option Obtain an IP address automatically is set up.  If you disenable the DHCP server, you need to assign a static IP address for the PCs that use the network settings.
  • Page 97: Nat

    4.4.2.5 Configuring the Second IP Address and Subnet Mask for LAN Interface Figure 76 Second IP address 4.4.3 NAT 4.4.3.1 Overview Setting up the NAT Function  The DSL router is equipped with the network address translation (NAT) function. With address mapping, several users in the local network can access the Internet via one or more public IP addresses.
  • Page 98 explicitly requested by one of the PCs in the network. Most Internet applications can run behind the NAT firewall without any problems. For example, if you request Internet pages or send and receive e-mails, the request for data from the Internet comes from a PC in the local network, and so the router allows the data to pass through.
  • Page 99 the port number and protocol. If it identifies a match of port and protocol for a defined trigger port, then it opens the assigned public ports and notes the IP address of the PC that sent the data. If data comes back from the Internet via one of these public ports, the router allows it to pass through and directs it to the appropriate PC.
  • Page 100 However, you may want to expose your network to the Internet in limited and controlled ways in order to enable some applications to work from the LAN (for example, game, voice, and chat applications) and to enable Internet access to servers in the home network.
  • Page 101 IP addresses pool. Then, you can define FTP to use address X to reach computer A and address Y to reach computer B. Additionally, port forwarding enables you to redirect traffic to a different port instead of the one to which it was designated. For example, if you have a Web server running on your PC on port 8080 and you want to grant access to this server to any one who accesses DSL router via HTTP.
  • Page 102 Figure 77 Virtual servers Adding Port Forwarding Step 1 To set up virtual servers for a service, select Advanced Setup > NAT > Virtual Servers, and click Add.
  • Page 103 Figure 78 Adding virtual servers Step 2 Select a service or enter a custom server. Step 3 Set Server IP Address. Step 4 Enter the server IP address of the computer that provides the service (the server in the local host field). Note that unless an additional external IP address is added, only one LAN computer can be assigned to provide a specific service or application.
  • Page 104: Port Triggering

    If the application you require is not in the list, manually enter the information. Select the protocol for the service you are providing from the Protocol drop-down list. Under External Port, enter the port number of the service you are providing. In the Internal Port field, enter the internal port number, to which service requests are to be forwarded.
  • Page 105 Figure 79 Port triggering Step 2 Select the required application from the Select an application drop-down list, or manually enter the information in the Custom application field.  Trigger Port Start and Trigger Port End: enter the port that is to be monitored for outgoing data traffic. ...
  • Page 106: Dmz Host

    4.4.3.4 DMZ Host Figure 80 DMZ host The demilitarized military zone (DMZ) host feature allows one local computer to be exposed to the Internet. This function is applicable for:  Users who want to use a special-purpose Internet service, such as an on-line game or video conferencing program, that is not presented in the port forwarding list and for which no port range information is available.
  • Page 107 and protect it if necessary. You can set up a client in your local network as a so-called DMZ host. Your device then forwards all incoming data traffic from the Internet to this client. You can, for example, operate your own Web server on one of the clients in your local network and make it accessible to Internet users.
  • Page 108: Security

    Removing a DMZ host Step 1 Clear the DMZ Host Address. Step 2 Click Save/Apply to apply the settings. 4.4.4 Security Security is an important function of DSL. It protects resources of a private network from users from other networks, and prevents unauthorized Internet users from accessing private networks connected to the Internet.
  • Page 109 Note: The security is like a firewall. Figure 82 Security application Choose Security > IP Filtering and the following interface appears. By default, the firewall is enabled. The firewall is used to block document transmissions between the Internet and your PC. It serves as a safety guard and permits only authorized documents to be sent to the LAN.
  • Page 110 Figure 83 Outgoing IP filtering setup overview 4.4.4.1 Outgoing IP Filtering Setup When setup of outgoing IP filtering rules is enabled on the DSL Router, various security functions for the local network are enabled at the same time. You can protect the network against hacker attacks and block access of individual PC to selected services or Internet websites.
  • Page 111 Figure 85 Adding outgoing IP filtering  Filter Name: enter the name of outgoing filter rule.  Protocol: select one from TCP/UDP, TCP, UDP or ICMP protocols.  Source IP address: enter an IP address. After you set the IP address, outgoing packets (protocol selected packets) are blocked.
  • Page 112 Figure 86 Outgoing IP filer application Request  I need to block PC1 whose IP address is 192.168.1.12. All outgoing UDP/TCP packet from that PC1 (192.168.1.12) is not allowed.  Allow all outgoing traffic packet from PC2 (192.168.1.11). Configuration Step 1 By default, all outgoing IP traffic from LAN is allowed. Hence, all outgoing IP packets to PC2 are allowed.
  • Page 113 Figure 87 Outgoing IP filtering adding setup example Step 3 Click Save/Apply, and the following page appears. Figure 88 Outgoing IP filtering configuration-completed 4.4.4.2 Incoming IP Filtering Setup The incoming IP filter is used to block and permit IP packet transmisstion from Internet.
  • Page 114 In this page, you can create a filter rule to identify incoming IP traffic by specifying a new filter name and at least one condition. All specified conditions in the filter rule must comply with the rule to take effect. Click Save/Apply to save and activate the filter.
  • Page 115  Destination Port: UPD/TCP destination port or a range of ports.  DSCP Mark  WAN Interfaces: you can select WAN interfaces and PVC. The following is an example of configuring the incoming IP filtering: Figure 91 Incoming IP filter application Request ...
  • Page 116: Mac Filtering Setup

    Figure 92 Incoming IP filtering adding setup example Step 3 Click Save/Apply, and the following page appears. Figure 93 Incoming IP filtering configuration-completed 4.4.4.3 MAC Filtering Setup In some cases, you may want to manage Layer 2 MAC address to block or permit a computer within the home network. When you enable MAC filter rules, the DSL Router serves as a firewall that works at layer 2.
  • Page 117 Note: MAC filtering is only effective on ATM PVCs configured in bridge mode. If the ATM PVCs is configured in other routing modes (such as PPPoE mode), the MAC Filtering Setup page does not appear in the Security option. FORWARDED means that all MAC layer frames are forwarded except those matching with any of the specified rules in the following table.
  • Page 118 Figure 96 MAC filtering adding configuration Protocol Type: select one from PPPoE, IPV4, IPV6, AppleTalk, IPX, NETBEUI or ICMP protocols.  Destination MAC Address  Source MAC Address  Frame Direction: direction of transmit frame. You can select LAN > WAN (from LAN to WAN), WAN > LAN (from WAN to LAN), or LAN ...
  • Page 119 Figure 97 Adding MAC filtering-configuration Click Save/Apply and the following page appears. Figure 98 Adding MAC filtering-completed MAC Filtering-Global Policy Blocked This section describes how to permit the PC who has the 00:13:20:9E:0F:10 MAC address transmitting PPPoE frame to Internet. Click Add to configure in the following page.
  • Page 120: Quality Of Service

    Figure 99 Adding MAC filtering (Blocked)-configuration Click Save/Apply, and the following page appears. Figure 100 Adding MAC filtering (Blocked)-completed 4.4.5 Quality of Service Many communication and multimedia applications require large, high-speed bandwidths to transfer data between the local network and the internet. However, for many applications there is often only one internet connection available with limited capacity.
  • Page 121 Click Quality of Service and the following page appears. Under Quality of Service, there are two network share modes: Queue Config and QoS Classification. Network QoS is an industry-wide set of standards and mechanisms for ensuring high-quality performance for critical applications.
  • Page 122 Select Advanced Setup > Quality of Service and the following page appears. Figure 102 QOS queue management configuration Select Enable QoS to enable QoS and set the default DSCP mark. Click Save/Apply to activate QoS. 4.4.5.2 QoS-Queue Configuration The queuing in packet QoS becomes effective only when packet is forwarded to QoS-enabled PVC.
  • Page 123 Figure 103 QoS queue configuration overview Note: Lower integer values for precedence imply higher priority for this queue relative to others. For example, add a QoS queue entry and allocate it to a specific network interface (PVC 0/0/35). Set integer values for queue precedence to 1.
  • Page 124 Figure 104 QoS queue configuration  Queue Configuration Status: set to enable or disable a QoS queue.  Queue: select a specific network interface. When you have already selected a network interface, the specific network interface selected automatically allocates to the queue.
  • Page 125 Figure 106 QoS queue configuration-completed To delete a certain queue, disable it, select it, and then click Remove. After the queue is configured, you can create several traffic class rules to classify the upstream traffic. WRR (Weighted Round Robin): this is another QoS method. If you want to set WRR, you must disable the Strict-Priority Queue (PQ).
  • Page 126 Figure 107 WRR configuration After proper modifications, click Save/Apply and the following page appears. Figure 108 WRR configuration-completed The weighted round robin (WRR) queue schedule divides each port into several output queues. Queues are scheduled in turn...
  • Page 127 to ensure that each queue obtains a certain service time. WRR configures a weighted value (w3, w2, w1 and w0) for each queue. The weighted value represents the proportion of the obtained resources. For example, the weighted value of WRR queue schedule algorithm of a 100M port is configured as 50, 30, 10 and 10 (corresponding to w3, w2, w1 and w0), so that the queue with minimum priority obtains a bandwidth of at least...
  • Page 128 Click QoS Classification and the following page appears. In this page, you can configure network traffic classes. Figure 109 QoS classification configuration overview Step 4 Click Add and the following page appears.
  • Page 129 Figure 110 QoS classification configuration  Traffic Class Name: Enter a name of the class.  Rule Order: Select order for queue.  Rule Status: Enable or disable this traffic class rule.  Assign Classification Queue: Select a classification queue. ...
  • Page 130  Physical LAN Port: Select one among USB port, Ethernet ports and wireless port.  Protocol: Select one among TCP/UDP TCP UDP or ICMP protocols.  Source IP Address  Source subnet mask  UPD/TCP Source Port  Destination IP Address ...
  • Page 131 network routers to appropriately classify packets and to apply particular queue handing or scheduling behavior. Layer 3 IPV4 packet Versio prot ocol n/lengt S (1 TOS filed-IP priority (TOS front 3 bit) or DSCP (front 6 bit) IP priority Undefined DSCP Flow control For example, mark each transmitted ICMP packet which...
  • Page 132 Figure 112 QoS classification configuration-completed Click Save/Apply. This configuration takes effective at once. QoS-802.1p Setting The IEEE 802.1p priority marking method is a standard for prioritizing network traffic at the data link/Mac sub-layer 802.1p traffic is simply classified and sent to the destination, with no bandwidth reservations established.
  • Page 133: Routing

    Figure 113 QoS 802.1p setting After proper modifications, click Save/Apply to show the following interface. Figure 114 QoS 802.1p setting completed Click Save/Apply. This configuration takes effective at once. 4.4.6 Routing 4.4.6.1 Routing–Default Gateway In this interface, you can modify the default gateway settings.
  • Page 134 If the Enable Automatic Assigned Default Gateway check box is selected, this router accepts the first received default gateway assignment from one of the PPPoA, PPPoE or MER/DHCP enabled PVC(s). If the check box is not selected, enter the static default gateway and/or a WAN interface. Click Save/Apply to save it.
  • Page 135: Static Routes

    4.4.6.2 Static Routes Networking devices forward packets using route information that is either manually configured or dynamically learned using a routing protocol. Static routes are manually configured and define an explicit path between two networking devices. Unlike a dynamic routing protocol, static routes are not automatically updated and must be manually reconfigured if the network topology changes.
  • Page 136 Figure 116 Adding static routes-configuration Adding Static Route Step 1 Enter destination network address. Step 2 Enter subnet mask. Step 3 Enable Use Gateway IP Address and enter IP address. Step 4 Select use interface. Step 5 Click Save/Apply to apply the settings. Removing Static Route Select Remove in the table, and click Remove to apply the settings.
  • Page 137 distance vectors to mathematically compare routes to identify the best path to any given destination address. These algorithms emerged from academic research that dates back to 1957. Today's open standard version of RIP, sometimes referred to as IP RIP, is formally defined in two documents: Request for Comments (RFC) 1058 and Internet Standard (STD) 56.
  • Page 138: Dns

    RIP uses a single routing metric (hop count) to measure the distance between the source and a destination network. Each hop in a path from source to destination is assigned a hop count value, which is typically 1. When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table.
  • Page 139: Dns Server

    Because domain names are alphabetic, they' are easier to remember. The Internet however, is really based on IP addresses. Every time when you use a domain name, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.
  • Page 140: Port Mapping

    Figure 119 DNS Server Add Configuration Click Save to save the new configuration. NOTE: You must reboot the router to make the new configuration effective. 4.4.8 Port Mapping Port Mapping supports multiple ports to PVC and bridging groups. Each group serves as an independent network. To support this feature, you must create mapping groups with appropriate LAN and WAN interfaces using the Add button.
  • Page 141 Deselecting the Enable virtual ports check box disables the system capability to recognize individual Ethernet port within the Ethernet switch. The Web UI displays two Ethernet ports, ENET (1-3) and ENET4. The ENET (1-3) represents the Ethernet MAC MII port. The ENET4 represents the BCM634x Ethernet MAC/PHY MDI port.
  • Page 142 Figure 120 Port mapping configuration Step 1 Enter the group name and select interfaces from the available interface list and add it to the grouped interface list using the arrow buttons to create the required mapping of the ports. The group name must be unique.
  • Page 143 request with the specified vendor ID (DHCP option 60) is denied an IP address from the local DHCP server. Note: These clients may obtain public IP addresses. Step 3 Click Save/Apply to apply the changes immediately. Note: The selected interfaces are removed from their existing groups and added to the new group.
  • Page 144 Figure 121 Editing port mapping To edit port mapping configuration, do as follows: Step 1 To add interfaces to the grouped list, select the interfaces from available interface list. Step 2 Use the left arrow button to move the selected interfaces to the grouped list.
  • Page 145: Certificate

    Step 4 To automatically add LAN clients to the specified group PVC, edit the list. Note: If you add the DHCP vendor ID (option 60) string, the clients automatically deny an IP address by the local DHCP server and may obtain public IP address. Step 5 Click Save/Apply to apply the changes immediately.
  • Page 146  Create a new certificate request, have it signed by a certificate authority and load the signed certificate.  Import an existing signed certificate directly. 4.4.9.1 Creating a Local Certificate  Certificate name: creates an SSL certificate in the specified certificate repository (administrator's or domain's repository) by using a private key file and a corresponding certificate file.
  • Page 147 Figure 123 Creating new certificate request Step 2 Wait several seconds and the generated certificate request appears. Figure 124 Generated certificate request The certificate request needs to be submitted to a certificate authority, which would sign the request. Then the signed certificate needs to be loaded into DSL Router.
  • Page 148 4.4.9.2 Importing an Existing Local Certificate To import existing certificate, click Import Certificate and paste both certificate and corresponding private key: Figure 125 Import certificate 4.4.9.3 Trusted CA Certificates Choose Certificate > Trusted CA and the following page appears. CA certificates are used to verify peers' certificates. A maximum of 4 certificates can be stored.
  • Page 149: Wireless

    Figure 126 Trusted CA certificates Click Import Certificate. CA certificate can only be imported. The page for importing is shown below: Figure 127 Importing CA certificate 4.5 Wireless...
  • Page 150: Overview

    4.5.1 Overview 4.5.1.1 What is wireless network There are two types of wireless network setup: Client Mode (infrastructure) and Ad Hoc Mode (peer-to-peer). Client mode is an 802.11 networking framework, in which devices communicate with each other by first going through a wireless router or access point.
  • Page 151: Wireless Lan Basics

    IEEE 802.11b, which means 802.11b and 802.11g devices can coexist in the same wireless network. The wireless distribution system (WDS) on your OV804WV allows you to extend the range of your wireless network. To be able to use WDS, you need to introduce an additional WDS-enabled access point into your wireless network.
  • Page 152 any wireless access point. If you are not familiar with wireless networks please take a few minutes to learn the basics. 4.5.2.1 Basic terms Before introducing the terms, let us see a typical wireless network topology. Figure 130 Typical wireless network topology In the graphic, few terms should be understood.
  • Page 153 SSID after a negotiation process takes place. By default the OV804WV broadcasts its SSID so that any wireless station in range can learn the SSID and ask permission to associate with it. Many wireless adapters are able to survey or scan the wireless environment for access points.
  • Page 154 compatible with 802.11b, meaning that 802.11g access points work with 802.11b wireless network adapters and vice versa. While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because 802.11b gained in popularity much faster than did 802.11a, some folks believe that 802.11a was created after 802.11b.
  • Page 155 Data Modulation Pros/Cons & Standard Security Rate Scheme More Info band channels. Less potential for RF interference than 802.11b 802.11g. Better than 802.11b at supporting multimedia voice, video large-image applications densely populated user environments. Relatively shorter range than 802.11b. interoperable with 802.11b.
  • Page 156 Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead causes lower actual data throughput rate. 4.5.2.3 Wireless Security Various security options are available on the OV804WV including open, WEP, 802.1x, WPA, WPA-PSK, WPA2 and...
  • Page 157 WPA2-PSK. In the following, some authentications are introduced. WEP is short for wired equivalent privacy (or wireless encryption protocol), WEP is part of the IEEE 802.11 wireless networking standard and was designed to provide the same level of security as that of a wired LAN. Because wireless networks broadcast messages using radio, they are susceptible to eavesdropping.
  • Page 158 based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. To encrypt a network with WPA Personal/PSK you provide your router not with an encryption key, but rather with a plain-English passphrase between 8 and 63 characters long.
  • Page 159 authenticate the user and then returns an accept or reject message back to the access point. Assuming an accept was received, the access point changes the client's state to authorized and normal traffic can now take place. The authentication server may use the remote authentication dial-in user service (RADIUS), although 802.1X does not specify it.
  • Page 160 passphrase because the keys are randomly generated. No predictable passphrases or long sequences of hexadecimal to enter Information and network credentials are securely exchanged over the air using the extensible authentication protocol (EAP), one of the authentication protocols used in WPA2. ...
  • Page 161 Radio channels The 802.11g standard allows several WLAN networks using different radio channels to be co-located. The OV804WV supports multiple radio channels and is able to select the best radio channel at each startup. You can choose to set the channels automatically or manually.
  • Page 162 It is recommended to keep at least 3 channels between 2 different access points. The OV804WV supports all channels allowed for wireless networking. However, depending on local regulations, the number of channels actually allowed to be used may be additionally restricted, as shown in the table below.
  • Page 163 interface, hide the network from active scans, set the wireless network name (also known as SSID) and restrict the channel set based on country requirements. Following is a description of the different options:  Enable Wireless: if you want to make wireless be available, you have to check this box first.
  • Page 164 make Guest/Virtual network function be available, you have to check those boxes in the table below. In the current software version, three virtual access points can be configured. Figure 131 Wireless-Basic Click Save/Apply to save the basic wireless options and make the change take effect.
  • Page 165 This device is equipped with 802.1X and Wi-Fi protected access (WPA/WPA2), the latest security standard. It also supports the legacy security standard, wired equivalent privacy (WEP). By default, wireless security is disabled and authentication is open. Before enabling the security, consider your network size, complexity, and existing authentication infrastructure and then determine which solution applies to it.
  • Page 166 WEP Encryption: Enable WEP encryption. – Encryption Strength: Set the desired data security – level as 64-bit. Current Network Key: Select one of network keys – that you set in the Key fields as default one. Network Key 1 to 4: Enter 5 ASCII characters or 10 –...
  • Page 167 Click Save/Apply to save the wireless security options and make the changes take effect. Figure 134 Wireless-security (128-bit WEP) Before introducing the following authentications, you need to understand the radius server. RADIUS server is short for a remote authentication dial-in user service server, which is most commonly a third party server, used for authentication of wireless clients who wish to connect to an access point.
  • Page 168 Figure 135 Adopting radius server authentication topology  802.1x Authentication Network Authentication: Set the authentication – mode for the selected wireless LAN of SSID to 802.1x. Radius Server IP Adress: Enter the IP Address of – the authentication server. Radius Port: Enter the port number of the –...
  • Page 169 Figure 136 Wireless-security(802.1x authentication)  WPA Authentication Network Authentication: Set the authentication – mode for the selected wireless LAN of SSID to WPA. WPA Group Rekey Interval: Specify the timer the – WPA key must change. If the value is set to 0, there is no need to change.
  • Page 170 Figure 137 Wireless-security (WPA authentication)  WPA2 Authentication Network Authentication: Set the authentication – mode for the selected wireless LAN of SSID to WPA2. WPA2 Preauthentication: Select Enable – Disenable. Network Re-auth Interval: Specify the timer of – re-authentication between the server and the client. WPA Group Rekey Interval: Specify the timer the –...
  • Page 171 according to wireless clients. Click Save/Apply to save the wireless security options and make the changes take effect. Figure 138 Wireless-security (WPA2 authentication)  Mixed WPA2/WPA Authentication: this authentication mode means AP auto adjust to use WPA2 or WPA according to wireless clients. Network Authentication: Set the authentication –...
  • Page 172 Radius Key: enter the same key as the Radius – server’s. WPA Encryption: select TKIP, AES or TKIP + AES. – The AES is default. The TKIP + AES encryption mode means AP auto adjust to use TKIP or AES according to wireless clients.
  • Page 173 WPA key must change. If the value is set to 0, there is no need to change. The change is done automatically between the server and the client. WPA Encryption: select TKIP, AES or TKIP + AES. – The TKIP is default. The TKIP + AES encryption mode means AP auto adjust to use TKIP or AES according to wireless clients.
  • Page 174 WPA Group Rekey Interval: specifies the timer the – WPA key must change. If the value is set to 0, there is no need to change. The change is done automatically between the server and the client. WPA Encryption: select TKIP, AES or TKIP + AES. –...
  • Page 175 ASCII Hexadecimal WPA Group Rekey Interval: Specify the timer the – WPA key must change. If the value is set to 0, there is no need to change. The change is done automatically between the server and the client. WPA Encryption: Select TKIP, AES or TKIP + AES. –...
  • Page 176 WPA. Client stations must use the same key in order to connect with this device. Check the table below for instructions when entering the key. Format Minimum characters Maximum Characters ASCII Hexadecimal WPA2 Preauthentication: Select Enable – Disenable. Network Re-auth Interval: Specify the timer of –...
  • Page 177 Figure 143 Wireless-security (mixed WPA2/WPA authentication)  WPS Authentication: there are 2 primary methods used in the Wi-Fi protected setup: PIN entry: a mandatory method of setup for all WPS – certified devices. Push button configuration (PBC): an actual push –...
  • Page 178  MAC Restrict Mode: The function can be enabled or disabled, Check Disabled to disable this function. Vice versa, to enable the function. After enabling the function, you can filter wireless users according to their MAC address, either allowing or denying access. Check Allow to make any wireless MAC address in the Wireless Access Control List can be linked to.
  • Page 179 Figure 145 Wireless-MAC filter (adding)  Remove a MAC Access Control: select Remove check box in the right column of the list to remove the MAC address, and click Remove. 4.5.3.4 Wireless-Bridge This page allows you to configure wireless bridge features of the wireless LAN interface.
  • Page 180 Step 1 In the Bridge Restrict list, click Enabled (Scan). Step 2 Click Refresh to update the remote bridges. The OV804WV waits for a few seconds to update. And then lists the results in the accessible access points table. Step 3 Check it in the left column of the list for selecting the access point to which you want to establish a WDS connection.
  • Page 181 4.5.3.5 Wireless-Advanced This page allows you to configure advanced features of the wireless LAN interface. You can select a particular channel to operate, force the transmission rate to a particular speed, set the fragmentation threshold, set the RTS threshold, set the wakeup interval for clients in power-save mode, set the beacon interval for the access point, set XPress mode and set whether short or long preambles are used.
  • Page 182 have the Router automatically use the fastest possible data rate enable the Auto-Fallback feature. Auto-Fallback negotiates the best possible connection speed between the Router and a wireless client. The default value is Auto.  Multicast Rate: select the multicast transmission rate for the network.
  • Page 183 Use this mode if you are experiencing problems with wireless clients that connect to the OV804WV access point. If you select it, the preamble type is disabled, which cannot be set. 54g Auto: only stations that are configured in –...
  • Page 184 protection method, so 802.11g and 802.11b devices can co-exist in the same network without speaking at the same time. Do not disable 54g Protection if there is a possibility that a 802.11b device may need to use your wireless network. in Auto Mode. The wireless device uses RTS/CTS to improve 802.11g performance in mixed 802.11g/802.11b networks.
  • Page 185: Configuration Example

    Click Save/Apply to configure the advanced wireless options and make the changes take effect. 4.5.3.6 Wireless-Authenticated Stations This page shows authenticated wireless stations and their status about association and authentication. Figure 148 Wireless-authenticated stations 4.5.4 Configuration Example 4.5.4.1 How to connect STA to AP This section uses a simple configuration example to describe how to perform wireless configuration and connect a wireless PC to the network.
  • Page 186 Access Point Properties page appears. Step 2 Select the Enable Wireless check box. Step 3 Change the default SSID to john_smith. Ensure that it is the unique name. After setting, the following page appears. Figure 150 Wireless-Basic property setting Step 4 Click Save/Apply to save the settings. Configuring a Wireless Windows XP Client If your PC has wireless capabilities, Windows XP automatically recognizes this and creates a wireless connection for you.
  • Page 187 Figure 151 Network connection Step 2 Double-click the wireless connection icon. The Wireless Network Connection page appears, displaying all available wireless networks in your vicinity. If your gateway is connected and active, you can see the wireless connection. Note that the connection's status is Not connected and defined as Unsecured wireless network.
  • Page 188: Voice

    the bottom. After the connection is established, its status changes to Connected. An icon appears in the notification area, announcing the successful initiation of the wireless connection. Step 4 Once the client connects to the access point, it obtains an IP address by DHCP protocol. See the following figure: 4.6 Voice 4.6.1 Overview...
  • Page 189 enables you to place and receive calls over the Internet using a standard telephone set connected to SIP Proxy or other devices which have/include the same functions as SIP Proxy. With proper dial-plan setting, calls on DSL Router may be routed to PSTN network or VoIP network, depending on what digits you dial.
  • Page 190 SIP Registrar: maintains mappings from names (user ID) to addresses. How can an invite call identify you from so many users who use SIP to communication? The secrete is your user ID, which you have registered on the SIP registrar. SIP proxy uses user ID routes the coming call to your POTS.
  • Page 191 Figure 154 Registration Simple Call Flow Sometimes SIP user agents know the exact location of each other, and they are configured without proxy. In this case, both can talk directly. Alice seizes here phone, keys in Bob’s number, in SIP URL format.
  • Page 192 Call Flow in Proxy Mode In proxy mode, every user agent takes use of proxy to relay its SIP message. Proxy may query a location database server about a SIP URL. Depending on the result, it may relay the request to a next-hop proxy, or send it to the destination peer. In this flow, Alice is located in atlanta.com.
  • Page 193 determines the next hop is proxy biloxi.com, and passes this message to it. Finally bob’s phone rings, also this triggers a message passed back to Alice’s user agent, producing a ring-back tone in Alice’s phone. Once Bob hooks up his phone, a 2-way voice stream is created.
  • Page 194: Web

    4.6.2 Web Page Introduction Once you have logged in Web page, navigate to VoIP page from left menu. Here you can set some parameters you need to register SIP endpoints. Place a call or some advanced feature. The VoIP page does not contain a Save or Apply button, but you can save your settings permanently by clicking Stop SIP client or Start SIP client.
  • Page 195 Figure 155 SIP basic setting SIP Basic Setting page enables you to set some parameters, such as Preferred codec list, Preferred ptime, and SIP domain name. The following shows how to configure the SIP Basic Setting page step by step. Interface name: this item provides for you to choose the way by which DSL router’s VoIP connect to SIP Proxy.
  • Page 196 Preferred code list: this item provides for you to specify the priority of codec, and the priority of codec declined from left to right. Codecs define the method of relaying voice data. Different codecs have different characteristics, such as data compression and voice quality.
  • Page 197 SIP Outbound Proxy port: the port that the outbound proxy is listening to. Use SIP Registrar: select this option to register with the proxy. You can register your user ID on the SIP registrar. SIP registrar works with SIP proxy, allowing other parties to call DSL router through it.
  • Page 198 Figure 156 SIP Advanced Setting Advanced Feature Setting  Forwarding number Set the number to forward a call. This number can also be set through dialing *74<NUM># on the phone key pad.  Call forwarding when busy Enable Call forwarding when busy feature. When this check box is checked, incoming calls are forwarded when the specific line is busy.
  • Page 199 MWI stands for message waiting indicator. When this is enabled, DSL router sends a SIP subscribe message to proxy, asking for a notification when its voice mail status changes. When its status do changes, proxy sends a notify message to gateway, causing a MWI tone streamed to user’s handset.
  • Page 200  RFC2833: use RTP packet to encapsulate DTMF events, as specified in RFC 2833.  Voice Band: DTMF events are mixed with user voice in RTP packet. SIP Transport protocol Select the transport protocol to use for SIP signaling. Note: SIP proxy and registrar need to support the protocol you select.
  • Page 201: Voip Functionality

    message containing the SDP of the hold party. Music server then streams music to hold party. Enter server’s IP address in Music Server field, and specify the port in Music Server Port. 4.6.3 VoIP functionality This section describes how to use the functionality of DSL router in more detail.
  • Page 202: Placing A Call

    4.6.3.2 Placing a Call This section depicts how to place a basic VoIP call. Step 1 Pick up the handset on the phone. Step 2 Now you hear the dial-tone. Dial the extension of remote party. Step 3 To end the dialing, wait for digit-timeout, or just press # immediately.
  • Page 203: Call Return

    Step 1 To re-dial the latest dialed person, press *68 on the key pad. Step 2 Now you have made the call, as if you just dialed the whole number. 4.6.3.6 Call Return For incoming calls, DSL router remembers the number of calling party.
  • Page 204: Blind Transfer

    4.6.3.9 Blind Transfer Bind transfer transfers the current call to a third party blindly, regardless of whether the transfer is successfully or not. Step 1 Assume you have already been in a voice connection. Step 2 Press Flash to hold the first party. Step 3 Dial a third party.
  • Page 205 Step 3 Press *70 to disable Call forwarding if no answer. 4.6.3.12 Call Forwarding when Busy If this feature is enabled, incoming calls is forwarded to a third party when you busy. It involves two steps: setting the forwarding number and enable the feature. Step 1 Dial *74<NUM># to set forwarding number, wherein NUM is the number of the party to who the call is forwarded.
  • Page 206: Configuration Example

    Step 2 Press “Flash” to put the first party on hold. Step 3 Dial a third party. Step 4 After the third party answers the call, press Flash again to invite the first party. Step 5 Now all three parties are in a 3-way conference. 4.6.3.15 T38 Faxing To make T38 faxing, enable T38 support.
  • Page 207 Configuring SIP Server In this example, Asterisk acts as a registrar and a proxy. It accepts registration from VoIP network, binding the peer’s SIP URL with its location (such as IP address). For call request from various peers, Asterisk first checks if it is authorized. If not, it simply denies it.
  • Page 208 bindaddr=192.168.1.237 ; binding IP address other configuration line omitted here [1001] ; extension type=friend secret=1001 ; password host=dynamic canreinvite=no context=sip ; you must configure corresponding context ‘sip’ in extensions.conf This sample configuration file only contains the information for 1001. To add other extension, simply add similar section in SIP.conf.
  • Page 209 Figure 157 Voice SIP configuration Configure the Soft-Phone Soft-phone is configured with extension 1002. The configuration page is shown in following figure. After returning to main page, a Logged in message indicates the soft-phone is successfully registered.
  • Page 210: Usb Storage

    Figure 158 Configuring soft-phone Test VoIP call Seize the phone attached to DSL Router and dial the number of soft-phone, 1002. Soft-phone should rings, with calling party’s number information shown on its LCD. Answer the call on soft-phone creates a 2-way VoIP call. At this point, your VoIP call is successful.
  • Page 211: Ftp Server Configure

    Figure 159 USB storage topology 4.7.1 FTP Server Configure File transfer protocol (FTP) is a protocol for exchanging files on the Internet. The standard Internet protocol for downloading, or transferring, files from one computer to another. You can use this standard, for example, to offer files for downloading or to receive files from other users.
  • Page 212 Figure 160 FTP server configuration Note: After clicking Save, you need to reboot the DSL Router to activate the setting. 4.7.1.2 FTP Client Setting  Local Path: when you insert USB storage, it shows the USB storage information to us, and you can select which storage to store.
  • Page 213: Diagnostics

    Figure 161 Ftp client settings 4.8 Diagnostics Click Diagnostics to show the interface. Your DSL Router is capable of testing your DSL connection. The individual tests are listed below. If a test displays a fail status, click Rerun Diagnostic Tests at the bottom of this page to make sure the fail status is consistent.
  • Page 214: Management

    Figure 162 Diagnostics 4.9 Management 4.9.1 Settings 4.9.1.1 Settings Backup Click Backup Settings to back up the DSL router configuration. Figure 163 Backup configuration 4.9.1.2 Settings Update Click Browsing and select the correct update configuration setting file. Then, click Update Settings to update the DSL Router settings.
  • Page 215: Restore Default Settings

    Figure 164 Update settings 4.9.1.3 Restore Default Settings Click Restore Default Settings to restore DSL router settings to the factory defaults.
  • Page 216: System Log

    Figure 165 Restore Default Settings 4.9.2 System Log Click System Log to show the following page. The system log dialog allows you to view the system log and configure the system log options. Figure 166 System Log overview Click Configure System Log to show the following page. You can enable or disable the system log and then select the log level, display level and mode, and click Apply to end your configuration.
  • Page 217 Both the Log Level and Display Level have eight choices. The default log level is Debugging and the default display level is Error. The mode options are Local, Remote, and Both. The default is Local. If you select Remote or Both, all events are transmitted to the specified UDP port of the specified log server.
  • Page 218: Client Management

    Figure 167 System log configuration (2) After operations under Configure System Log, click View System Log to query the system logs. In this example, the View System Log is the default. Note: The log and display of the system events are above the set level.
  • Page 219 Figure 169 Protocol stack A brief description of each layer is provided in the following table. Table 1 Protocol layer summary Layer Description CPE/ACS The application uses the CPE WAN Management Application Protocol on the CPE and ACS, respectively. The application is locally defined and not specified as part of the CPE WAN Management Protocol.
  • Page 220 routers and LAN-side client devices, as shown in the following figure. Figure 170 Positioning in the auto-configuration architecture 4.9.3.3 TR-069 Client-configuration Select Management > TR-069Client to show the TR-069 Client configuration page. Figure 171 TR-069 client -configuration  Inform: if it is enabled, the CPE accepts the commands from ACS, the CPE does not accept the commands from ACS when the Disable option is selected.
  • Page 221: Internet Time

     ACS User Name: the ACS user name is provided by TR-069 service.  ACS Password: the ACS password is provided by TR-069 service.  Display SOAP messages on serial console: when it is enabled, the SOAP information displays on the serial console.
  • Page 222: Access Control

    Figure 172 Internet time overview After you enable Automatically synchronize with Internet time servers check box, the following page appears. Perform proper configuration and click Save/Apply. Figure 173 Internet time setup 4.9.5 Access Control 4.9.5.1 Access Control-Services Choose Access Control > Services to show the following page.
  • Page 223 Figure 174 Access control-services setup 4.9.5.2 Access Control-IP Addresses Choose Access Control > IP Addresses to show the following page. Figure 175 Access control-IP addresses overview If enabled, it permits access to local management services from IP addresses contained in the Service Control List. If the Access Control mode is disabled, the system does not validate IP addresses for incoming packets.
  • Page 224 Click Add to show the following page. In this page, enter the IP address of the management station permitted to access the local management services, and click Save/Apply. Figure 176 Access control-IP addresses 4.9.5.3 Access Control-Passwords Select Access Control > Passwords to show the following page.
  • Page 225: Update Software

    Figure 177 Changing password 4.9.6 Update Software Click Update Firmware to show the following interface. In this interface, you can update the DSL Router firmware. Click Browse... to find the right version file and click Update Firmware to update. Figure 178 Update software page NOTE: Do not turn off your DSL Router during firmware updates.
  • Page 226 Figure 179 Router save/reboot...

Table of Contents