ABLE OF ONTENTS Introduction ....... 1 Features ......... . . 1 System Requirements .
Page 4
Table of Contents Getting Started with the Configuration Manager 23 Accessing the Configuration Manager ....23 Functional Layout ........25 Commonly used buttons .
Page 5
Table of Contents Configuring Network Address Translation ..55 Overview of NAT ........55 Viewing NAT Global Settings and Statistics .
Page 6
Table of Contents Configuring the ATM Virtual Circuit ..97 Viewing Your ATM VC ....... 97 Adding ATM VCs .
Page 7
Table of Contents Viewing IP Filter Statistics ..... . 145 Managing Current IP Filter Sessions ....146 Blocked Protocols .
NTRODUCTION Congratulations on becoming the owner of the ADSL Barricade, a 2-port ADSL Router with built-in Annex A ADSL Modem. Your LAN (Local Area Network) will now be able to access the Internet using your high-speed ADSL connection. This User Guide will show you how to set up the ADSL Barricade, and how to customize its configuration to get the most out of your new product.
Introduction System Requirements In order to use the ADSL Barricade, you must have the following: • ADSL service up and running on your telephone line, with at least one public Internet address for your LAN. • One or more computers each containing an Ethernet 10/100 Base-T network interface card (NIC) and/or a single computer with a USB port.
Using this Document Typographical conventions • Italics are used to identify terms that are defined in the Terminology. • Square brackets are used for items you select from menus and drop-down lists. Special messages This document uses the following statement to call your attention to specific instructions or explanations.
ETTING TO ADSL B ARRICADE Package Contents • One ADSL Barricade. • One Power adapter. • One RJ-45 Ethernet cable (straight-through type). • One RJ-11 Standard phone/DSL line cable. • One USB Cable (Optional). • Installation utility and Documentation CD. •...
Getting to Know the ADSL Barricade Rear Panel The rear panel contains the ports for the unit's data and power connections. LABEL FUNCTION Connects the device to a telephone jack for DSL communication. Ethernet Connects the device to your PC's Ethernet port, or to the uplink port on your LAN's hub, using the cable provided.
UICK TART This Quick Start provides basic instructions for connecting the ADSL Barricade to a computer or LAN and to the Internet. • Connecting the Hardware describes how to set up the hardware. • Configuring Your Computers describes how to configure Internet properties on your computer(s).
Quick Start (See section on installing USB driver before connecting cable) Stand-alone computer ADSL Barricade AC adapter Wall Jack To a hub: use cross- over cable to uplink port or straight cable to standard port To a PC: use a cross-over cable Hub/switch (for local area network)
Configuring Your Computers Step 2. Connect the Ethernet cable If you are connecting a LAN to the ADSL Barricade, attach one end of a provided Ethernet cable to a regular hub port and the other to the Ethernet port on the ADSL Barricade. If you are using the ADSL Barricade with a single computer and no hub, you must use an Ethernet cable to attach the PC directly to the device.
Quick Start Note: In some cases, you may want to assign Internet information manually to some or all of your computers rather than allow the ADSL Barricade to do so. See Assigning static Internet Information to your PCs on page 16 for instructions. If you have connected your PC of LAN via Ethernet to the ADSL Barricade, follow the instructions that correspond to the operating system installed on your PC.
Configuring Your Computers Windows 2000 First, check for the IP protocol and, if necessary, install it. 1. In the Windows task bar, click the [Start] button, point to [Settings], and then click [Control Panel]. 2. Double-click the [Network and Dial-up Connections] icon. 3.
Quick Start 10. In the [Local Area Connection Properties] dialog box, select [Internet Protocol (TCP/IP)], and then click [Properties]. 11. In the [Internet Protocol (TCP/IP) Properties] dialog box, click the radio button labeled [Obtain an IP address automatically]. Also click the radio button labeled [Obtain DNS server address automatically].
Configuring Your Computers 8. If prompted, click [OK] to restart your computer with the new settings. Next, configure the PCs to accept IP information assigned by the ADSL Barricade. 9. In the Control Panel, double-click the [Network and Dial-up Connections] icon. 10.
Page 20
Quick Start 4. Select [Protocol], and then click [Add...]. The [Select Network Protocol] dialog box appears. 5. Click on [Microsoft] in the [Manufacturers] list box, and then click [TCP/IP] in the [Network Protocols] list box. 6. Click [OK] to return to the [Network] dialog box, and then click [OK] again.
Configuring Your Computers Windows NT 4.0 First, check for the IP protocol and, if necessary, install it. 1. In the Windows NT task bar, click the [Start] button, point to [Settings], then click [Control Panel]. 2. In the [Control Panel] window, double-click the [Network] icon. 3.
Quick Start Assigning static Internet Information to your PCs In some cases, you may want to assign Internet information to some or all of your PCs directly (often called statically), rather than allowing the ADSL Barricade to assign it. This option may be desirable (but not required) if: •...
1. At any PC connected to the ADSL Barricade via Ethernet or USB, open your Web browser, and type the following URL in the address/location box: 192.168.1.1/setup. Username/ Password: smc/smcadmin. 2. When you press [Enter], the page shown in Figure 2 should appear (see section Troubleshooting on page 175, if you...
Page 24
Quick Start Figure 2. Quick Configuration Page in Configuration Manager The fields are described in the following table. Work with your ISP to determine which settings you need to change. Field Description General Settings ATM Interface: This setting allows you to select the ATM interface you want to use (usually [atm-0]).
Page 25
Configuring the ADSL Barricade VPI: These values are provided by your ISP and determine the unique VCI: path that your connection uses to communicate with your ISP. Bridge: You may select [Enabled] or [Disabled] to set the bridging between the ADSL Barricade and your ISP. Your ISP may also refer to this as RFC 1483 or Ethernet over ATM.
Quick Start 4. Click the [Admin] tab that appears in the upper right corner of the page, and then click [Commit & Reboot] in the task bar. 5. Click [Commit]. A page will appear briefly to confirm your changes, and then you will be returned to the [Commit & Reboot] page.
Page 27
Configuring the ADSL Barricade Option Default Setting Explanation/Instructions DHCP DHCP server enabled The ADSL Barricade maintains with the following pool a pool of private IP addresses for of addresses: 192.168.1.3 dynamic assignment to your LAN through 192.168.1.34 computers. To use this service, you must have set up your computers to accept IP information dynamically, as...
ETTING TARTED WITH THE ONFIGURATION ANAGER The ADSL Barricade includes a preinstalled program called Configuration Manager, which provides an interface to the software installed on the device. It enables you to configure the device settings to meet the needs of your network. You access it through your web browser from any PC connected to the ADSL Barricade via the LAN ports.
Page 29
2. Enter your [User Name] and [Password], and then click [OK]. The first time you log into the program, use these default values: Default User Name : smc Default Password : smcadmin Note: You can change the password at any time (See Configuring User Names and Passwords on page 155 for instructions).
Functional Layout Functional Layout Configuration Manager tasks are grouped into categories, which can be accessed by clicking the tabs at the top of each page. Each tab displays the available tasks in a horizontal menu at the top of the page. You can click on these menu items and display the specific configuration options.
Getting Started with the Configuration Manager The Home Page and System View Table The [Home] page appears when you first access the program. This page is one of the two options available in the [Home] tab ; (the other is the [Quick Configuration] page, as described in Quick Start, Logging into the ADSL Barricade).
Page 32
The Home Page and System View Table Table Description Heading Device This table displays basic information about the ADSL Barricade hardware and software versions, the system uptime (since the last reboot), and the preconfigured operating mode. This table displays the operational status, version, and performance statistics for the DSL line.
Page 33
Getting Started with the Configuration Manager Services This table displays the status of various services that the ADSL Summary Barricade performs to help you manage your network. A green check mark indicates that the service is active and a red X indicates that it is inactive.
Modifying Basic System Information Modifying Basic System Information You can modify the basic system information, which includes the system date and time, the names assigned to the ADSL Barricade and the network domain in which it exists. Note: Changing the ADSL Barricade date and time does not affect the date and time on your PCs.
Page 35
Getting Started with the Configuration Manager 2. Modify the fields on this page as required. The following table describes each field: Option Description Date: These fields initially appear dimmed. To modify the date and time, click the respective check boxes and select the appropriate values Time: from the drop-down lists.
Committing Changes and Rebooting Committing Changes and Rebooting Committing your changes Whenever you use Configuration Manager to change system settings, the changes are initially placed in a temporary storage called random access memory or RAM. Your changes become effective when you submit them, but will be lost if the device is reset or turned off.
Getting Started with the Configuration Manager Rebooting the device using Configuration Manager To reboot the device, display the [Commit & Reboot] page, select the appropriate [Reboot Mode:] from the drop-down list, and then click [Reboot]. You have three options when rebooting. Option Description Reboot from Last...
Page 38
ONFIGURING THE LAN P ORTS This section describes how to configure IP properties for the interfaces on the ADSL Barricade that communicate with your LAN computers. Connecting via Ethernet If you are using the ADSL Barricade with multiple PCs on your LAN, you must connect the LAN via an Ethernet hub to the device's LAN port, called [eth-0].
Configuring the LAN Ports If your network uses a DHCP server (other than the ADSL Barricade) to assign IP addresses, you can configure the device to accept and use a LAN IP address assigned by that server. Similarly, if your ISP performs DHCP serving for your network, you can configure the device to accept an IP address assigned from the ISP's server.
Configuring the LAN Port IP Address The LAN Configuration table displays the following settings: Setting Description System Mode: This setting is preconfigured for your device, such as [Routing mode], [Bridging mode], or both modes simultaneously. This setting is not user-configurable. This setting provides options for how the device’s LAN port LAN Address: is assigned an IP address:...
Page 41
Configuring the LAN Ports The IP address you assign must be in the same subnet as your LAN computers that connect to this port (that is, the network ID portion of their IP addresses and their subnet masks must be the same). See IP Addresses, Network Masks and Subnets on page 167 for an explanation of IP addresses and network masks.
Page 42
Configuring the LAN Port IP Address • If you enabled the DHCP service, the ADSL Barricade will initiate a request for an IP address from your LAN's DHCP server. If a different IP address is assigned than the one that was previously configured, your current connection will be terminated.
Page 43
IEWING YSTEM IP A DDRESSES AND ERFORMANCE TATISTICS The interface on the ADSL Barricade that communicates with other network and Internet devices are identified by unique Internet protocol (IP) addresses. You can use the Configuration Manager to view the list of IP addresses that your device uses, and to view other system and network performance data.
Viewing System IP Addresses and IP Performance Statistics The listed IP addresses may include: • The IP address of the device's LAN (Ethernet) port, called [eth-0]. See Configuring the LAN Ports on page 33 for instructions on configuring this address. •...
Viewing IP Performance Statistics Viewing IP Performance Statistics You can view statistics on the processing of Internet protocol packets (a packet is a collection of data that has been bundled for transmission). You will not typically need to view thi s data, but you may find it helpful when working with your ISP to diagnose network and Internet data transmission problems.
ONFIGURING YNAMIC ONFIGURATION ROTOCOL You can configure your network and ADSL Barricade to use the Dynamic Host Configuration Protocol (DHCP). This section provides an overview of DHCP and instructions for implementing it on your network. Overview of DHCP What is DHCP? DHCP is a protocol that enables network administrators to centrally manage the assignment and distribution of IP information to computers on a network.
Configuring Dynamic Host Configuration Protocol The DHCP server draws from a defined pool of IP addresses and leases them for a specified amount of time to your computers when they request an Internet session. It monitors, collects, and redistributes the addresses as needed. On a DHCP-enabled network, the IP information is assigned dynamically rather than statically.
Configuring DHCP Server • If you have another PC or device on your network that is already performing the DHCP server function, then you can configure the device's LAN port to be a DHCP client of that server (as are your PCs). This configuration is described in Configuring the LAN Ports.
Page 49
Configuring Dynamic Host Configuration Protocol You can create up to two pools. The pools can maintain a combined total of 254 IP addresses. For example, you can configure only one pool with addresses in the range 192.168.1.2 through 192.168.1.255, or two pools with the following address ranges: Pool 0: 192.168.1.2 through 192.168.1.128 Pool 1: 192.168.1.129 through 192.168.1.255...
Configuring DHCP Server With this configuration, you could create the following two pools: Pool 0: 192.168.1.2 through 192.168.1.11 Pool 1: 192.168.2.2 through 192.168.2.2 The DHCP server would automatically distribute the Pool 0 addresses only to computers connected to the interface in the same subnet as these addresses-the LAN interface, eth-0.
Page 51
Configuring Dynamic Host Configuration Protocol 2. Click [Add]. The [DHCP Server Pool – Add] page appears, as shown in Figure 11: Figure 11. DHCP Server Pool – Add Page 3. Enter values for the [Start IP Address:], [End IP Address:], and [Netmask:] fields, which are required, and any others as needed: Field...
Page 52
Configuring DHCP Server Netmask: This field specifies which portion of each IP address in this range refers to the network and which portion refers to the host (computer). For a description of network masks and LAN network masks, see IP Addresses, Network Masks and Subnets on page 167.
Configuring Dynamic Host Configuration Protocol 4. When you are done defining the pool, click [Submit]. A [Confirmation] page displays briefly to indicate that the pool has been added successfully. After a few seconds, the [DHCP Server Pool – Add] page appears with the newly added pool. 5.
Configuring DHCP Server You can change the [Domain Name] associated with an IP address pool or enable/disable the pool. By default, a pool is enabled when you create it. When you are done making modifications, click [Submit]. Use the [Commit] function to save your changes to the permanent memory (see page 31).
Configuring Dynamic Host Configuration Protocol The DHCP Server Address Table lists any IP addresses that are currently leased to LAN devices. For each leased address, the table lists the following information: Field Description IP Address This field indicates the address that has been leased from the pool. Netmask This is the network mask associated with the leased address.
Page 56
Configuring DHCP Relay First, you must configure your PCs to accept DHCP information assigned by a DHCP server: 1. Open the Windows [Control Panel] and display the computer's [Networking properties]. Configure the TCP/IP properties to [Obtain an IP address automatically] (the actual text may vary depending on your operating system).
Configuring Dynamic Host Configuration Protocol Note: You can also delete an interface from the table by clicking in the right column. 5. Click [Submit]. A page appears to confirm your changes, and then the program returns to the [Dynamic Host Configuration Protocol (DHCP) Relay Configuration] page.
ONFIGURING ETWORK DDRESS RANSLATION This section provides an overview of Network Address Translation (NAT) and instructions for modifying the default configuration on your device. Overview of NAT Network Address Translation is a method for disguising the private IP addresses you use on your LAN as the public IP address you use on the Internet.
Page 59
Configuring Network Address Translation Definition: An IP data packet contains bits of data bundled together in a specific format for efficient transmission over the Internet. Such packets are the building blocks of all Internet communication. Each packet contains header information that identifies the IP address of the computer that initiates the communication (the source IP address), the port number that the router associates with that...
Viewing NAT Global Settings and Statistics • They provide a measure of security for you LAN by enabling you to assign private IP addresses and then have these and the source port numbers swapped out before your computers access the Internet. The type of NAT function described above is called [Network Address Port Translation (NAPT)].
Page 61
Configuring Network Address Translation The [NAT Configuration] page contains the following elements: • The [NAT Options] drop-down list will provide access to the [NAT Configuration] page and [NAT Global Information] table (shown by default and in Figure 16), the [Network Address Translation (NAT) Rule Configuration] page (see Figure 18) and the [NAT Translations] page (see Figure 20).
Page 62
Viewing NAT Global Settings and Statistics GRE Timeout Same as TCP Idle Timeout, but for GRE-based (sec): communication sessions. ESP Timeout Same as TCP Idle Timeout, but for ESP-based (sec) communication sessions. Default Nat Age For all other NAT translation sessions, the number of (sec): seconds after which a translation session will no longer be valid if no packets are received.
Configuring Network Address Translation Viewing NAT Rules and Rule Statistics To view the NAT rules currently defined on your system, select [NAT Rule Entry] in the [NAT Options] drop-down list. The [Network Address Translation (NAT) Rule Configuration] page appears, as shown in Figure 18: Figure 18.
Viewing Current NAT Translations Figure 19. NAT Rule Statistics Page The statistics show how many times this rule has been invoked and how many currently active sessions are using this rule. You can click [Clear] to reset the statistics to zeros and [Refresh] to display newly accumulated data.
Page 65
Configuring Network Address Translation For each current NAT Translations session, the table contains the following fields: Field Description Trans Index This is the sequential number assigned to the IP session used by this NAT translation session. Rule ID This field indicates the ID of the invoked NAT rule. Interface This field indicates the device interface on which the NAT rule was invoked (from the rule definition).
Page 66
Viewing Current NAT Translations Figure 21. NAT TRANSLATION – Details Page In addition to the information displayed in the [NAT TRANSLATION - Details] table, this table displays the following for the selected current translation sessions: Field Description Translated This field indicates the public IP address to which the private In Address: IP address was translated.
Configuring Network Address Translation Adding NAT Rules This section explains how to create rules for each NAT flavor. Note: You cannot edit existing NAT rules. To change a rule setup, delete it and add a new rule with the modified settings.
Page 68
Adding NAT Rules Figure 22. NAT Rule - Add Page (NAPT Flavor) 4. Enter a [Rule ID]. The Rule ID determines the order in which rules are invoked (the lowest numbered rule is invoked first, and so on). If you define two or more rules that act on the same set of IP addresses, be sure to assign the Rule ID so that the higher priority rules are invoked first.
Page 69
Configuring Network Address Translation 6. In the [Local Address From:] field and [Local Address To:] fields, type the starting and ending IP addresses, respectively, of the range of private addresses you use on your network that you want to have translated. You can specify that data from all LAN addresses should be translated by typing [0] (zero) in each [From] field and [255] in each [To] field.
Adding NAT Rules The RDR rule: Allowing external access to a LAN computer You can create an RDR rule to make a computer on your LAN, such as a Web or FTP server, available to Internet users without requiring you to obtain a public IP address for that computer. The computer's private IP address is translated to your public IP address in all incoming and outgoing data packets.
Page 71
Configuring Network Address Translation To an external Internet user then, it appears as if your Web server uses your public IP address. Figure 23. NAT Rule - Add Page (RDR Flavor) Follow the following instructions to add an RDR rule (see steps 1-4 under The NAPT Rule for specific instructions corresponding to steps 1 and 2 below): 1.
Page 72
Adding NAT Rules 4. In the [Local Address From:] and [Local Address To:] fields, type the same private IP address, or the lowest and highest addresses in a range: • If you type the same IP address in both fields, incoming traffic that matches the criteria you specify in steps 5 and 6 will be redirected to that IP address.
Page 73
Configuring Network Address Translation You can specify a range using the [From/To] fields if you want the rule to apply to a range of port types, or enter the same port number in both fields. A port ID identifies the specific function of the computer connected to it, and therefore can limit the types of data that pass to and from the computer.
Adding NAT Rules The Basic rule: Performing 1:1 translations The Basic flavor translates the private (LAN-side) IP address to a public (WAN-side) address, like NAPT rules. However, unlike NAPT rules, Basic rules do not translate the port numbers in the packet header; they are passed through untranslated. Therefore, the Basic rule does not provide the same level of security as the NAPT rule.
Page 75
Configuring Network Address Translation This selection specifies which type of Internet communication will be subject to this translation rule. You can select [ANY] if the rule applies to all data. Or, select [TCP], [UDP], [ICMP], or a number from [1-255] that represents the Internet Assigned Numbers Authority (IANA)-specified protocol number.
Adding NAT Rules The Filter rule: Configuring a BASIC rule with additional criteria Like the BASIC flavor, the Filter flavor translates public and private IP addresses on a one-to-one basis. The Filter flavor extends the capability of the BASIC rule. Refer to The BASIC Rule on page 71 for a general description.
Page 77
Configuring Network Address Translation 2. Select the interface ([IF Name:]) on which this rule will be effective. 3. Select a [Protocol:] to which this rule applies, or choose [ANY]. This selection specifies which type of Internet communication will be subject to this translation rule. You can select [ANY] if the rule applies to all data.
Adding NAT Rules If you enter only the network ID portion of the destination address, then the rule will apply to outbound traffic to all computers on network. 7. In the [Destination Port From:] field, type a port ID number if you want the rule to apply only to outbound traffic to servers of this type.
Page 79
Configuring Network Address Translation Bimap rules can be used to provide external access to a LAN device. They do not provide the same level of security as RDR rules, because RDR rules also reroute incoming packets based on the port ID. Bimap rules do not account for the port number, and therefore allow external access regardless of the destination port type specified in the incoming packet.
Adding NAT Rules The Pass rule: Allowing specific addresses to pass through untranslated You can create a Pass rule to allow a range of IP addresses to remain untranslated when another rule would otherwise do so. Figure 27. NAT Rule - Add Page (Pass Flavor) The Pass rule must be assigned a rule ID that is a lower number than the ID assigned to the rule it is intended to pass.
Page 81
Configuring Network Address Translation 3. In the [Local Address From:] and [Local Address To:] fields, type the lowest and highest IP addresses that define the range of private address you want to be passed without translation. If you want the Pass rule to act on only one address, type that address in both fields.
ONFIGURING ERVER DDRESSES About DNS Domain Name System (DNS) servers map the user-friendly domain names that users type into their Web browsers (e.g. yahoo.com) to the equivalent numerical IP addresses that are used for Internet routing. When a PC user types a domain name into a browser, the PC must first send a request to a DNS server to obtain the equivalent IP addresses.
Configuring DNS Server Addresses • Dynamically from a DHCP pool: You can configure the DHCP Server feature on the ADSL Barricade and create an address pool that specifies the DNS addresses to be distributed to the PCs. Refer to Configuring Dynamic Host Configuration Protocol for instructions on creating DHCP address pools.
Page 84
Configuring DNS Relay configuring your PPP interface. Note that you cannot change this property by modifying an existing PPP interface; you must delete the interface and recreate it with the new setting.) Using this option provides the advantage that you will not need to reconfigure the PCs or the ADSL Barricade if the ISP changes their DNS addresses.
Page 85
Configuring DNS Server Addresses Click the [Services] tab, and then click [DNS] in the task bar. The [Domain Name Service (DNS) Configuration] page appears. Figure 28. DNS Configuration Page Type the IP address of the DNS server in an empty row and click [Add].
IP R ONFIGURING OUTES You can use the Configuration Manager to define specific routes for your Internet and network data. This section describes basic routing concepts and provides instructions for creating routes. Note: Most users do not need to define IP routes. Overview of IP Routes The essential challenge of a router is: when it receives data intended for a particular destination, which device should it send...
Configuring IP Routes In comparison, when your computer initiates communication over the Internet, such as viewing a web page connecting to a web server, the data it sends out includes the IP address of the destination computer (the phone number). All your outgoing requests first go to the same router at your ISP (the first switchboard).
Overview of IP Routes Using IP routes to define default gateways IP routes are defined on computers, routers, and other IP-enabled devices to instruct them which hop to take, or which gateway to use, to help forward data along to its specified destination. If no IP route is defined for a destination, then IP data is passed to a predetermined default gateway.
Configuring IP Routes • On the ADSL Barricade itself, a default gateway is defined to direct all outbound Internet traffic to a router at your ISP. This default gateway is assigned automatically by your ISP whenever the device negotiates an Internet connection. (The process for adding a default route is described on page 88.) You may need to define routes if your home setup includes two or more networks or subnets, if you connect to two or more ISP...
Page 90
Viewing the IP Routing Table The [IP Route Table] displays a row for each existing route. These include routes that were predefined on the device, routes you may have added, and routes that the device has identified automatically through communication with other devices. The following table defines the fields in the [IP Route Table].
Configuring IP Routes Adding IP Routes Follow these instructions to add an IP route to the routing table. 1. From the [IP Route Table] page, click [Add]. The [IP Route - Add] page appears, as shown in Figure 30. Figure 30. IP Route - Add Page 2.
Page 92
Adding IP Routes 3. Click [Submit]. 4. On the [Confirmation] page, click [Close] to return to the [IP Route Table] page. The [IP Routing Table] will now display the new route. 5. Click the [Admin] tab, and then click [Commit & Reboot] in the task bar.
ONFIGURING THE OUTING NFORMATION ROTOCOL The ADSL Barricade can be configured to communicate with other routing devices to determine the best path for sending data to its intended destination. Routing devices communicate this information using a variety of IP protocols. This section describes how to configure the ADSL Barricade to use one of these, called the Routing Information Protocol (RIP).
Configuring the Routing Information Protocol When should you configure RIP? Most small home or office networks do not need to use RIP; they have only one router, such as the ADSL Barricade, and one path to an ISP. In these cases, there is no need to share routes, because all Internet data from the network is sent to the same ISP gateway.
Page 95
Configuring the ADSL Barricade's Interfaces with RIP 1. Log into the Configuration Manager, click the [Services] tab, and then click [RIP] in the task bar. The [Routing Information Protocol (RIP) Configuration] page appears, as shown in Figure 31. Figure 31. RIP Configuration Page The page contains radio buttons for [Enable] or [Disable] the RIP feature and a table listing interfaces on which the protocol is currently running.
Page 96
Configuring the Routing Information Protocol 3. In the [IF Name] column, select the name of the interface on which you want to enable RIP. For communication with RIP-enabled devices on your LAN, select [eth-0] or the name of the appropriate virtual Ethernet interface. For communication with your ISP or a remote LAN, select the corresponding [ppp], [eoa], or other WAN interface.
Page 97
Configuring the ADSL Barricade's Interfaces with RIP RIP version 2 is the preferred selection because it supports classless IP addresses (which are used to create subnets) and other features. Select [RIP2] if all other routing devices on the autonomous network support this version of the protocol. 6.
Configuring the Routing Information Protocol Viewing RIP Statistics From the [RIP Configuration] page, you can click [Global Stats] to view statistics on attempts to send and receive route table data over RIP-enabled interfaces on the ADSL Barricade. Figure 32. RIP Global Statistics Page You can click [Clear] to reset all statistics to zero and [Refresh] to display any newly accumulated data.
Page 99
ONFIGURING THE IRTUAL IRCUIT As your LAN computers access the Internet via the ADSL Barricade, data is exchanged with your ISP through a complex network of telephone switches, Internet routers, servers, and other specialized hardware. These various devices communicate using a common language, or protocol, called Asynchronous Transfer Mode (ATM).
Configuring the ATM Virtual Circuit The ATM VC Configuration table displays the following fields (contact your ISP to determine these settings): Field Description Interface This field indicates the name of the lower-level interface on which this VC operates. The low-level interface names are preconfigured in the software and identify the type of traffic that can be supported, such as data or voice.
Adding ATM VCs Adding ATM VCs You may need to create a VC if none has been predefined on your system or if you use multiple services with your ISP. Each service may require its own VC. Follow these instructions to add a VC: 1.
Configuring the ATM Virtual Circuit 6. When the [Confirmation] page appears, click [Close] to return to the [ATM VC Configuration] page.The new interface should now display in the [ATM VC Configuration] table. You may need to create a new WAN interface, or modify an existing interface, so that it uses the new VC.
Page 103
Modifying ATM VCs Figure 35. ATM VC Interface - Modify Page 2. Enter the new [VPI:] and [VCI:] values, select the [Mux Type:], or change the maximum number of protocols that the VC can carry, as directed by your ISP. You cannot modify the interface type over which an existing VC operates (aal5-0, for example).
ONFIGURING NTERFACES When powered on, the ADSL Barricade initiates a connection through your DSL line to your ISP. The point-to-point (PPP) protocol is commonly used between ISPs and their customers to identify and control various communication properties, including: • Identifying the type of service the ISP provides to a given customer.
Configuring PPP Interfaces Viewing Your Current PPP Configuration To view your current PPP setup, log into the Configuration Manager, and click the [WAN] tab. Then click [PPP] in the task bar. The [Point to Point Protocol (PPP) Configuration] page appears, as shown in Figure 36.
Page 106
Viewing Your Current PPP Configuration The [Point to Point Protocol (PPP) Configuration] page displays the following fields: Field Description Interface This is the predefined name of the PPP interface. This is the virtual circuit over which the PPP data are sent. The VC identifies the physical path the data takes to reach your ISP.
Page 107
Configuring PPP Interfaces Field Description Default Route This field indicates whether the ADSL Barricade should use the IP address assigned to this connection as its default route. It can be [Enable] or [Disable]. See Quick Start on page 7 for an explanation of default routes.
Viewing PPP Interface Details Viewing PPP Interface Details When you click to view additional details, the [PPP Interface – Detail] page appears, as shown in Figure 37. Figure 37. PPP Interface – Detail Page In addition to the properties defined on page 105, the [PPP Interface - Detail] page displays these fields: Field Description...
Page 109
Configuring PPP Interfaces Field Description Service Name: (This feature is available with PPPoE interfaces but not with PPPoA interfaces.) The name of the ISP service you are using with this PPP connection. ISPs may offer different types of services (for example, for online gaming or business communications), each requiring a different login and other connection properties.
Adding a PPP Interface Definition Field Description Security Protocol: This field indicates the type of PPP security your ISP uses: [PAP] (Password Authentication Protocol) [CHAP] (Challenge Handshake Authentication Protocol). Login Name: This is the name you use to log in to your ISP each time this PPP connection is established.
Page 111
Configuring PPP Interfaces 2. Select a [PPP interface] name from the drop-down list, and then enter or select data for each field. Note: You can create multiple PPP interfaces only if you are using the PPPoA protocol; only one PPP interface can be defined if you are using PPPoE.
Modifying and Deleting PPP Interfaces Modifying and Deleting PPP Interfaces To modify a PPP interface, display the [Point to Point Protocol (PPP) Configuration] page and click in the [Action] column for the interface you want to modify. The [PPP Interface – Modify] page appears, as shown in Figure 39.
ONFIGURING NTERFACES This section describes how to configure an Ethernet-over-ATM interface on the ADSL Barricade, if one is needed to communicate with your ISP. Overview of EOA The Ethernet-over-ATM (EOA) protocol is often referred to as RFC1483, which is the Internet specification that defines it. It is commonly used to carry data between local area networks that use the Ethernet protocol and wide-area networks that use the ATM protocol.
Configuring EOA Interfaces Viewing Your EOA Setup To view your current EOA configuration, log into Configuration Manager and click [WAN] in the task bar. Then click [EOA]. Figure 40 shows the [RFC1483/Ethernet over ATM (EOA) Config] page. Figure 40. RFC1483/Ethernet over ATM (EOA) Config Page The EOA table contains a row for each EOA interface currently defined on the device.
Page 115
Viewing Your EOA Setup The following table describes the fields on this page: Field Description Interface This is the name the software uses to identify the EOA interface. Interface Sec Type This field indicates the type of security protections in effect on the interface ([Public], [Private], or [DMZ]).
Page 116
Configuring EOA Interfaces Field Description Use DHCP When [Enable], this setting instructs the device to accept IP information assigned dynamically by your ISP's DHCP server. If the interface will be used for bridging with your ISP and you will not be routing data through it, leave this checkbox unselected.
Adding EOA Interfaces Adding EOA Interfaces Follow these instructions to add an EOA interface: 1. Click the [WAN] tab, and then click [EOA] in the task bar. 2. Click [Add]. The [EOA Interface – Add] page appears, as shown in Figure 41. Figure 41.
Page 118
Configuring EOA Interfaces serves as the public IP address for your entire LAN and is usually assigned by your ISP. 7. If your ISP will assign the IP address from their DHCP server, click the [Enable] radio button in the [Use Dhcp] field.
ONFIGURING NTERFACES This section describes how to configure an IPoA (Internet Protocol-over-ATM) interface on the ADSL Barricade. An IPoA interface can be used to exchange IP packets over the ATM network, without using an underlying Ethernet over ATM (EOA) connection. Typically, this type of interface is used only in product development and test environments, to eliminate unneeded variables when evaluating IP layer processing.
Page 120
Configuring IPoA Interfaces The following table describes the fields on this page: Field Description Interface This is the name the software uses to identify the IPoA interface. RFC 1577 If 1577 is selected the PPP packets are encapsulated according to RFC 1577 for transmission over an ATM link. If 1577 is not selected, RFC 1577 is not applied under this option.
Adding IPoA Interfaces Field Description Gateway Address This is the external IP address that the ADSL Barricade communicates with via the IPoA interface to gain access to the Internet. This is typically an ISP server. Status A green or red ball will appear to indicate that the interface is currently up or down, respectively.
Page 122
Configuring IPoA Interfaces 2. Select the next available interface name from the [IPoA Interface:] drop-down list. 3. In the [Conf. IP Address:] and [Netmask:] fields, type the address and mask that what you want to assign to the IPoA interface. If you enable the DHCP option, the IP address you enter here will serve as a requested address.
ONFIGURING RIDGING The ADSL Barricade can be configured to act as a bridging device between your LAN and your ISP. Bridges are devices that enable two or more networks to communicate as if they are two segments of the same physical LAN. This section describes how to configure the ADSL Barricade to operate as a bridge.
Page 124
Configuring Bridging On the receiving network, a LAN protocol such as Ethernet takes over, helping the packet reaches its destination. When the bridge does not recognize a packet's destination hardware ID, it broadcasts the packet through all of its interfaces – to each network it is attached to.
When to Use the Bridging Feature When to Use the Bridging Feature Although the ADSL Barricade is preconfigured to serve as a router for providing Internet connectivity to your LAN, there are several instances in which you may also want to configure bridging: •...
Page 126
Configuring Bridging 2. The page displays radio buttons for enabling, and a table for specifying the interfaces on which bridging will be performed. The table may be empty if bridging has not yet been configured. 3. Select the [Interface Name] on which you want to perform bridging and click [Add].
Deleting a Bridge Interface 4. Click [Bridging:] and [Enable] the radio button to turn on bridging. 5. Click [Submit]. 6. A page will briefly display to confirm your changes, and will return you to the [Bridge Configuration] page. 7. Click the [Admin] tab. Click [Commit & Reboot] in the task bar. 8.
ONFIGURING IREWALL ETTINGS Configuration Manager provides built-in firewall functions, enabling you to protect the system against denial of service (DoS) attacks and other unwelcome or malicious accesses to your LAN. You can also specify how to monitor attempted attacks, and who should be automatically notified.
Page 129
Configuring Firewall Settings 2. Configure any of the following settings that figure in the [Firewall Global Information] table: Field Description Blacklist Status: If you want the device to maintain and use a black list, click [Enable]. Click [Disable] if you do not want to maintain a list.
Page 130
Configuring Global Firewall Settings Field Description Max ICMP Conn.: This field sets the percentage of concurrent IP sessions that can be used for ICMP messages. If the percentage is exceeded, then older ICMP IP sessions will be replaced by new sessions as they are initiated. Max Single Host This field sets the percentage of concurrent IP session Conn.:...
Configuring Firewall Settings Managing the Black List If data packets are received that violate the firewall settings or any of the IP filter rules, then the source IP address of the offending packets can be blocked from such accesses for a specified period of time.
IP F ONFIGURING ILTERS LOCKED ROTOCOLS This section describes two Configuration Manager features that enable you to control the data passing through your network: • The IP filter feature enables you to create rules to block attempts by certain computers on your LAN to access certain types of data or Internet locations.
Configuring IP Filters and Blocked Protocols If the packet matches the criteria established in a rule, the packet can either be accepted (forwarded towards its destination), or denied (discarded), depending on the action specified in the rule. Viewing Your IP Filter Configuration To view your current IP filter configuration, log into [Configuration Manager], click the [Services] tab, and then click [IP Filter] in the task bar.
Configuring IP Filters Configuring IP Filter Global Settings The [IP Filter Configuration] page enables you to configure the following global IP filter settings. [Security Level:] This setting determines which IP filter rules take effect, based on the security level specified in each rule. For example, when [High] is selected, only those rules that are assigned a High security value will be effective.
Page 135
Configuring IP Filters and Blocked Protocols A Private interface connects to your LAN, such as the Ethernet interface. Packets received on a private interface are subject to a less restrictive set of protections, because they originate within the network. Typically, the global setting for private interfaces is [Accept], so that LAN computers have access to the ADSL Barricade's Internet connection.
Configuring IP Filters Creating IP Filter Rules To create an IP filter rule, you set various criteria that must be met in order for the rule to be invoked. Use these instructions to add a new IP filter rule, and refer to the examples on page 143 for assistance: 1.
Page 137
Configuring IP Filters and Blocked Protocols 2. Enter or select data for each field that applies to your rule. The following table describes the fields: Field Description Rule ID: Each rule must be assigned a sequential ID number. Rules are processed from lowest to highest on each data packet, until a match is found.
Page 138
Configuring IP Filters Security This is the security level that must be enabled globally for this rule Level: to take affect. A rule will be active only if its security level is the same as the globally configured setting (shown on the main [IP Filter] page).
Page 139
Configuring IP Filters and Blocked Protocols Src IP These fields indicate IP address criteria for the source Address: computer(s) (from which the packet originates) and the destination computer. In the drop-down list, you can Dest IP configure the rule to be invoked on packets containing: Address: [any]: any source IP address.
Page 140
Configuring IP Filters Store State: When this option is enabled, packets are monitored for their state (i.e., whether they are the initiating packet or a subsequent packet in an ongoing communication, etc). This option provides a degree of security by blocking/dropping packets that are not received in the anticipated state.
Page 141
Configuring IP Filters and Blocked Protocols IP Frag Pkt: This field determines how the rule applies to IP packets that contain fragments. You can choose from the following options: [Yes]: The rule will be applied only to packets that contain fragments.
Configuring IP Filters 3. When you have finished selecting the criteria, make sure that the [Enable] radio button is selected at the top of the page. Then click [Submit]. After a [Confirmation] page appears, the [IP Filter Configuration] page will redisplay with the new rule showing in the table.
Page 143
Configuring IP Filters and Blocked Protocols 3. Specify the [Protocol] = [TCP] and enable the [Store State] setting. 4. Select the [TCP Protocol], then specify a [Dest Port] = [80], which is the well-known port number for web servers. 5. Enable the rule by clicking the radio button at the top of the page.
Configuring IP Filters 4. Click [Submit] to create the rule, and commit your changes. Figure 49 shows how this rule could be configured: Figure 49. IP Filter Rule - Add page Viewing IP Filter Statistics For each rule, you can view statistics on how many packets were accepted or denied.
Configuring IP Filters and Blocked Protocols You can click [Clear] to reset the count to zero and [Refresh] to display newly accumulated data. Managing Current IP Filter Sessions When two computers communicate using the IP protocol, an IP session is created for the duration of the communication. The ADSL Barricade allows a fixed number of concurrent IP sessions.
Page 146
Configuring IP Filters The [IP Filter Session] table displays the following fields for each current IP session: Field Description Session Index This field displays the ID assigned by the system to the IP session (all sessions, whether or not they are affected by an IP filter rule, are assigned a session index).
Configuring IP Filters and Blocked Protocols Blocked Protocols The [Blocked Protocols] feature enables you to prevent the ADSL Barricade from passing any data that uses a particular protocol. Unlike the IP filter feature, you cannot specify additional criteria for blocked protocols, such as particular users or destinations. However, when you are certain that a particular protocol is not needed or wanted on your network, this feature provides a convenient way to discard such data before it is passed.
Page 148
Blocked Protocols The following list describes each of the available protocols. Protocol Description PPPoE This is the abbreviation of Point-to-Point Protocol over Ethernet. Many DSL modems use PPPoE to establish and maintain a connection with a service provider. PPPoE provides a means of logging in to the ISPs servers so that they can authenticate you as a customer and provide you access to the Internet.
Page 149
Configuring IP Filters and Blocked Protocols IPV6 Multicast This field displays IP Multicasting under IP Protocol version 6. See IP Multicast above. 802.1.Q This IEEE specification defines a protocol for virtual LANs on Ethernet networks. A virtual LAN is a group of PCs that function as a local area network, even though the PCs may not be physically connected.
DSL L IEWING NFORMATION To view configuration parameters and performance statistics for the ADSL Barricade’s DSL line, log into Configuration Manager. Then click the [WAN] tab. The [DSL Status] page appears by default, as shown in Figure 53. Figure 53. DSL Status Page The [DSL Status] page displays current information on the DSL line performance.
Page 151
Viewing DSL Line Information Although you generally will not need to view the remaining data, it may be helpful when troubleshooting connection or performance problems with your ISP. You can click [Clear] to reset all counters to zero, and [Refresh] to display the page with newly accumulated values.
Page 152
Viewing DSL Line Information From the [DSL Status] page, you can click [Stats] to display DSL line performance statistics, as shown in Figure 55. Figure 55. DSL Statistics Page The [DSL Statistics] page reports error data relating to the last 15-minute interval, the current day, and the previous day.
Page 153
Viewing DSL Line Information At the bottom of the page, the [Detailed Interval Statistic (Past 24 hrs)] table displays links you can click on to display detailed data for each 15-minute interval in the past 24 hours. For example, when you click on [1-4], the data appear for the 16 intervals (15-minutes each) that make up the previous 4 hours.
DMINISTRATIVE ASKS This section describes the following administrative tasks that you can perform using Configuration Manager: • Configuring User Names and Passwords. • Viewing System Alarms. • Upgrading the Software. • Using Diagnostics. • Modifying Port Settings. You can access these tasks from the [Admin] tab task bar. The other Admin tasks listed in the [Admin] tab –...
Administrative Tasks Creating and Deleting Logins The default login allows the user full access to all Configuration Manager features, including creating up to four additional user logins. You can assign either of two privilege levels to each additional login: • Root-level privileges enable the user to modify all the features available in Configuration Manager.
Page 156
Configuring User Names and Passwords 2. Click [Add] to display the [User Config-Add] page, as shown in Figure 57.1. Figure 57.1. User Config - Add page 3. Type the [User ID] and [Password] in the text boxes provided, and then select the privilege level for this user. The user name can be up to 128 characters, but cannot contain spaces or special characters.
Administrative Tasks Changing Login Passwords You can change your own log in password and, if you have root privileges, other user’s passwords. Follow these instructions to change a login password. Note: This user ID and password is used only for logging into the Configuration Manager;...
Viewing System Alarms Viewing System Alarms You can use the Configuration Manager to view information about alarms that occur in the system. Alarms, also called traps, are caused by a variety of system events, including connection attempts, resets, and configuration changes. Although you will not typically need to view this information, it may be helpful in working with your ISP to troubleshoot problems you encounter with the device.
Administrative Tasks Upgrading the Software Your ISP may from time to time provide you with an upgrade to the software running on the ADSL Barricade. All system software is contained in a single file, called an image. The image is composed of several distinct parts, each of which implements a different set of functions.
Page 160
Upgrading the Software The name of the upgrade file must be one of the following: TEImage.bin TEDsl.gsz TEAppl.gsz Filesys.bin TEPatch.bin 3. Click [Upload]. The following message box appears at the bottom of the page: Loading New Software: Please do not interrupt the upgrade process. A status page will appear Automatically when loading is completed (about 1 minute).
Page 161
Administrative Tasks Remote Image Upgrade 1. Log into [Configuration Manager], click [Admin] tab, and then click [Remote Image Upgrade] in the task bar. The [Remote Image Upgrade] page is shown in Figure 59.1. Figure 59.1. Remote Image Upgrade page 2. In the [IP Address] text boxes, type the IP address of the server from which the file is to be downloaded.
Using Diagnostics Click [OK] to start the image upgrade. When image upgrade is complete, the following message displays: Remote Image Upgrade Successful… 6. The system will proceed to reboot itself automatically. Wait 1 minute to allow the reboot to complete, then refresh your browser and log in again to the device.
Administrative Tasks 2. From the [ATM VC:] drop-down list, select the name of the ATM interface currently defined on your system. 3. Click [Submit]. The diagnostics utility will run a series of test to check whether the device's connections are up and working. This takes only a few seconds and the results for each test are displayed on screen.
Modifying Port Settings Modifying the ADSL Barricade’s port numbers In some cases, you may want to assign non-standard port numbers to the HTTP and Telnet servers that are embedded on the ADSL Barricade. The following scenario is one example where changing the HTTP port number may be necessary: You have an externally visible Web server on your LAN, with a NAT Rule (RDR flavor) that redirects incoming HTTP packets to that Web server.
Page 165
Administrative Tasks Follow these steps to modify port settings: 1. Log into the Configuration Manager, click the [Admin] tab. Then click [Port Settings] in the task bar. The [Port Settings] page is shown in Figure 61. Figure 61. Port Settings Page 2.
PPENDIX IP Addresses, Network Masks and Subnets IP Addresses Note: This section pertains only to IP addresses for IPv4 (version 4 of the Internet Protocol). IPv6 addresses are not covered. This section assumes basic knowledge of binary numbers, bits, and bytes. For details on this subject, see Appendix B on page 173.
Page 167
Appendix A • Host ID: identifies a particular computer or device on the network. The first part of every IP address contains the network ID, and the rest of the address contains the host ID. The length of the network ID depends on the network's class (see following section).
Network classes Network classes The three commonly used network classes are A, B and C. (There is also a class D but it has a special use beyond the scope of this discussion.) These classes have different uses and characteristics. Class A networks are the Internet's largest networks, each with room for over 16 million hosts.
Appendix A Subnet masks Definition: A mask looks like a regular IP address, but contains a pattern of bits that tells what parts of an IP address are the network ID and what parts are the host ID: - bits set to 1 means "this bit is part of the network ID" - bits set to 0 means "this bit is part of the host ID."...
Page 170
Subnet masks These masks are: - Class A: 255.0.0.0 - Class B: 255.255.0.0 - Class C: 255.255.255.0 These are called default because they are used when a network is initially configured, at which time it has no subnets.
PPENDIX Binary Numbers In everyday life, we use the decimal system of numbers. In decimal, numbers are written using the ten digits 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Computers, however, do not use decimal. Instead, they use binary. Definition (binary numbers): Binary numbers are numbers written using only the two digits 0 and 1, e.g.
Appendix B Bits and bytes Computers handle binary numbers by grouping them into units of distinct sizes. The smallest unit is called a bit, and the most commonly used unit is called a byte. Definition (bit and byte): A bit is a single binary digit, i.e., 0 or 1. A byte is a group of eight consecutive bits (the number of bits can vary with computers, but is almost always eight), e.g., 11011001.
ROUBLESHOOTING This troubleshooting suggests solutions for problems you may encounter in installing or using the ADSL Barricade, and provides instructions for using several IP utilities to diagnose problems. Contact Customer Support if these suggestions do not resolve the problem. LEDs •...
Page 174
Troubleshooting third, and sixth wires are the same color on the two connectors, then it is a straight-through type). Verify that your cable is sufficient for your network requirements. A 100 Mbit/sec network (10BaseTx) should use cables labeled CAT 5. A 10Mbit/sec network may tolerate lower quality cables.
Page 175
If you have not changed the password from the default, try using smc/smcadmin as the user ID and password. Otherwise, you can reset the device to the default configuration by pressing the [Reset] button on the Rear Panel of the device three times (using a pointed object such as a pen tip).
Page 176
Troubleshooting • My changes to Configuration Manager are not being retained Be sure to use the [Commit] function after any changes. • Diagnosing Problem using IP Utilities ping Ping is a command you can use to check whether your PC can recognize other computers on your network and the Internet.
Page 177
Troubleshooting If the target computer cannot be located, you will receive the message [Request timed out]. Using the ping command, you can test whether the path to the ADSL Barricade is working (using the preconfigured default LAN IP address 192.168.1.1) or another address you assigned. You can also test whether access to the Internet is working by typing an external address, such as that for www.yahoo.com (216.115.108.243).
Page 178
Troubleshooting The window will display the associate IP address, if known, as shown in Figure 63. Figure 63. Using the nslookup Utility There may be several addresses associated with an Internet name. This is common for web sites that receive heavy traffic; they use multiple, redundant servers to carry the same information.
ECHNICAL PECIFICATIONS Interface Ports: - Internet (WAN): ADSL RJ11 (pin 3 and 4) - Network (LAN): 1-Port 10/100 Mbps Ethernet switch - Network (LAN): 1-Port USB 1.1 ADSL Features: - Embedded full-rate ADSL Modem Compliant with ANSI T1.413 Issue 2, ITU G.992.1 (G.DMT) and ITU G.992.2 (G.Lite).
Page 180
Technical Specifications - Bridging/Routing Functionality: Up to 1000 hosts • Transparent bridging as specified in IEEE 802.1D • Bridged PDU encapsulation • Provides up to 1024 NAT translation sessions • Dynamic IP address allocation is supported through • DHCP or IPCP Point-to-Point Protocol: PPPoA, PPPoE, PAP, and CHAP •...
Page 181
Technical Specifications Standards Compliance: - ADSL: ANSI T1.413 Issue 2 G.DMT (ITU G.992.1) G.Lite (ITU G.992.2) - Ethernet: IEEE 802.3 10 Base-T Ethernet IEEE 802.3u 100 Base-Tx Fast Ethernet Operating System Support Windows 98 first and second edition Windows Me Windows 2000 Windows XP Windows NT...
Page 182
Technical Specifications Power Input 12V/1.2A Weight 545g Dimensions 20 x 14.8 x 3.9 cm (LxWxH) Electromagnetic Compatibility CE R&TTE, FCC part 15 class B and FCC part 68 Safety CSA,UL 1950, EN60950...
ERMINOLOGY 10BASE-T A designation for the type of wiring used by Ethernet networks with a data rate of 10 Mbps. Also known as Category 3 (CAT 3) wiring. See also data rate, Ethernet. 100BASE-T A designation for the type of wiring used by Ethernet networks with a data rate of 100 Mbps.
Page 184
Terminology use are binary numbers; e.g., the IP address 209.191.4.240 is 11010001.10111111.00000100.11110000 in binary. See also bit, IP address, network mask. Short for binary digit. A bit is a number that can have two values, 0 or 1. See also binary. Bits per second bridging Passing data from your network to your ISP and vice versa using...
Page 185
Terminology DHCP (Dynamic Host Configuration Protocol) DHCP automates address assignment and management. When a computer connects to the LAN, DHCP assigns it an IP address from a shared pool of IP addresses; after a specified time limit, DHCP returns the address to the pool. DHCP relay (Dynamic Host Configuration Protocol relay) A DHCP relay is a computer that forwards DHCP data between computers that request IP addresses and the DHCP server that...
Page 186
Terminology for Assigned Names and Numbers (ICANN). Domain names are a key element of URLs, which identify a specific file at a web site, e.g., http://www.globespan.net/index.html. See also DNS. download To transfer data in the downstream direction, i.e., from the Internet to the user.
Page 187
Terminology FTP (File Transfer Protocol) A program used to transfer files between computers connected to the Internet. Common uses include uploading new or updated files to a web server, and downloading files from a web server. GGP (Gateway to Gateway Protocol) An Internet protocol that specifies how gateway routers communicate with each other.
Page 188
Terminology IGMP (Internet Group Management Protocol) An Internet protocol that enables a computer to share information about its membership in multicast groups with adjacent routers. A multicast group of computers is one whose members have designated as interested in receiving specific content from the others.
Page 189
Terminology ISP (Internet Service Provider) A company that provides Internet access to its customers, usually for a fee. LAN (Local Area Network) A network limited to a small geographic area, such as a home, office, or small building. LED (Light Emitting Diode) An electronic light-emitting device.
Page 190
Terminology know these addresses; the outside world sees only the public IP address when talking to a computer on your LAN. NAT rule A defined method for translating between public and private IP addresses on your LAN. network A group of computers that are connected together, allowing them to communicate with each other and share resources, such as software, files, etc.A network can be small, such as a LAN, or very large, such as the Internet.
Page 191
Terminology port A physical access point to a device such as a computer or router, through which data flows into and out of the device. POTS (Plain Old Telephone Service) Traditional analog telephone service using copper telephone lines. Pronounced pots. See also PSTN. POTS splitter See splitter.
Page 192
Terminology RIP (Routing Information Protocol) The original TCP/IP routing protocol. There are two versions of RIP: version I and version II. RJ-11 (Registered Jack Standard-11) The standard plug used to connect telephones, fax machines, modems, etc. to a telephone jack. It is a 6-pin connector usually containing four wires.
Page 193
Terminology splitterless A type of DSL installation where no splitter is installed, saving the cost of a service call by the telephone company. Instead, each jack in the home carries both voice and data, requiring a microfilter for each telephone to prevent interference from the data signal.
Page 194
Terminology TFTP (Trivial File Transfer Protocol) A protocol for file transfers, TFTP is easier to use than File Transfer Protocol (FTP) but not as capable or secure. TTL (Time To Live) A field in an IP packet that limits the life span of that packet. Originally meant as a time duration, the TTL is usually represented instead as a maximum hop count;...
Page 195
Terminology WAN (Wide Area Network) Any network spread over a large geographical area, such as a country or continent. With respect to the ADSL Barricade, WAN refers to the Internet. Web browser A software program that uses Hyper-Text Transfer Protocol (HTTP) to download information from (and upload to) web sites, and displays the information, which may consist of text, graphic images, audio, or video, to the user.
OMPLIANCES FCC - Class B This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 197
Compliances of devices that may be connected to the line, as determined by the total RENs, contact the telephone company to determine the maximum REN for the calling area. If this equipment causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required.
Page 198
Compliances EC Conformance Declaration - Class B This information technology equipment complies with the requirements of the Council Directive 89/336/EEC on the Approximation of the laws of the Member States relating to Electromagnetic Compatibility and 73/23/EEC for electrical equipment used within certain voltage limits and the Amendment Directive 93/ 68/EEC.
Page 199
Compliances Safety Compliance Wichtige Sicherheitshinweise (Germany) Bitte lesen Sie diese Hinweise sorgfältig durch. Heben Sie diese Anleitung für den späteren Gebrauch auf. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie keine Flüssigoder Aerosolreiniger. Am besten eignet sich ein angefeuchtetes Tuch zur Reinigung. Die Netzanschlu ßsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein.
Page 200
Compliances Verbesserung erzielen. Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt. Wenn das Gerät deutliche Anzeichen eines Defektes aufweist. Stellen Sie sicher, daß die Stromversorgung dieses Gerätes nach der EN 60950 geprüft ist. Ausgangswerte der Stromversorgung sollten die Werte von AC 7,5-8V, 50-60Hz nicht über oder unterschreiten sowie den minimalen Strom von 1A nicht unterschreiten.
All SMC products carry a standard 2 year limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term.
Page 202
AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY...
Page 203
SMC reserves the right to make changes to the product(s) described in this document without notice. SMC does not assume any liability that may occur due to the use or application of the product(s) described herein. In order to obtain...
Need help?
Do you have a question about the WUSB32 - annexe 2 and is the answer not in the manual?
Questions and answers