ZyXEL Communications MAX208M User Manual

ZyXEL Communications MAX208M User Manual

Wimax cpe series
Hide thumbs Also See for MAX208M:
Table of Contents

Advertisement

WiMAX CPE Series
MAX208M, MAX218M, MAX208M2W, MAX218M2W,
MAX218M1W, MAX218MW, MAX318M2W, MAX308M,
MAX318M
Default Login Details
IP Address
http://192.168.1.1
Admin's User
admin / 1234
Name /Password
Guest's User
guest / guest
Name /Password
Firmware Version 2.00
Edition 1, 8/2011
www.zyxel.com
www.zyxel.com
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications MAX208M

  • Page 1 WiMAX CPE Series MAX208M, MAX218M, MAX208M2W, MAX218M2W, MAX218M1W, MAX218MW, MAX318M2W, MAX308M, MAX318M Default Login Details IP Address http://192.168.1.1 Admin’s User admin / 1234 Name /Password Guest’s User guest / guest Name /Password Firmware Version 2.00 Edition 1, 8/2011 www.zyxel.com www.zyxel.com Copyright ©...
  • Page 3: About This User's Guide

    About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the WiMAX Device. See the product- specific QSG for hardware setup. Note: This is a configuration manual for a series of products. Therefore, some features or options in this guide may not be available in your product.
  • Page 4: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 5 Document Conventions Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate. WiMAX Device Computer Notebook computer...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 7: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 15 Introduction to the Series ......................17 Introduction to the Web Configurator ..................20 Setup Wizard..........................25 Tutorials .............................35 Technical Reference ......................61 System Status ..........................63 WiMAX ............................67 Network Setting ..........................91 Security ............................125 The VoIP General Screens ......................151 The VoIP Account Screens ......................157 The VoIP Line Screens ......................171 Maintenance ..........................175...
  • Page 8 Contents Overview WiMAX Device Configuration User’s Guide...
  • Page 9: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions ......................4 Safety Warnings........................6 Contents Overview ........................7 Table of Contents ........................9 Part I: User’s Guide ................15 Chapter 1 Introduction to the Series ...................... 17 1.1 About Your WiMAX Device ....................17 1.1.1 WiMAX Internet Access ....................18 1.1.2 Models with Phone Ports ....................18...
  • Page 10 Table of Contents Chapter 4 Tutorials ........................... 35 4.1 Overview ..........................35 4.2 WiMAX Connection Settings ....................35 4.3 Setting Up a Small Network for the LAN ................36 4.4 Making a Telephone Call Over the Internet ................38 4.4.1 Configure Your SIP Account ..................38 4.5 Blocking Web Access from the WiMAX Device ..............40 4.6 Restricting Wireless Access to the WiMAX Device ..............40 4.7 Allowing Internet Users to use Internal Servers ..............42...
  • Page 11 Table of Contents 6.7 RAPL Settings ........................81 6.8 Home NSP Settings ......................82 6.9 Connect ..........................83 6.10 Wide Scan ..........................85 6.11 Link Status ..........................87 6.12 Link Statistics ........................88 6.13 Connection Info ........................89 6.14 Service Flow ........................89 Chapter 7 Network Setting ........................91 7.1 Overview ..........................91 7.1.1 What You Need to Know .....................91 7.2 WAN .............................94...
  • Page 12 Table of Contents 8.1 Overview ..........................125 8.1.1 What You Need to Know ...................125 8.2 IP Filter ..........................125 8.3 MAC Filter ..........................126 8.4 DDOS ..........................127 8.5 PPTP VPN Server ......................129 8.6 PPTP VPN Client .......................130 8.7 PPTP VPN Client: Add .......................131 8.8 L2TP VPN Server .......................133 8.9 L2TP VPN Client ........................135 8.10 L2TP VPN Client: Add ......................135...
  • Page 13 Table of Contents 10.5 Feature ..........................165 10.6 Dialing ..........................166 10.7 FAX ..........................167 10.8 Technical Reference ......................167 10.8.1 SIP Call Progression with Session Timer ...............167 10.8.2 SIP Client Server ....................170 Chapter 11 The VoIP Line Screens ......................171 11.1 Overview ..........................171 11.1.1 What You Need to Know ..................171 11.2 Phone ..........................172 11.3 Voice ..........................172...
  • Page 14 Table of Contents Chapter 13 Troubleshooting........................197 13.1 Power, Hardware Connections, and LEDs ...............197 13.2 WiMAX Device Access and Login ..................198 13.3 Internet Access ........................199 13.4 Wireless Internet Access (for Models with WiFi) ..............201 13.5 Phone Calls and VoIP (for Models with Phone Ports) ............201 13.6 Reset the WiMAX Device to Its Factory Defaults .............202 13.6.1 Pop-up Windows, JavaScript and Java Permissions ..........202 Chapter 14...
  • Page 15: User's Guide

    User’s Guide...
  • Page 17: Introduction To The Series

    FREQUENCY WIFI INDOOR OUTDOOR PHONE MODEL BAND FUNCTION DEVICE DEVICE PORTS MAX208M 2.5 ~ 2.7 GHz MAX218M 3.4 ~ 3.6 GHz MAX208M2W 2.5 ~ 2.7 GHz MAX218M2W 3.4 ~ 3.6 GHz MAX218M1W 3.4 ~ 3.6 GHz MAX218MW 3.4 ~ 3.6 GHz MAX318M2W 3.4 ~ 3.6 GHz...
  • Page 18: Wimax Internet Access

    Chapter 1 Introduction to the Series 1.1.1 WiMAX Internet Access Connect your computer or network to the WiMAX Device for WiMAX Internet access. See the Quick Start Guide for instructions on hardware connection. In a wireless metropolitan area network (MAN), the WiMAX Device connects to a WiMAX base station (BS) for Internet access.
  • Page 19: Models With Wifi

    Chapter 1 Introduction to the Series 1.1.3 Models with WiFi For WiFi models, IEEE 802.11b/g/n compliant clients can wirelessly connect to the WiMAX Device to access network resources. You can set up a wireless network with WPS (WiFi Protected Setup) or manually add a client to your wireless network.
  • Page 20: Introduction To The Web Configurator

    H A PT ER Introduction to the Web Configurator 2.1 Overview The Web Configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher.
  • Page 21: Saving And Canceling Changes

    Chapter 2 Introduction to the Web Configurator Note: For security reasons, the WiMAX Device automatically logs you out if you do not use the Web Configurator for five minutes. If this happens, log in again. 2.1.2 Saving and Canceling Changes All screens to which you can make configuration changes must be saved before those changes can go into effect.
  • Page 22: The Main Screen

    Chapter 2 Introduction to the Web Configurator Table 3 Saving and Canceling Changes (continued) LABEL DESCRIPTION Previous Page Click this to go to the previous page in the table. Page Indicator / Jump to Page This indicates which page is currently displayed in the table. Use the menu to jump to another page.
  • Page 23 Chapter 2 Introduction to the Web Configurator Note: The available menus and screens vary depending on the type of account (admin or guest) you use for login. Figure 7 Main Screen The following table describes the menus in this screen. Table 4 Main >...
  • Page 24 Chapter 2 Introduction to the Web Configurator WiMAX Device Configuration User’s Guide...
  • Page 25: Setup Wizard

    H A PT ER Setup Wizard 3.1 Overview This chapter provides information on the Setup Wizard. The wizard guides you through several steps for configuring your network settings. 3.1.1 Welcome to the Setup Wizard This screen provides a quick summary of the configuration tasks the wizard helps you to perform. They are: Set up your Local Area Network (LAN) options, which determine how the devices in your home or office connect to the WiMAX Device.
  • Page 26: Lan Settings

    Chapter 3 Setup Wizard 3.1.2 LAN Settings The LAN Settings screen allows you to configure your local network options. Figure 9 Setup Wizard > LAN Settings The following table describes the labels in this screen. Table 5 Setup Wizard > LAN Settings LABEL DESCRIPTION LAN TCP/IP...
  • Page 27: Wimax Frequency Settings

    Chapter 3 Setup Wizard Table 5 Setup Wizard > LAN Settings (continued) LABEL DESCRIPTION Second Specify the second IP address of three DNS servers that the network can use. The WiMAX Device provides these IP addresses to DHCP clients. Server Third DNS Specify the third IP address of three DNS servers that the network can use.
  • Page 28: Wimax Authentication Settings

    Chapter 3 Setup Wizard The following table describes the labels in this screen. Table 6 Setup Wizard > WiMAX Frequency Settings LABEL DESCRIPTION Setting Type Select the WiMAX frequency setting type from the list. • By Range - Select this to set up the frequency based on a range of MHz.
  • Page 29 Chapter 3 Setup Wizard Figure 11 Setup Wizard > WiMAX Authentication Settings The following table describes the labels in this screen. Table 7 Setup Wizard > WiMAX Authentication Settings LABEL DESCRIPTION Authentication Authentication Select a WiMAX authentication mode for authentication network sessions with the Mode ISP.
  • Page 30: Voip Settings

    Chapter 3 Setup Wizard Table 7 Setup Wizard > WiMAX Authentication Settings (continued) LABEL DESCRIPTION Server Root CA Browse for and choose a server root certificate file, if required. Cert. File Server Root CA This field displays information about the assigned server root certificate. Cert.
  • Page 31 Chapter 3 Setup Wizard Note: This settings should be provided by your VoIP service provider. Figure 12 Setup Wizard > VoIP Settings The following table describes the labels in this screen. Table 8 Setup Wizard > VoIP Settings LABEL DESCRIPTION Line 1/2 SIP Account - Configure this section to use the PHONE 1 and/or PHONE 2 port.
  • Page 32: Wlan Settings

    Chapter 3 Setup Wizard 3.1.6 WLAN Settings For models with WiFi wireless feature, you can configure your WLAN settings in the Setup Wizard. The WLAN Settings screen lets you set up how other devices connect to the Internet wirelessly using the WiMAX Device. Figure 13 Setup Wizard >...
  • Page 33 Chapter 3 Setup Wizard Table 9 Setup Wizard > WLAN Settings (continued) LABEL DESCRIPTION WLAN Mode Select the mode that the WiMAX Device will be using to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed.
  • Page 34: Setup Complete

    Chapter 3 Setup Wizard 3.1.7 Setup Complete Click Save to save the Setup Wizard settings and close it. Figure 15 Setup Wizard > Setup Complete Launch your web browser and navigate to your favorite website. If everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Device features available in the more advanced web configurator.
  • Page 35: Tutorials

    H A PT ER Tutorials 4.1 Overview Run the Setup Wizard for the basic setup of your WiMAX Device. This chapter shows you how to configure some of the advanced settings WiMAX Device’s features. Note: Be sure to read Introduction to the Web Configurator on page 20 before working through the tutorials presented here.
  • Page 36: Setting Up A Small Network For The Lan

    Chapter 4 Tutorials 4.3 Setting Up a Small Network for the LAN This tutorial shows you how to set up a small network in your office or home. Goal: Connect three computers to your WiMAX Device to form a small network. Required: The following table provides a summary of the information you will need to complete the tasks in this tutorial.
  • Page 37 Chapter 4 Tutorials Log into the Web Configurator and open the Network Setting > LAN > DHCP screen. Select Server for the DHCP mode, then enter 192.168.100.10 and 192.168.100.30 as your DHCP starting and ending IP addresses. Leave the other settings as their defaults and click Save. Next, go to the Network Setting >...
  • Page 38: Making A Telephone Call Over The Internet

    Chapter 4 Tutorials Once your network is configured and hooked up, you will want to connect it to the Internet next. To do this, just run the Internet Connection Wizard (Chapter 3 on page 25), which walks you through the process. 4.4 Making a Telephone Call Over the Internet For models with phone port(s), you can make a call over the Internet using the WiMAX Device.
  • Page 39 Chapter 4 Tutorials Click Save to save your settings. Click VoIP > Account > SIP. Select the Enable checkbox and enter the parameters provided in the SIP Account section. Click Save to save your settings. Click VoIP > Account > Status. Click Connect to to register the WiMAX Device to the register server.
  • Page 40: Blocking Web Access From The Wimax Device

    Chapter 4 Tutorials 4.5 Blocking Web Access from the WiMAX Device If your WiMAX Device is in a home or office environment you may decide that you want to block an Internet website access. You may need to block both the website’s IP address and domain name. Goal: Configure the WiMAX Device’s content filter to block a website with a domain name www.example.com.
  • Page 41 Chapter 4 Tutorials First of all, you have to know the MAC address of the computer. If not, you can look for the MAC address in the Network Setting > LAN > DHCP screen. (192.168.100.3 mapping to 00:02:E3:53:16:95 in this example). Click Security >...
  • Page 42: Allowing Internet Users To Use Internal Servers

    Chapter 4 Tutorials An empty entry appears. Enter the computer’s MAC address in the Source MAC field and leave the other fields set to their defaults. Click Save. The computer will no longer be able to access any host on the WiMAX network through the WiMAX Device.
  • Page 43 Chapter 4 Tutorials NAT mode is required to use port forwarding. Click Network Setting > WAN and make sure NAT is selected in the Operation Mode field. Click Save. Click Network Setting > NAT > Port Forwarding and then click the first entry to edit the rule. Configure the screen as follows to open TCP/UDP port 53 for the Xbox 360.
  • Page 44: Access The Wimax Device With A Domain Name

    Chapter 4 Tutorials Repeat steps 2 and 3 to open the rest of the ports for the Xbox 360. The port forwarding settings you configured are listed in the Port Forwarding screen. Click Save. Thomas can then connect his Xbox 360 to the Internet and play online games with his friends. In this tutorial, all port 80 traffic is forwarded to the Xbox 360, but port 80 is also the default listening port for remote management via WWW.
  • Page 45: Registering A Ddns Account On Www.dyndns.org

    Chapter 4 Tutorials changes dynamically. Dynamic DNS (DDNS) allows you to access the WiMAX Device using a domain name. http://mywimax.dyndns.org a.b.c.d w.x.y.z To use this feature, you have to apply for DDNS service at www.dyndns.org. This tutorial covers: • Registering a DDNS Account on www.dyndns.org •...
  • Page 46: Configuring Ddns On Your Wimax Device

    Chapter 4 Tutorials 4.8.2 Configuring DDNS on Your WiMAX Device Configure the following settings in the Network Setting > DDNS screen. Select Enable Dynamic DNS. Select dyndns.org for the service provider. Select Dynamic for the service type. Type mywimax.dyndns.org in the Domain Name field. Enter the user name (UserName1) and password (12345).
  • Page 47 Chapter 4 Tutorials In the following figure, router R is connected to the WiMAX Device’s LAN. R connects to two networks, N1 (192.168.1.x/24) and N2 (192.168.10.x/24). If you want to send traffic from computer A (in N1 network) to computer B (in N2 network), the traffic is sent to the WiMAX Device’s WAN default gateway by default.
  • Page 48: Remotely Managing Your Wimax Device

    Chapter 4 Tutorials Table 10 IP Settings in this Tutorial DEVICE / COMPUTER IP ADDRESS R’s IP address on N2 192.168.10.2 192.168.10.33 To configure a static route to route traffic from N1 to N2: Click Network Setting > Route > Static Route. Click Add to create a new route.
  • Page 49: Changing Certificate To Communicate With Other Networks

    Chapter 4 Tutorials Open the Maintenance > Remote MGMT > HTTP screen. Select Enable in both HTTP Server and HTTPS Server sections and leave the Port Number settings as “80” and “443”. Select Allow Connection from WAN. This allows remote management connections not only from the local network but also the WAN network (Internet).
  • Page 50: Using Virtual Networks

    Chapter 4 Tutorials Configure your new Internet access settings based on the information provided by the ISP. Note: You can also use the Internet Connection Wizard to configure the Internet access settings. You may need to configure the Options section according to the information provided by the ISP. Click Save.
  • Page 51: Scenario 1

    Chapter 4 Tutorials Click Network Setting > WAN. Change the WiMAX Device to bridge mode and then click Save. If you cannot obtain IP address settings from a WAN DHCP server, select User as the Get IP Method and enter the WAN IP Address, WAN IP Subnet Mask and Gateway IP Address. 4.12.1 Scenario 1 In this scenario, PC A is connected directly to interface LAN1 on the WiMAX Device.
  • Page 52: Scenario 2

    Chapter 4 Tutorials Configure the Link Type, PVID and Tag/Untag settings for the interfaces as below by clicking each row. Then press OK. Next, configure the Name, VID and Ports for the Filter Setting. The WiMAX Device will tag packets it receives on each interface so that they are recognized in VLAN 5. Tagged packets will be untagged when they are forwarded out of each interface since the devices attached to these interfaces do not support VLAN tagged packets.
  • Page 53 Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC A on the LAN would be tagged to VLAN 5. Figure 17 VLAN Configuration Example 2 No VLAN Tag VLAN TagID = 5...
  • Page 54 Chapter 4 Tutorials Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links, so the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives on these interfaces from the VLAN supporting switches. VLAN tagged packets will also be forwarded out of these interfaces.
  • Page 55 Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC A on the LAN would be tagged to VLAN 5. Figure 18 VLAN Configuration Example 3 No VLAN Tag VLAN TagID = 5...
  • Page 56: Scenario 4

    Chapter 4 Tutorials Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links, so the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives on these interfaces from the VLAN supporting switches. VLAN tagged packets will also be forwarded out of these interfaces.
  • Page 57 Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC B on the LAN would be tagged to VLAN 5. Figure 19 VLAN Configuration Example 4 VLAN TagID = 5 VLAN TagID = 5...
  • Page 58: Scenario 5

    Chapter 4 Tutorials Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links. On the WiMAX interface, the WiMAX Device will recognize VLAN 5 tagged packets it receives from the VLAN supporting switch. VLAN tagged packets will also be forwarded out of this interface.
  • Page 59 Chapter 4 Tutorials Note: You will need to configure the VLAN supporting switches to tag the received packets with the appropriate VLAN IDs. For example, packets received on switch S1 from PC C on the LAN would be tagged to VLAN 10. Figure 20 VLAN Configuration Example 5 VLAN TagID = 5 VLAN TagID = 5...
  • Page 60 Chapter 4 Tutorials Next, configure the Name, VID and Ports for the Filter Setting. Interfaces LAN1 and WiMAX are Trunk links. On the WiMAX interface the WiMAX Device will recognize VLAN 5 and VLAN 10 tagged packets it receives from the VLAN supporting switch. VLAN tagged packets will also be forwarded out of these interfaces.
  • Page 61: Technical Reference

    Technical Reference...
  • Page 63: System Status

    H A PT ER System Status 5.1 Overview Use this screen to view a summary of your WiMAX Device connection status. 5.2 System Status This screen allows you to view the current status of the device, system resources, and interfaces (LAN and WAN).
  • Page 64 Chapter 5 System Status The following tables describe the labels in this screen. Table 11 Status LABEL DESCRIPTION System Information System Model This field displays the WiMAX Device system model name. It is used for Name identification. Software This field displays the Web Configurator version number. Version CROM Version This field displays the CROM version number.
  • Page 65 Chapter 5 System Status Table 11 Status (continued) LABEL DESCRIPTION Status This field indicates the status of the WAN connection to the WiMAX Device. MAC Address This field indicates the MAC address of the port making the WAN connection on the WiMAX Device.
  • Page 66 Chapter 5 System Status WiMAX Device Configuration User’s Guide...
  • Page 67: Wimax

    H A PT ER WiMAX 6.1 Overview This chapter shows you how to set up and manage the connection between the WiMAX Device and your ISP’s base stations. 6.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. WiMAX WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 wireless networking standard, which provides high-bandwidth, wide-range wireless service across wireless Metropolitan...
  • Page 68 Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations. Numerous subscriber stations and mobile stations connect to the network through a single base station (BS), as in the following figure. Figure 23 WiMAX: Multiple Mobile Stations A base station’s coverage area can extend over many hundreds of meters, even under poor conditions.
  • Page 69 Chapter 6 WiMAX Frequency Ranges The following figure shows the WiMAX Device searching a range of frequencies to find a connection to a base station. Figure 25 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Device is capable of using to transmit and receive (see the Product Specifications appendix for details).
  • Page 70: Connection Settings

    Chapter 6 WiMAX • PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses 64 ASCII characters to convert a binary PKCS#7 certificate into a printable form. CINR Carrier to Interference-plus-Noise Ratio (CINR) measures the effectiveness of a wireless signal and plays an important role in allowing the WiMAX Device to decode signal burst.
  • Page 71 Chapter 6 WiMAX Click WiMAX > Profile > Connection Settings to open this screen as shown next. Figure 26 Connection Settings Screen This screen contains the following fields: Table 12 Connection Settings LABEL DESCRIPTION Connection Option Settings Auto Select the interval in seconds that the WiMAX Device waits after getting Reconnect disconnected from the base station before attempting to reconnect.
  • Page 72: Frequency Settings

    Chapter 6 WiMAX Table 12 Connection Settings (continued) LABEL DESCRIPTION Mode Select Select how the WiMAX Device connects to the base station. • Auto Connect Mode - The device connects automatically to the first base station in range. • Network Search Mode - The device scans for available base stations then connects to the best one it can.
  • Page 73 Chapter 6 WiMAX Click WiMAX > Profile > Frequency Settings to open this screen as shown next. Figure 27 Frequency Settings Screen (By List) Figure 28 Frequency Settings Screen (By Range) This screen contains the following fields: Table 13 Frequency Settings LABEL DESCRIPTION Setting Type...
  • Page 74: Authentication Settings

    Chapter 6 WiMAX Table 13 Frequency Settings (continued) LABEL DESCRIPTION Bandwidth This displays the bandwidth of the frequency band in megahertz (MHz). If you (MHz) set a center frequency to 2600000 KHz with the bandwidth of 10 MHz, then the frequency band is from 2595000 to 2605000 KHz.
  • Page 75 Chapter 6 WiMAX Click WiMAX > Profile > Authentication Settings to open this screen as shown next. Figure 29 Authentication Settings Screen WiMAX Device Configuration User’s Guide...
  • Page 76 Chapter 6 WiMAX This screen contains the following fields: Table 14 Authentication Settings LABEL DESCRIPTION Authentication Select the authentication mode from the list. Mode The WiMAX Device supports the following authentication modes: • No authentication • User authentication • Device authentication •...
  • Page 77: Channel Plan Settings

    Chapter 6 WiMAX Table 14 Authentication Settings (continued) LABEL DESCRIPTION Inner Mode Sets the EAP-TTLS inner mode. The WiMAX Device supports the following: • MS-CHAP v2 - This is version 2 of Microsoft’s variant of Challenge Handshake Authentication Protocol (CHAP). It allows for mutual authentication between devices.
  • Page 78 Chapter 6 WiMAX Home NSP). Through the NAP’s base station, which is identified by a NAP-ID, the subscriber’s WiMAX Device can access the Internet through a network service provider (NSP). Access can be through another network service provider (Visited-Network Service Provider or V-NSP) or his own network service provider (Home NSP), depending on his service agreement.
  • Page 79: Capl Settings

    Chapter 6 WiMAX This screen contains the following fields: Table 15 Channel Plan Settings LABEL DESCRIPTION Channel Plan Settings - You can configure multiple ranges of frequencies to scan for different NAPs. The configured frequency ranges to scan must be within the Valid Band. Specify the Channel Plan to scan for each NAP on the CAPL Settings: Add screen (Section 6.6.1 on page 80).
  • Page 80: Capl Settings: Add

    Chapter 6 WiMAX This screen contains the following fields: Table 16 CAPL Settings LABEL DESCRIPTION NAP ID This displays the NAP ID. Priority This displays the priority for the NAP ID. Channel Plan ID This displays the Channel Plan ID. Delete Click this button to remove an item from the list.
  • Page 81: Rapl Settings

    Chapter 6 WiMAX Table 17 CAPL Settings: Add (continued) LABEL DESCRIPTION This indicates the end of the frequency band in kilohertz (KHz). Frequency (KHz) Step (KHz) This indicates the frequency step within each band in kilohertz (KHz). Bandwidth This indicates the bandwidth in megahertz (MHz). (MHz) Click this button to save any changes made to the list.
  • Page 82: Home Nsp Settings

    Chapter 6 WiMAX 6.8 Home NSP Settings On this screen, you can configure settings for the Home NSP. The Home NSP can authenticate and authorize connections and may support roaming through relationships with other NSPs. Click WiMAX > ND&S > Home NSP Settings to open this screen as shown next. Figure 35 Home NSP Settings This screen contains the following fields: Table 19 Home NSP Settings...
  • Page 83: Connect

    Chapter 6 WiMAX Table 19 Home NSP Settings (continued) LABEL DESCRIPTION Save Click this button to save any changes made to the list. Note: If you change the NDS Mode, the WiMAX Device will reboot when you click save. Cancel Click this avoid any changes made from being saved to your configuration.
  • Page 84 Chapter 6 WiMAX This screen contains the following fields: Table 20 Connect LABEL DESCRIPTION Applied Frequency Information This table shows the scanning result you made in the WiMAX > Profile > Frequency Settings and WiMAX > Wide Scan screens. Note: You cannot see the wide scanning result that you made in WiMAX > Wide Scan screen if the Join Wide Scan Result is set to No in the WiMAX >...
  • Page 85: Wide Scan

    Chapter 6 WiMAX Table 20 Connect (continued) LABEL DESCRIPTION RSSI (dBm) This field displays the Received Signal Strength Indication (RSSI), which is an overall measurement of radio signal strength. A higher RSSI level indicates a stronger signal. CINR (dB) R3/ This field displays the average Carrier to Interference plus Noise Ratio for the current connection.
  • Page 86 Chapter 6 WiMAX Click WiMAX > Wide Scan to open this screen as shown next. Figure 37 Wide Scan Screen This screen contains the following fields: Table 21 Wide Scan LABEL DESCRIPTION Wide Scan Settings Auto Wide Use this to enable (Yes) or disable (No) automatically scanning for base Scan stations.
  • Page 87: Link Status

    Chapter 6 WiMAX 6.11 Link Status This screen provides a general overview of the current WiMAX connection with the service provider. Click WiMAX > Link Status to open this screen as shown next. Figure 38 Link Status Screen This screen contains the following fields: Table 22 Link Status LABEL DESCRIPTION...
  • Page 88: Link Statistics

    Chapter 6 WiMAX Table 22 Link Status (continued) LABEL DESCRIPTION Handover Fail This field displays how many times the WiMAX Device had been failed to switch its connection from one base station to another base station, since the WiMAX Device last restarted. Handover This field displays the maximum latency for switching connections from one base Maximum Latency...
  • Page 89: Connection Info

    Chapter 6 WiMAX This screen contains the following sections: Table 23 Link Statistics LABEL DESCRIPTION Link This section provides a detailed overview of link statistics. HARQ This section provides a detailed overview of Hybrid Automatic Repeat Request link statistics. TX/RX This section provides a detailed overview of transmission and receiving link statistics.
  • Page 90 Chapter 6 WiMAX This screen contains the following fields: Table 25 Service Flow LABEL DESCRIPTION SFID This displays a 32-bit service flow identifier. SF Status This display the service flow status. SF Direction This displays the service flow direction. WiMAX Device Configuration User’s Guide...
  • Page 91: Network Setting

    H A PT ER Network Setting 7.1 Overview This chapter shows you how to configure the WiMAX Device’s network setting. 7.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. IP Address IP addresses identify individual devices on a network.
  • Page 92 Chapter 7 Network Setting If the Primary and Secondary DNS Server fields are not specified, for instance, left as 0.0.0.0, the WiMAX Device tells the DHCP clients that it itself is the DNS server. When a computer sends a DNS query to the WiMAX Device, the WiMAX Device forwards the query to the real DNS server learned through IPCP and relays the response back to the computer.
  • Page 93 Chapter 7 Network Setting 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 42 Multiple Servers Behind NAT Example Trigger Ports Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side.
  • Page 94: Wan

    Chapter 7 Network Setting UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP compatible device installed on your network will appear as a separate icon. Selecting the icon of a UPnP device will allow you to access the information and properties of that device. NAT Traversal UPnP NAT traversal automates the process of allowing an application to operate through NAT.
  • Page 95 Chapter 7 Network Setting Click Network Setting > WAN to open this screen as shown next. Figure 43 WAN Screen This screen contains the following fields: Table 26 WAN LABEL DESCRIPTION Operation Mode Select the WiMAX Device’s operational mode. • Bridge - This puts the WiMAX Device in bridge mode, acting as a transparent middle man between devices on the LAN and the devices on the WAN.
  • Page 96: Pppoe

    Chapter 7 Network Setting Table 26 WAN (continued) LABEL DESCRIPTION WAN IP Request Enter the number of seconds the WiMAX Device waits for an IP from the ISP Timeout before it times out. WAN IP Address If the WiMAX Device gets its IP from the user, enter the IP address it is to use. WAN IP Subnet If the WiMAX Device gets its IP from the ISP, enter the IP address it is to use.
  • Page 97: Gre

    Chapter 7 Network Setting This screen contains the following fields: Table 27 PPPoE LABEL DESCRIPTION User Name Enter the username for PPPoE login into the WAN network. Password Enter the password for PPPoE login into the WAN network. Retype Password Retype the password to confirm it.
  • Page 98: Etherip

    Chapter 7 Network Setting This screen contains the following fields: Table 28 GRE LABEL DESCRIPTION Peer IP Address Enter the IP address of the GRE peer. 7.5 EtherIP Use these settings to configure the peer setting of the EtherIP tunnel between the WiMAX Device and another EtherIP peer.
  • Page 99: Dhcp

    Chapter 7 Network Setting 7.7 DHCP Use these settings to configure whether the WiMAX Device functions as a DHCP server for your local network, or a DHCP relay between the local network and the service provider. You can also disable the DHCP functions.
  • Page 100: Wlan

    Chapter 7 Network Setting Table 31 DHCP (continued) LABEL DESCRIPTION Lease Time Enter the duration in minutes that devices on the LAN retain their DHCP-issued IP addresses. At the end of the lease time, they poll the WiMAX Device for a renewed or replacement IP.
  • Page 101 Chapter 7 Network Setting Click Network Setting > WLAN to open this screen as shown next. Figure 49 WLAN Screen This screen contains the following fields: Table 32 WLAN LABEL DESCRIPTION WiFi Settings Enable WLAN Select this to activate the wireless LAN. WLAN Mode Select 802.11B/G mixed to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the WiMAX Device.
  • Page 102: Wps

    Chapter 7 Network Setting Table 32 WLAN (continued) LABEL DESCRIPTION SSID WEP Settings Note: You will only see these options if you selected WEP as the Encryption Type. Authentication Select the type of authentication used to join the network: OPEN SYSTEM or Method SHARED KEY.
  • Page 103: Mac Address Filter

    Chapter 7 Network Setting This screen contains the following fields: Table 33 WPS LABEL DESCRIPTION Enable WPS Select Enable and click Apply to activate WPS on the WiMAX Device. Select Disable and click Apply to deactivate WPS. Start WPS PBC This field is available after you select Enable in the Enable WPS field and click Apply.
  • Page 104: Static Route

    Chapter 7 Network Setting Table 34 MAC Address Filter (continued) LABEL DESCRIPTION Enter the MAC addresses of the wireless devices that are allowed or MAC Address denied access to the WiMAX Device in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc.
  • Page 105: Rip

    Chapter 7 Network Setting Click Add in the Network Setting > Route > Static Route screen to open this screen as shown next. Figure 53 Static Route Screen This screen contains the following fields: Table 36 Static Route LABEL DESCRIPTION Destination IP Enter the destination IP address of the static route.
  • Page 106 Chapter 7 Network Setting Click Network Setting > Route > RIP to open this screen as shown next. Figure 54 RIP Screen This screen contains the following fields: Table 37 RIP LABEL DESCRIPTION General Setup Enable Select this to enable RIP on the WiMAX Device. Redistribute Active This indicates whether a route is being redistributed.
  • Page 107: Port Forwarding

    Chapter 7 Network Setting Table 37 RIP (continued) LABEL DESCRIPTION Authentication Use this option to enable or disable RIP authentication. Authentication ID Enter the authentication ID to use for RIP authentication. Authentication Enter the authentication key to use for RIP authentication. 7.14 Port Forwarding Use these settings to forward incoming service requests to the ports on your local network.
  • Page 108: Port Forwarding Wizard

    Chapter 7 Network Setting 7.14.1 Port Forwarding Wizard Use this wizard to set up a port forwarding rule for incoming service requests to the ports on your local network. Click Network Setting > NAT > Port Forwarding > Wizard to open this screen as shown next. Figure 56 Port Forwarding Wizard Screen This screen contains the following fields: Table 39 Port Forwarding Wizard...
  • Page 109 Chapter 7 Network Setting Click Network Setting > NAT > Port Trigger to open this screen as shown next. Figure 57 Port Trigger Screen This screen contains the following fields: Table 40 Port Trigger LABEL DESCRIPTION Active This indicates whether the port trigger rule is active or not. Name The displays the name of the port trigger rule.
  • Page 110: Port Trigger Wizard

    Chapter 7 Network Setting 7.15.1 Port Trigger Wizard Use the wizard to create a port trigger rules that will allow the WiMAX Device to automate port forwarding and allow computers on local network to provide services that would normally require a fixed address on the local network.
  • Page 111: Trigger Port Forwarding Example

    Chapter 7 Network Setting 7.15.2 Trigger Port Forwarding Example The following is an example of trigger port forwarding. In this example, J is Jane’s computer and S is the Real Audio server. Figure 59 Trigger Port Forwarding Example Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger”...
  • Page 112: Alg

    Chapter 7 Network Setting Note: The configuration you set in this screen takes priority than the Network Setting > NAT > Port Forwarding screen. Figure 60 DMZ Screen This screen contains the following fields: Table 42 DMZ LABEL DESCRIPTION DMZ Enable Click this check box to enable DMZ.
  • Page 113: Qos

    Chapter 7 Network Setting Table 43 ALG (continued) LABEL DESCRIPTION Enable RTSP ALG Turns on the RTSP ALG to detect RTSP traffic and helps build RTSP sessions through the WiMAX Device’s NAT. Enable SIP ALG Turns on the SIP ALG to detect SIP traffic and helps build SIP sessions through the WiMAX Device’s NAT.
  • Page 114: Installing Upnp In Windows Xp

    Chapter 7 Network Setting Click Network Setting > UPnP to open this screen as shown next. Figure 63 UPnP Screen This screen contains the following fields: Table 45 UPnP LABEL DESCRIPTION Enable UPnP Select this to enable UPnP on the WiMAX Device. Enable NAT-PMP Select this to enable NAT Port Mapping Protocol on the WiMAX Device.
  • Page 115 Chapter 7 Network Setting The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. In the Networking Services window, select the Universal Plug and Play check box. Click OK to go back to the Windows Optional Networking Component Wizard window and click Next.
  • Page 116 Chapter 7 Network Setting Right-click the icon and select Properties. In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. WiMAX Device Configuration User’s Guide...
  • Page 117 Chapter 7 Network Setting You may edit or delete the port mappings or click Add to manually add port mappings. When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 118: Web Configurator Easy Access

    Chapter 7 Network Setting 7.19.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the WiMAX Device without finding out the IP address of the WiMAX Device first. This becomes helpful if you do not know the IP address of the WiMAX Device.
  • Page 119: Vlan

    Chapter 7 Network Setting Right-click on the icon for your WiMAX Device and select Properties. A properties window displays with basic information about the WiMAX Device. 7.20 VLAN Use this screen to configure port-based VLAN settings on the WiMAX Device. This screen allows you to assign port(s) to specific virtual LAN(s) in order to isolate traffic from different VLAN groups.
  • Page 120 Chapter 7 Network Setting Click Network Setting > VLAN to open the screen as shown next. Figure 64 VLAN Screen This screen contains the following fields: Table 46 VLAN LABEL DESCRIPTION VLAN Utility Enable VLAN Select Yes to enable the VLAN function on the WiMAX Device. Note: To use VLAN on the WiMAX Device, you must switch the operation mode to “bridge”...
  • Page 121: Ddns

    Chapter 7 Network Setting Table 46 VLAN (continued) LABEL DESCRIPTION Priority Enter a priority level (1~7) that the WiMAX Device assigns to packets belonging to this VLAN. Enter “0” for no priority assigned. Select Yes if the CFI (Canonical Format Indicator) field in a received packet is set to 1, indicating non-Canonical Format.
  • Page 122 Chapter 7 Network Setting Click Network Setting > DDNS Figure 65 DDNS Screen This screen contains the following fields: Table 47 DDNS LABEL DESCRIPTION Enable Dynamic Select this to enable dynamic DNS on the WiMAX Device. Service Provider Select the dynamic DNS service provider for the WiMAX Device. Service Type Select the dynamic DNS service type.
  • Page 123: Igmp Proxy

    Chapter 7 Network Setting 7.22 IGMP Proxy IGMP proxy allows the WiMAX Device to get subscribing information and maintain a joined member list for each multicast group. It can reduce multicast traffic significantly. Use this screen to enable IGMP Proxy on the WiMAX Device. Click Network Setting >...
  • Page 124 Chapter 7 Network Setting This screen contains the following fields: Table 49 Content Filter LABEL DESCRIPTION URL List Enable URL Select this employ the content filter to allow (“whitelist”) or block (“blacklist”) Filter specific URL connections made through the WiMAX Device. Blacklist/ Select whether the current filtering applies to the blacklist (sites that are Whitelist...
  • Page 125: Security

    H A PT ER Security 8.1 Overview This chapter shows you how to configure the WiMAX Device’s network settings. 8.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. About the WiMAX Device’s Security Features The WiMAX Device security features are designed to protect against Denial of Service attacks when activated as well as block access to and from specific URLs and MAC addresses.
  • Page 126: Mac Filter

    Chapter 8 Security This screen contains the following fields: Table 50 IP Filter LABEL DESCRIPTION Active Indicates whether the current IP filter is active or not. Source IP This displays the source IP address for the IP filter rule. Click Add to create a new, empty rule, then enter the incoming IP address for the WiMAX Device to block.
  • Page 127: Ddos

    Chapter 8 Security Click Security > Firewall > MAC Filter to open this screen as shown next. Figure 69 MAC Filter Screen This screen contains the following fields: Table 51 MAC Filter LABEL DESCRIPTION Blacklist/Whitelist Select either whitelist or blacklist for viewing and editing. Source MAC This displays the source MAC for the MAC filter rule.
  • Page 128 Chapter 8 Security Click Security > Firewall > DDOS to open this screen as shown next. Figure 70 DDOS Screen This screen contains the following fields: Table 52 DDOS LABEL DESCRIPTION Prevent from TCP Select this to monitor for and block TCP SYN flood attacks. SYN Flood A SYN flood is one type of denial of service attack where an overwhelming number of SYN requests assault a client device.
  • Page 129: Pptp Vpn Server

    Chapter 8 Security Table 52 DDOS (continued) LABEL DESCRIPTION Prevent from Select this to monitor for and block ping of death attacks. PING of Death A Ping of Death (POD) attack is one where larger-than-allowed ping packets are fragmented then sent against a client device. This results in the client device suffering from a buffer overflow and subsequent system crash.
  • Page 130: Pptp Vpn Client

    Chapter 8 Security Table 53 PPTP Server (continued) LABEL DESCRIPTION Auth Protocol Select the Authentication Protocol allowed for the connection. Options are: • PAP - Password Authentication Protocol (PAP) authentication occurs in clear text and does not use encryption. It’s probably not a good idea to rely on this for security.
  • Page 131: Pptp Vpn Client: Add

    Chapter 8 Security Click Security > PPTP VPN > PPTP Client to open this screen as shown next. Figure 72 PPTP Client This screen contains the following fields: Table 54 PPTP Client LABEL DESCRIPTION This is the index number of the connection. Profile Name This is the name of this client connection.
  • Page 132 Chapter 8 Security Click Security > PPTP VPN > PPTP Client > Add to open this screen as shown next. Figure 73 PPTP Client: Add This screen contains the following fields: Table 55 PPTP Client: Add LABEL DESCRIPTION Profile Name Enter the name for this client connection.
  • Page 133: L2Tp Vpn Server

    Chapter 8 Security Table 55 PPTP Client: Add (continued) LABEL DESCRIPTION Get IP Select Yes to have the PPTP server assign a local IP address to the client. automatically Assign IP Address Enter the IP address for the client. Ensure that the IP address is configured to be allowed on the PPTP server.
  • Page 134 Chapter 8 Security Table 56 L2TP Server (continued) LABEL DESCRIPTION Support Select the L2TP Protocol Version: All, 2, or 3. L2TPv2 is a standard method for Protocol tunneling Point-to-Point Protocol (PPP) while L2TPv3 provides improved support Version for other types of networks including frame relay and ATM. Auth Protocol Select the Authentication Protocol allowed for the connection.
  • Page 135: L2Tp Vpn Client

    Chapter 8 Security Table 56 L2TP Server (continued) LABEL DESCRIPTION Link Time(s) This displays the duration of the L2TP connection. Disconnect Select a client and click this button to disconnect the selected client. 8.9 L2TP VPN Client Use this screen to view settings for Layer 2 Tunneling Protocol (L2TP) clients. Click Security >...
  • Page 136 Chapter 8 Security Click Security > L2TP VPN > L2TP Client > Add to open this screen as shown next. Figure 76 L2TP Client: Add This screen contains the following fields: Table 58 L2TP Client: Add LABEL DESCRIPTION Profile Name Enter the name for this client connection.
  • Page 137: Ipsec Vpn

    Chapter 8 Security Table 58 L2TP Client: Add (continued) LABEL DESCRIPTION Password Enter the password for connecting to the L2TP server. Retype Retype the password for connecting to the L2TP server. Get IP Select Yes to have the L2TP server assign a local IP address to the client. automatically Assign IP Address Enter the IP address for the client.
  • Page 138 Chapter 8 Security Table 59 IPSec VPN (continued) LABEL DESCRIPTION Remote Network This displays the single (static) IP address on the LAN behind the remote IPSec router or the IP address and subnet mask of a network behind the remote IPSec router.
  • Page 139: Ipsec Vpn: Add

    Chapter 8 Security 8.11.1 IPSec VPN: Add Use these settings. Click Security > IPSec VPN > Add to open this screen as shown next. Figure 79 IPSec VPN: Add WiMAX Device Configuration User’s Guide...
  • Page 140 Chapter 8 Security This screen contains the following fields: Table 60 IPSec VPN: Add LABEL DESCRIPTION Property Enable Select Enable to activate this VPN policy. Connection Enter the name of the VPN connection. Name Connection Select the scenario that best describes your intended VPN connection. Type •...
  • Page 141 Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION Remote ID Select IP to identify the remote IPSec router by its IP address. Type Select Domain Name to identify the remote IPSec router by a domain name. Select E-mail to identify the remote IPSec router by an e-mail address. Content The configuration of the remote content depends on the remote ID type.
  • Page 142 Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION SA Life Time Type the maximum number of seconds the IKE SA can last. When this time has passed, the WiMAX Device and remote IPSec router have to update the encryption and authentication keys and re-negotiate the IKE SA.
  • Page 143 Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION Address Type Select Single address or Subnet address to specify if the VPN connection terminates at an IP address or subnet. Start IP If Single address is selected, enter a (static) IP address on the LAN behind the Address remote IPSec’s router.
  • Page 144: Technical Reference

    Chapter 8 Security Table 60 IPSec VPN: Add (continued) LABEL DESCRIPTION Perfect Select whether or not you want to enable Perfect Forward Secrecy (PFS). Forward Secrecy (PFS) PFS changes the root key that is used to generate encryption keys for each IPSec SA.
  • Page 145: Encapsulation

    Chapter 8 Security The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for the AH and ESP protocols. Key Management Key management allows you to determine whether to use IKE (ISAKMP) or manual key configuration in order to set up a VPN. 8.12.2 Encapsulation The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode.
  • Page 146: Ike Phases

    Chapter 8 Security • Inside header: The inside IP header contains the destination IP address of the final system behind the VPN gateway. The security protocol appears after the outer IP header and before the inside IP header. 8.12.3 IKE Phases There are two phases to every IKE (Internet Key Exchange) negotiation –...
  • Page 147: Negotiation Mode

    Chapter 8 Security 8.12.4 Negotiation Mode The phase 1 Negotiation Mode you select determines how the Security Association (SA) will be established for each connection through IKE negotiations. • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1).
  • Page 148: Vpn, Nat, And Nat Traversal

    Chapter 8 Security 8.12.6 VPN, NAT, and NAT Traversal NAT is incompatible with the AH protocol in both transport and tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet, but a NAT device between the IPSec endpoints rewrites the source or destination address.
  • Page 149 Chapter 8 Security enables the WiMAX Device to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. Regardless of the ID type and content configuration, the WiMAX Device does not allow you to save multiple active rules with overlapping local and remote IP addresses.
  • Page 150: Pre-Shared Key

    Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). It is called “pre-shared” because you have to share it with another party before you can communicate with them over a secure connection.
  • Page 151: The Voip General Screens

    H A PT ER The VoIP General Screens 9.1 VoIP Overview The features mentioned in this chapter are for models that has phone port(s) and you can make telephone calls over the Internet using the WiMAX Device. The VOICE > General screens allow you to set up global SIP and Quality of Service (QoS) settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol.
  • Page 152: Before You Begin

    Chapter 9 The VoIP General Screens Type Of Service (ToS) Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Device) so a server can decide the best method of delivery, that is the least cost, fastest route and so on.
  • Page 153: Media

    Chapter 9 The VoIP General Screens 9.2 Media Click VoIP > General > Media to set up and maintain global VoIP settings. Figure 84 Media The following table describes the labels in this screen. Table 66 Media LABEL DESCRIPTION Port Range Media Port Start Enter the listening port number(s) for RTP traffic on the WiMAX Device, if your VoIP service provider gave you this information.
  • Page 154: Qos

    Chapter 9 The VoIP General Screens Table 66 Media (continued) LABEL DESCRIPTION Packet Loss Packets may be dropped due to an overwhelming amount of traffic on the Concealment network. Some degree of packet loss will not be noticeable to the end user, but as packet loss increases the quality of sound degrades.
  • Page 155: Sip Settings

    Chapter 9 The VoIP General Screens 9.4 SIP Settings Click VoIP > General > SIP to set up session timer on the WiMAX Device. See Section 10.8 on page 167 for more information on SIP. Figure 86 SIP The following table describes the labels in this screen. Table 68 SIP LABEL DESCRIPTION...
  • Page 156: Technical Reference

    Chapter 9 The VoIP General Screens Table 69 Speed Dial (continued) LABEL DESCRIPTION Short Number This field displays the abbreviated number you want to use to substitute for the real (actual) phone number in the following Real Number field. When the rule is activated, you can press the assigned Short Number to dial the Real Number.
  • Page 157: The Voip Account Screens

    HAPTER The VoIP Account Screens 10.1 Overview The features mentioned in this chapter are for models with VoIP function. Use the VoIP > Account 1 (or Account 2) screens to configure your VoIP account information on the WiMAX Device. You need to have a VoIP account set up first. Note: If your WiMAX Device has only one phone port, there is only one account.
  • Page 158 Chapter 10 The VoIP Account Screens SIP User Agent A SIP user agent can make and receive VoIP telephone calls. This means that SIP can be used for peer-to-peer communications even though it is a client-server protocol. In the following figure, either A or B can act as a SIP user agent client to initiate a call.
  • Page 159 Chapter 10 The VoIP Account Screens The WiMAX Device uses the public IP address and port number in the SIP packets that it sends to the SIP server (C). Figure 91 STUN Outbound Proxy Your VoIP service provider may host a SIP outbound proxy server to handle all of the WiMAX Device’s VoIP traffic.
  • Page 160: Status

    Chapter 10 The VoIP Account Screens 10.2 Status Click VoIP > Account 1 (or Account 2) > Status to view VoIP settings and current status. Figure 92 Status The following table describes the labels in this screen. Table 70 Status LABEL DESCRIPTION Server Status...
  • Page 161: Server

    Chapter 10 The VoIP Account Screens Table 70 Status (continued) LABEL DESCRIPTION Account This indicates whether the SIP account is activated or not. Enable means Status activated and Disable means deactivated. Phone Status This field displays the phone status, such as Idle, Calling, Ringing, Connecting, InCall, Hold, and Disconnecting.
  • Page 162 Chapter 10 The VoIP Account Screens Table 71 Server (continued) LABEL DESCRIPTION SIP Service Enter the IP address or domain name of a SIP server, if your VoIP service Domain provider gave you one. Otherwise, enter the same address that you have entered in the Registrar Server field.
  • Page 163: Sip

    Chapter 10 The VoIP Account Screens 10.4 SIP Click VoIP > Account 1 (or Account 2) > SIP to configure SIP settings. Figure 94 SIP The following table describes the labels in this screen. Table 72 SIP LABEL DESCRIPTION SIP Account Enable Select this if you want the WiMAX Device to use this account.
  • Page 164 Chapter 10 The VoIP Account Screens Table 72 SIP (continued) LABEL DESCRIPTION 1st Codec, 2nd Select the WiMAX Device’s first, second, and third choices of the type of voice Codec, 3rd coder/decoder (codec) that you want the phone line to use when Codec communicating with the SIP server.
  • Page 165: Feature

    Chapter 10 The VoIP Account Screens 10.5 Feature Click VoIP > Account 1 (or Account 2) > Feature to configure advanced VoIP features such as DTMF, Call Forwarding and Call Waiting. Figure 95 Feature The following table describes the labels in this screen. Table 73 Feature LABEL DESCRIPTION...
  • Page 166: Dialing

    Chapter 10 The VoIP Account Screens Table 73 Feature (continued) LABEL DESCRIPTION MWI (Message Select this to enable Message Waiting Indicator (MWI) function for this SIP Waiting account specified in Section 10.4 on page 163. When there is at least one new Indication) voice mail for the SIP account, the voice LED turns yellow and the WiMAX Device sends a beeping tone to the phone while user picks-up the phone to...
  • Page 167: Fax

    Chapter 10 The VoIP Account Screens The following table describes the labels in this screen. Table 74 Dialing LABEL DESCRIPTION Inter-digit Set the time in seconds (1~5) the WiMAX Device waits for each digit input of a Timeout complete callee number after you press the first key on the phone. If the WiMAX Device cannot receive the next digit entered within this time period, the WiMAX Device processes digits you have dialed.
  • Page 168 Chapter 10 The VoIP Account Screens uses proxy server P. Messages include Session Expiry (SE) and Minimum Session Expiry (MSE) time values. When the duration of the call reaches half of the SE time period, the session is refreshed. Table 76 SIP Call Progression 1.
  • Page 169 Chapter 10 The VoIP Account Screens Table 76 SIP Call Progression (continued) 13. UPDATE SE: 3600 ------------------> 14. UPDATE SE:3600 -----------------------> --------------------> 15. OK SE: 3600 <---------------------- <------------------- 16. OK SE: 3600 <------------------ 17. BYE ------------------> 18. OK <------------------- A sends a SIP INVITE request. This message is an invitation for B to participate in a SIP telephone call.
  • Page 170: Sip Client Server

    Chapter 10 The VoIP Account Screens 14 The UPDATE request is forwarded by P to B. 15 B receives the UPDATE request and responds with an OK message. 16 The OK message is received by A. 17 After talking, A hangs up and sends a BYE request. 18 B replies with an OK response confirming receipt of the BYE request and the call is terminated.
  • Page 171: The Voip Line Screens

    HAPTER The VoIP Line Screens 11.1 Overview The features mentioned in this chapter are for models with VoIP function. The VoIP > Line 1 (or Line 2) screens allow you to configure the volume, echo cancellation, VAD settings and custom tones for the phone port which maps to the SIP account (see Chapter 10 on page 157).
  • Page 172: Phone

    Chapter 11 The VoIP Line Screens 11.2 Phone Click VoIP > Line 1 (or Line 2) > Phone to configure phone related settings. Figure 98 Phone The following table describes the labels in this screen. Table 77 Phone LABEL DESCRIPTION Phone Hook Flash Detect Enter the number of milliseconds for the upper bound of a quick on-hook and off-...
  • Page 173: Region

    Chapter 11 The VoIP Line Screens Table 78 Voice (continued) LABEL DESCRIPTION LEC - Line Echo Cancellation Line Echo Select the maximum number of milliseconds of an echo length (16 ms, 32 ms or Canceller Tail 48 ms) the WiMAX Device can handle and eliminate the effect. An echo is Length normally caused by the sound of your voice reverberating in the telephone receiver while you talk.
  • Page 174 Chapter 11 The VoIP Line Screens WiMAX Device Configuration User’s Guide...
  • Page 175: Maintenance

    HAPTER Maintenance 12.1 Overview Use these screens to manage and maintain your WiMAX Device. 12.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. Remote Management Limitations Remote management over LAN or WAN will not work when: You have disabled that service in one of the remote management screens.
  • Page 176 Chapter 12 Maintenance Note: SNMP is only available if TCP/IP is configured. TR-069 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipment (CPE), such as the WiMAX Device. It can be managed over a WAN by means of an Auto Configuration Server (ACS).
  • Page 177 Chapter 12 Maintenance SNMP An SNMP managed network consists of two main types of component: agents and a manager. Figure 102 SNMP Management Model An agent is a management software module that resides in a managed device (the WiMAX Device). An agent translates the local management information from the managed device into a form compatible with SNMP.
  • Page 178 Chapter 12 Maintenance The WiMAX Device sends traps to the SNMP manager when any of the following events occurs: Table 80 SNMP Traps TRAP NAME DESCRIPTION TRAP # coldStart (defined in RFC-1215) A trap is sent after booting (power on). warmStart (defined in RFC-1215) A trap is sent after booting (software reboot).
  • Page 179 Chapter 12 Maintenance multiple disparate types of data over HTTP. Security encryption for communication is handled by different processes configured elsewhere in the WiMAX Device’s web configurator – Basic Access Authentication Sends a person’s user name and password in Base64. This authentication protocol is supported by all browsers that are HTTP 1.0/1.1 compliant.
  • Page 180: Password

    Chapter 12 Maintenance Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server.
  • Page 181: Http

    Chapter 12 Maintenance 12.3 HTTP Use this screen to allow remote access to the WiMAX Device from a network connection over HTTP. Click Maintenance > Remote MGMT > HTTP to open this screen as shown next. Figure 106 HTTP Screen This screen contains the following fields: Table 82 HTTP LABEL...
  • Page 182: Ssh

    Chapter 12 Maintenance Click Maintenance > Remote MGMT > Telnet to open this screen as shown next. Figure 107 Telnet Screen This screen contains the following fields: Table 83 Telnet LABEL DESCRIPTION Enable Select this to enable remote management using this service. Port Number Enter the port number this service can use to access the WiMAX Device.
  • Page 183: Snmp

    Chapter 12 Maintenance 12.6 SNMP Use this screen to allow remote access to the WiMAX Device from a network connection over SNMP. Click Maintenance > Remote MGMT > SNMP to open this screen as shown next. Figure 109 SNMP Screen This screen contains the following fields: Table 85 SNMP LABEL...
  • Page 184 Chapter 12 Maintenance Click Maintenance > Remote MGMT > CWMP to open this screen as shown next. Figure 110 CWMP Screen This screen contains the following fields: Table 86 CWMP LABEL DESCRIPTION Enable Select this to enable remote management using this service. ACS Server URL Enter the URL or IP address of the auto-configuration server.
  • Page 185: Oma-Dm

    Chapter 12 Maintenance Table 86 CWMP (continued) LABEL DESCRIPTION Connection Enter the connection request password that the ACS must send to the WiMAX Request Password Device when it requests a connection. You can enter up to 31 alphanumeric characters (a-z, A-Z, 0-9) and underscores but spaces are not allowed.
  • Page 186 Chapter 12 Maintenance Table 87 OMA-DM (continued) LABEL DESCRIPTION Server Port Enter the port number for the IP address of the OMA-DM server set up in the preceding field. Server Auth Type Select the encryption algorithm scheme used by the OMA-DM server to communicate with client devices.
  • Page 187: Date/Time

    Chapter 12 Maintenance 12.9 Date/Time Use these settings to set the system time or configure an NTP server for automatic time synchronization. Click Maintenance > Date/Time > Date to open this screen as shown next. Figure 112 Date Screen This screen contains the following fields: Table 88 Date LABEL DESCRIPTION...
  • Page 188: Upgrade File

    Chapter 12 Maintenance Click Maintenance > Date/Time > Time Zone to open this screen as shown next. Figure 113 Time Zone Screen This screen contains the following fields: Table 89 Time Zone LABEL DESCRIPTION Time Zone Select the time zone at your location. Enable Daylight Select this if your location uses daylight savings time.
  • Page 189: The Firmware Upload Process

    Chapter 12 Maintenance This screen contains the following fields: Table 90 Upgrade File LABEL DESCRIPTION Upgrade File Click Browse then browse to the location of a firmware upgrade file and select Upgrade Click this to begin uploading the selected file. This may take up to two minutes. Note: Do not turn off the device while firmware upload is in progress! 12.11.1 The Firmware Upload Process When the WiMAX Device uploads new firmware, the process usually takes about two minutes.
  • Page 190: Backup/Restore

    Chapter 12 Maintenance Click Maintenance > Firmware Upgrade > CWMP Upgrade to open this screen as shown next. Figure 116 CWMP Upgrade Screen This screen contains the following fields: Table 92 CWMP Upgrade LABEL DESCRIPTION Upgrade Click this to begin upgrading firmware using CWMP Request. This may take up to two minutes.
  • Page 191: The Restore Configuration Process

    Chapter 12 Maintenance Click Maintenance > Backup/Restore > Restore to open this screen as shown next. Figure 118 Restore Screen This screen contains the following fields: Table 94 Restore LABEL DESCRIPTION Configuration File Click Browse... then browse to the location of a firmware upgrade file and select Click File Restore to upload the specified configuration to the WiMAX Device and replace the current settings.
  • Page 192: Log Setting

    Chapter 12 Maintenance Click Maintenance > Backup/Restore > Factory Defaults to open this screen as shown next. Figure 119 Factory Defaults Screen This screen contains the following fields: Table 95 Factory Defaults LABEL DESCRIPTION Reset Click this to clear all user-entered configuration information and return the WiMAX Device to its factory defaults.
  • Page 193: Network Test

    Chapter 12 Maintenance Click Maintenance > LOG > Log Display to open this screen as shown next. Figure 121 Log Display Screen This screen contains the following fields: Table 97 Log Display LABEL DESCRIPTION Display Level Select the type of logs to display from this menu. Refresh Click this to refresh the logs in the display window.
  • Page 194: Traceroute

    Chapter 12 Maintenance 12.20 Traceroute Use this screen to test network connectivity using traceroute. Click Maintenance > Network Test > Traceroute to open this screen as shown next. Figure 123 Traceroute Screen This screen contains the following fields: Table 99 Traceroute LABEL DESCRIPTION IP Address...
  • Page 195: Reboot

    Chapter 12 Maintenance This screen contains the following fields: Table 100 About LABEL DESCRIPTION System Model This field displays the WiMAX Device system name. It is used for identification. Name Software Version This field displays the Web Configurator software version that the WiMAX Device is currently running.
  • Page 196 Chapter 12 Maintenance WiMAX Device Configuration User’s Guide...
  • Page 197: Troubleshooting

    HAPTER Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Device Access and Login • Internet Access • Reset the WiMAX Device to Its Factory Defaults 13.1 Power, Hardware Connections, and LEDs The WiMAX Device does not turn on.
  • Page 198: Wimax Device Access And Login

    Chapter 13 Troubleshooting 13.2 WiMAX Device Access and Login I forgot the IP address for the WiMAX Device. The default IP address is 192.168.1.1http://192.168.1.1. If you changed the IP address and have forgotten it, you might get the IP address of the WiMAX Device by looking up the IP address of the default gateway for your computer.
  • Page 199: Internet Access

    Chapter 13 Troubleshooting If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the WiMAX Device using another service, such as Telnet. If you can access the WiMAX Device, check the remote management settings and firewall rules to find out why the WiMAX Device does not respond to HTTP.
  • Page 200 Chapter 13 Troubleshooting Check your WiMAX settings. The WiMAX Device may have been set to search the wrong frequencies for a wireless connection. See Chapter 6 on page 72. If you are unsure of the correct values, contact your service provider. Disconnect all the cables from your WiMAX Device, and follow the directions in the Quick Start Guide again.
  • Page 201: Wireless Internet Access (For Models With Wifi)

    Chapter 13 Troubleshooting 13.4 Wireless Internet Access (for Models with WiFi) What factors may cause intermittent or unstabled wireless connection? How can I solve this problem? The following factors may cause interference: • Obstacles: walls, ceilings, furniture, and so on. •...
  • Page 202: Reset The Wimax Device To Its Factory Defaults

    Chapter 13 Troubleshooting 13.6 Reset the WiMAX Device to Its Factory Defaults If you forget your password or cannot access the Web Configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to 1234.
  • Page 203: Product Specifications

    HAPTER Product Specifications Table 102 LEDs Status for Indoor Device STATE DESCRIPTION Power The WiMAX Device is not receiving power. The WiMAX Device is receiving power but has been unable to start up correctly or is not receiving enough power. See the Troubleshooting section for more information.
  • Page 204 Chapter 14 Product Specifications Table 103 LEDs Status for Outdoor Device STATE DESCRIPTION Strength The Strength Indicator LEDs display the Received Signal Strength Indication (RSSI) Indicator of the wireless (WiMAX) connection. 5 Signal LEDs The signal strength is greater than or equal to -50 dBm. 4 Signal LEDs The signal strength is between -50 and -60 dBm.
  • Page 205 Chapter 14 Product Specifications Table 104 Voice Features Phone config The phone configuration table allows you to customize the phone keypad combinations you use to access certain features on the WiMAX Device, such as call waiting, call return, call forward, etc. The phone configuration table is configurable in command interpreter mode.
  • Page 206 Chapter 14 Product Specifications Table 105 Star (*) and Pound (#) Code Support Return last call received Followed by the 10 digit phone number to cancel Call Waiting on a single call basis Activate Call Forwarding (*72 followed by the 10 digit phone number that is requesting call forwarding service) *720 Activate Call Forwarding (*720 followed by the 10 digit phone number that is...
  • Page 207: Appendix A Wimax Security

    PP EN D I X WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times.
  • Page 208 Appendix A WiMAX Security • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your base station acts as a message relay between the MS/SS and the network RADIUS server.
  • Page 209 Appendix A WiMAX Security • Authorization request and reply The MS/SS presents its public certificate to the base station. The base station verifies the certificate and sends an authentication key (AK) to the MS/SS. • Key request and reply The MS/SS requests a transport encryption key (TEK) which the base station generates and encrypts using the authentication key.
  • Page 210 Appendix A WiMAX Security WiMAX Device Configuration User’s Guide...
  • Page 211: Appendix B Importing Certificates

    PP EN D I X Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
  • Page 212 Appendix B Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 213 Appendix B Importing Certificates In the Certificate dialog box, click Install Certificate. Figure 129 Internet Explorer 7: Certificate In the Certificate Import Wizard, click Next. Figure 130 Internet Explorer 7: Certificate Import Wizard WiMAX Device Configuration User’s Guide...
  • Page 214 Appendix B Importing Certificates If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 131 Internet Explorer 7: Certificate Import Wizard Otherwise, select Place all certificates in the following store and then click Browse. Figure 132 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
  • Page 215 Appendix B Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 134 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 135 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
  • Page 216 Appendix B Importing Certificates 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Figure 137 Internet Explorer 7: Website Identification WiMAX Device Configuration User’s Guide...
  • Page 217 Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 218 Appendix B Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. Open Internet Explorer and click TOOLS > Internet Options. Figure 140 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content >...
  • Page 219 Appendix B Importing Certificates In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 142 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 143 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes.
  • Page 220 Appendix B Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 221 Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Firefox and click TOOLS >...
  • Page 222 Appendix B Importing Certificates In the Certificate Manager dialog box, click Web Sites > Import. Firefox 2: Certificate Manager Figure 149 Use the Select File dialog box to locate the certificate and then click Open. Firefox 2: Select File Figure 150 The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
  • Page 223 Appendix B Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click TOOLS > Options. Figure 151 Firefox 2: Tools Menu In the Options dialog box, click ADVANCED > Encryption > View Certificates. Figure 152 Firefox 2: Options WiMAX Device Configuration User’s Guide...
  • Page 224 Appendix B Importing Certificates In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Firefox 2: Certificate Manager Figure 153 In the Delete Web Site Certificates dialog box, click OK. Figure 154 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 225 Appendix B Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 226 Appendix B Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 156 Opera 9: Security information WiMAX Device Configuration User’s Guide...
  • Page 227 Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click TOOLS >...
  • Page 228 Appendix B Importing Certificates In the Certificates Manager, click Authorities > Import. Opera 9: Certificate manager Figure 159 Use the Import certificate dialog box to locate the certificate and then click Open. Opera 9: Import certificate Figure 160 WiMAX Device Configuration User’s Guide...
  • Page 229 Appendix B Importing Certificates In the Install authority certificate dialog box, click Install. Opera 9: Install authority certificate Figure 161 Next, click OK. Opera 9: Install authority certificate Figure 162 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 230 Appendix B Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. Open Opera and click TOOLS > Preferences. Figure 163 Opera 9: Tools Menu In Preferences, ADVANCED > Security > Manage certificates. Figure 164 Opera 9: Preferences WiMAX Device Configuration User’s Guide...
  • Page 231 Appendix B Importing Certificates In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Opera 9: Certificate manager Figure 165 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 232 Appendix B Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 233 Appendix B Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 168 Konqueror 3.5: KDE SSL Information WiMAX Device Configuration User’s Guide...
  • Page 234 Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 235 Appendix B Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. Open Konqueror and click Settings > Configure Konqueror. Figure 172 Konqueror 3.5: Settings Menu In the Configure dialog box, select Crypto. On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
  • Page 236 Appendix B Importing Certificates WiMAX Device Configuration User’s Guide...
  • Page 237: Appendix C Common Services

    PP EN D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
  • Page 238 Appendix C Common Services Table 106 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS HTTPS is a secured http session often used in e-commerce. ICMP User-Defined Internet Control Message Protocol is often...
  • Page 239 Appendix C Common Services Table 106 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP Simple Network Management Program.
  • Page 240 Appendix C Common Services WiMAX Device Configuration User’s Guide...
  • Page 241: Appendix D Open Software Announcements

    End-User License Agreement for "MAX208M, MAX218M, MAX208M2W, MAX218M2W, MAX218M1W, MAX218MW, MAX318M2W, MAX308M, and MAX318M" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT.
  • Page 242 Appendix D Open Software Announcements The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.
  • Page 243 Appendix D Open Software Announcements THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE...
  • Page 244 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Bridge-utils, Busybox, Dnrd, Ebtables, Igmpproxy, Iproute2, Iptables, MIPS...
  • Page 245 Appendix D Open Software Announcements authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs;...
  • Page 246 Appendix D Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
  • Page 247 Appendix D Open Software Announcements operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
  • Page 248 Appendix D Open Software Announcements "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
  • Page 249 Appendix D Open Software Announcements The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 250 Appendix D Open Software Announcements ACME Labs Freeware License All the free software available on the ACME Labs web site has a copyright notice like this one: Copyright © 2000 by Jef Poskanzer <jef@mail.acme.com>. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 251 Appendix D Open Software Announcements Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
  • Page 252 Appendix D Open Software Announcements and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.
  • Page 253 Appendix D Open Software Announcements associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it).
  • Page 254 Appendix D Open Software Announcements interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
  • Page 255 Appendix D Open Software Announcements with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system.
  • Page 256 Appendix D Open Software Announcements 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded.
  • Page 257 Appendix D Open Software Announcements ============================================================= ======= * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1.
  • Page 258 Appendix D Open Software Announcements permission of the OpenSSL Project. * 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.
  • Page 259 Appendix D Open Software Announcements Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.
  • Page 260 Appendix D Open Software Announcements notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * 3.
  • Page 261 Appendix D Open Software Announcements Ftp Server * Copyright (c) 1985, 1988, 1990, 1992, 1993, 1994, 2002 * The Regents of the University of California. All rights reserved. * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1.
  • Page 262 Appendix D Open Software Announcements This Product includes net-snmp software under the following license Various copyrights apply to this package, listed in various separate parts below. Please make sure that you read all the parts. ---- Part 1: CMU/UCD copyright notice: (BSD like) ----- Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000 Copyright 1996, 1998-2000 The Regents of the University of California...
  • Page 263 Appendix D Open Software Announcements WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  • Page 264 Appendix D Open Software Announcements THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 265 Appendix D Open Software Announcements * The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 266 Appendix D Open Software Announcements Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 267 Appendix D Open Software Announcements ---- Part 5: Sparta, Inc copyright notice (BSD) ----- Copyright (c) 2003-2009, Sparta, Inc All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 268 Appendix D Open Software Announcements OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 6: Cisco/BUPTNIC copyright notice (BSD) ----- Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications.
  • Page 269 Appendix D Open Software Announcements CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  • Page 270 Appendix D Open Software Announcements THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 271 Appendix D Open Software Announcements from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  • Page 272 Appendix D Open Software Announcements notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 273 Appendix D Open Software Announcements The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. Portions of the documentation and some code used as part of the build process might fall under other licenses. The details here are unclear. We do not worry about the licensing of the documentation and build code so much because none of these things are part of the core deliverable SQLite library.
  • Page 274 Appendix D Open Software Announcements A template copyright release is available in PDF or HTML. You can use this release to make future changes Copyright Release for Contributions To SQLite SQLite is software that implements an embeddable SQL database engine. SQLite is available for free download from http://www.sqlite.org/.
  • Page 275 Appendix D Open Software Announcements Signature: Date: Name (printed): This Product includes Stunnel software under the stunnel license. stunnel license (see COPYRIGHT.GPL for detailed GPL conditions) Copyright (C) 1998-2011 Michal Trojnara This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation;...
  • Page 276 Appendix D Open Software Announcements /* zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.3, July 18th, 2005 Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.
  • Page 277: Appendix E Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 278 Appendix E Legal Information frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna.
  • Page 279 Appendix E Legal Information This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications Go to http://www.zyxel.com. Select your product on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page.
  • Page 280: Regulatory Information

    Appendix E Legal Information Regulatory Information European Union The following information applies if you use the product within the European Union. Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance Information for 2.4GHz and 5GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999/5/EC (R&TTE Directive) ZyXEL tímto prohlašuje, že tento zařízení...
  • Page 281 Appendix E Legal Information Con la presente ZyXEL dichiara che questo attrezzatura è conforme ai [Italian] requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar šo ZyXEL deklarē, ka iekārtas atbilst Direktīvas 1999/5/EK būtiskajām [Latvian] prasībām un citiem ar to saistītajiem noteikumiem. Šiuo ZyXEL deklaruoja, kad šis įranga atitinka esminius reikalavimus ir kitas [Lithuanian] 1999/5/EB Direktyvos nuostatas.
  • Page 282 Appendix E Legal Information Hér með lýsir, ZyXEL því yfir að þessi búnaður er í samræmi við [Icelandic] grunnkröfur og önnur viðeigandi ákvæði tilskipunar 1999/5/EC. Erklærer herved ZyXEL at dette utstyret er I samsvar med de [Norwegian] grunnleggende kravene og andre relevante bestemmelser I direktiv 1999/5/ Prin prezenta, ZyXEL declară...
  • Page 283 Appendix E Legal Information Overview of Regulatory Requirements for Wireless LANs Max Power Level Frequency Band (MHz) (EIRP) (mW) Indoor ONLY Indoor and Outdoor 2400-2483.5 5150-5350 5470-5725 1000 Belgium The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters.
  • Page 284 Appendix E Legal Information Location Frequency Range(GHz) Power (EIRP) Indoor (No restrictions) 2.4 – 2.4835 100mW (20dBm) 2.4 – 2.454 100mW (20dBm) Outdoor 2.454 – 2.4835 10mW (10dBm) Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy.
  • Page 285: Index

    Index Index 69, 70 CBC-MAC accounting server CCMP 207, 209 see AAA cell ACK message certificates activity formats Advanced Encryption Standard verification see AES certification notices viewing Certification Authority, see CA algorithms chaining analysis-by-synthesis chaining message authentication Application Layer Gateway see CCMP see ALG circuit-switched telephone networks...
  • Page 286 Index DHCP server G.168 diameter G.711 Differentiated Services G.729 see DiffServ Diffie-Hellman key groups DiffServ DiffServ Code Point (DSCP) marking rule hybrid waveform codec digital ID 70, 207 DS field DSCP see DiffServ DTMF ID type and content dual-tone multi-frequency see DTMF identity 68, 207...
  • Page 287 Index L2TP VPN outbound proxy Layer 2 Tunneling Protocol VPN see L2TP VPN outbound proxy server outside header pattern-spotting Management Information Base (MIB) PBX services Message Authentication Code see MAC per-hop behavior message integrity PHB (per-hop behavior) Metropolitan Area Network phone see MAN services...
  • Page 288 Index Message Types servers Messages service domain Shared Secret Key user agent Real-time Transport Protocol see RTP SIP outbound proxy register server SNMP manager registration sound quality product 67, 68 related documentation STUN 158, 159 remote management and NAT subscriber station remote management limitations see SS required bandwidth...
  • Page 289 Index see UPnP wizard setup UPnP application adding stations auto-discovery push button security issues Windows XP use NAT user authentication verification virtual LAN see VLAN VLAN examples voice activity detection coding mail Voice over IP see VoIP VoIP waveform codec WiFi Protected Setup, see WPS –...
  • Page 290 Index WiMAX Device Configuration User’s Guide...

Table of Contents