ZyXEL Communications MAX-306M1 User Manual

Max-306m1 series wimax mimo outdoor simple cpe
Table of Contents

Advertisement

Quick Links

MAX-306M1 Series
Models: MAX-306M1 (2.5 GHz) and MAX-316M1 (3.5 GHz)
WiMAX MIMO Outdoor
Simple CPE
Default Login Details
IP Address:
http://192.168.1.1
User Name:
Password:
www.zyxel.com
Firmware Version 3.70
Edition 1, 12/2009
www.zyxel.com
admin
1234
Copyright © 2009
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications MAX-306M1

  • Page 1 MAX-306M1 Series Models: MAX-306M1 (2.5 GHz) and MAX-316M1 (3.5 GHz) WiMAX MIMO Outdoor Simple CPE Default Login Details IP Address: http://192.168.1.1 User Name: admin Password: 1234 www.zyxel.com Firmware Version 3.70 Edition 1, 12/2009 www.zyxel.com Copyright © 2009 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    This manual is intended for people who want to configure the ZyXEL WiMAX Modem using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Note: This book covers the following models: MAX-306M1 and MAX-316M1. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
  • Page 4: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your WiMAX Modem. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 5: Table 1 Common Icons

    Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Modem icon is not an exact representation of your WiMAX Modem.\ Table 1 Common Icons WiMAX Access Point Computer Wireless Signal Notebook Server WiMAX Base Station...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7 Safety Warnings • Make sure that the cable system is grounded so as to provide some protection against voltage surges. Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste.
  • Page 8 Safety Warnings User’s Guide...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview Introduction and Wizards ...................... 29 Getting Started ........................... 31 Introducing the Web Configurator ....................35 Internet Connection Wizard ....................... 41 VoIP Connection Wizard ......................47 Tutorials ............................. 51 Basic Screens ........................63 The Setup Screens ........................65 Advanced Screens .........................
  • Page 10 Contents Overview User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Contents Overview ........................9 Table of Contents........................11 List of Figures ......................... 19 List of Tables........................... 25 Part I: Introduction and Wizards............29 Chapter 1 Getting Started ........................
  • Page 12 Table of Contents Chapter 4 VoIP Connection Wizard......................47 4.1 Overview ..........................47 4.2 Welcome to the ZyXEL Setup Wizard ................. 47 4.2.1 First Voice Account Settings ..................48 4.2.2 Setup Complete ......................50 Chapter 5 Tutorials ........................... 51 5.1 Overview ..........................51 5.2 Setting Up a Small Network ....................
  • Page 13 Table of Contents 7.1.2 What You Need to Know .................... 73 7.2 DHCP Setup ........................74 7.3 Static DHCP ......................... 76 7.4 IP Static Route ........................77 7.4.1 IP Static Route Setup ....................78 7.5 Other Settings ........................79 7.6 Technical Reference ......................80 7.6.1 IP Address and Subnet Mask ..................
  • Page 14 Table of Contents 10.1 Overview .......................... 109 10.1.1 What You Can Do in This Chapter ................. 109 10.2 General ..........................109 10.3 Port Forwarding .......................110 10.3.1 Port Forwarding Options ..................111 10.3.2 Port Forwarding Rule Setup ..................113 10.4 Trigger Port ........................114 10.4.1 Trigger Port Forwarding Example ................115 10.5 ALG ..........................116 Chapter 11...
  • Page 15 Table of Contents 12.4.6 NAT and SIP ......................146 12.4.7 DiffServ ........................146 12.4.8 DSCP and Per-Hop Behavior ................. 147 Chapter 13 The Phone Screens....................... 149 13.1 Overview .......................... 149 13.1.1 What You Can Do in This Chapter ................. 149 13.1.2 What You Need to Know ..................
  • Page 16 Table of Contents 15.4.1 Certificate Authorities ..................... 184 15.4.2 Verifying a Certificate ..................... 186 Chapter 16 The Firewall Screens ......................189 16.1 Overview .......................... 189 16.1.1 What You Can Do in This Chapter ................. 189 16.1.2 What You Need to Know ..................189 16.2 Firewall Setting ........................
  • Page 17 Table of Contents 19.2 General ..........................215 19.3 Class Setup ........................216 19.3.1 Class Configuration ....................217 Chapter 20 The Logs Screens ......................... 219 20.1 Overview .......................... 219 20.1.1 What You Can Do in This Chapter ................. 219 20.1.2 What You Need to Know ..................219 20.2 View Logs ........................
  • Page 18 Table of Contents Appendix B Setting Up Your Computer’s IP Address ............271 Appendix C Pop-up Windows, JavaScripts and Java Permissions ........299 Appendix D IP Addresses and Subnetting ................309 Appendix E Importing Certificates ..................321 Appendix F SIP Passthrough ....................353 Appendix G Common Services ....................
  • Page 19: List Of Figures

    List of Figures List of Figures Figure 1 Mobile Station and Base Station ....................31 Figure 2 WiMAX Modem’s VoIP Features - Peer-to-Peer Calls ............. 32 Figure 3 WiMAX Modem’s VoIP Features - Calls via VoIP Service Provider ......... 32 Figure 4 The WiMAX Modem’s LEDs .....................
  • Page 20 List of Figures Figure 39 ADVANCED > VPN Transport > Customer Interface Setup ..........103 Figure 40 Ethernet Pseudowire Settings Example ................105 Figure 41 Advance > VPN Transport > Ethernet Pseudowire .............. 105 Figure 42 ADVANCED > VPN Transport > Ethernet Pseudowire Setup ..........106 Figure 43 ADVANCED >...
  • Page 21 List of Figures Figure 82 TOOLS > Firewall > Service Setting ..................193 Figure 83 “Triangle Route” Problem ..................... 196 Figure 84 IP Alias ..........................197 Figure 85 TOOLS > Content Filter > Filter ................... 200 Figure 86 TOOLS > Content Filter > Schedule ..................202 Figure 87 TOOLS >...
  • Page 22 List of Figures Figure 125 Mac OS X 10.5: Apple Menu ....................283 Figure 126 Mac OS X 10.5: Systems Preferences ................283 Figure 127 Mac OS X 10.5: Network Preferences > Ethernet .............. 284 Figure 128 Mac OS X 10.5: Network Preferences > Ethernet .............. 285 Figure 129 Mac OS X 10.5: Network Utility ..................
  • Page 23 List of Figures Figure 168 Internet Explorer 7: Select Certificate Store ............... 325 Figure 169 Internet Explorer 7: Certificate Import Wizard ..............326 Figure 170 Internet Explorer 7: Security Warning ................. 326 Figure 171 Internet Explorer 7: Certificate Import Wizard ..............327 Figure 172 Internet Explorer 7: Website Identification ................
  • Page 24 List of Figures User’s Guide...
  • Page 25: List Of Tables

    List of Tables List of Tables Table 1 Common Icons ..........................5 Table 2 The WiMAX Modem ........................33 Table 3 Main > Icons ..........................38 Table 4 Main ............................39 Table 5 Internet Connection Wizard > System Information ..............42 Table 6 Internet Connection Wizard >...
  • Page 26 List of Tables Table 38 ADVANCED > System Configuration > General ..............121 Table 39 ADVANCED > System Configuration > Dynamic DNS ............123 Table 40 ADVANCED > System Configuration > Firmware ..............125 Table 41 ADVANCED > System Configuration > Configuration ............126 Table 42 ADVANCED >...
  • Page 27 List of Tables Table 81 QoS Class Setup ........................217 Table 82 Syslog Logs .......................... 220 Table 83 RFC-2408 ISAKMP Payload Types ..................220 Table 84 TOOLS > Logs > View Logs ....................221 Table 85 TOOLS > Logs > Log Settings ....................224 Table 86 System Error Logs ........................
  • Page 28 List of Tables Table 124 24-bit Network Number Subnet Planning ................316 Table 125 16-bit Network Number Subnet Planning ................317 Table 126 Commonly Used Services ....................355 User’s Guide...
  • Page 29: Introduction And Wizards

    Introduction and Wizards Getting Started (31) Introducing the Web Configurator (35) Internet Connection Wizard (41) VoIP Connection Wizard (47)
  • Page 31: Getting Started

    H A P T E R Getting Started 1.1 About Your WiMAX Modem The WiMAX Modem allows you to access the Internet by connecting to a WiMAX wireless network. You can use a traditional analog telephone to make Internet calls using the WiMAX Modem’s Voice over IP (VoIP) communication capabilities. You can configure firewall and content filtering as well as a host of other features.
  • Page 32: Make Calls Via Internet Telephony Service Provider

    Chapter 1 Getting Started Use content filtering to block access to web sites with URLs containing keywords that you specify. You can define time periods and days during which content filtering is enabled and include or exclude particular computers on your network from content filtering.
  • Page 33: Wimax Modem Hardware

    Chapter 1 Getting Started 1.2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Modem. Figure 4 The WiMAX Modem’s LEDs STRENGTH INDICATORS ACTIVITY INDICATOR...
  • Page 34: Good Habits For Managing The Device

    Chapter 1 Getting Started Table 2 The WiMAX Modem STATE DESCRIPTION Activity The WiMAX Modem is not ready. Indicator Green The WiMAX Modem is connected to the network. Blinking The WiMAX Modem system is booting up or the WiMAX Modem is seeking a viable signal. 1.3 Good Habits for Managing the Device Do the following things regularly to make the WiMAX Modem more secure and to manage the WiMAX Modem more effectively.
  • Page 35: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher.
  • Page 36 Chapter 2 Introducing the Web Configurator A password screen displays. The default password (“1234”) displays in non- readable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login.
  • Page 37 Chapter 2 Introducing the Web Configurator A screen displays to let you choose to go to the Wizard or the Advanced screens. • Click Go to Wizard setup if you are logging in for the first time or if you want to make basic changes.
  • Page 38: The Main Screen

    Chapter 2 Introducing the Web Configurator 2.2 The Main Screen When you first log into the web configurator and by-pass the wizard, the Main screen appears. Here you can view a summary of your WiMAX Modem connection status. This is also the default “home” page for the ZyXEL web configurator and it contains conveniently-placed shortcuts to all of the other screens.
  • Page 39: Table 4 Main

    Chapter 2 Introducing the Web Configurator Table 3 Main > Icons (continued) ICON DESCRIPTION VOICE Click to go to the Voice screen, where you can configure your voice service and phone settings. TOOLS Click to go the Tools screen, where you can configure your firewall, QoS, and content filter, among other things.
  • Page 40 Chapter 2 Introducing the Web Configurator Table 4 Main (continued) LABEL DESCRIPTION Software Version This field indicates the version number of the WiMAX Modem’s firmware. The version number takes the form of: Version(Build),release status (candidate) | Version Release Date. For example: V3.70(BCC.0)c4 | 07/08/2009 indicates that the firmware is 3.70, build BCC.0, candidate 4, released on July 08, 2009.
  • Page 41: Internet Connection Wizard

    H A P T E R Internet Connection Wizard 3.1 Overview This chapter provides information on the ZyXEL Setup Wizard screens. The wizard guides you through several steps where you can configure your Internet and VoIP settings. 3.1.1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard.
  • Page 42: System Information

    Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (see Section 11.2 on page 121 more).
  • Page 43: Authentication Settings

    Chapter 3 Internet Connection Wizard 3.1.3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (see Section 8.2 on page 88 more information).
  • Page 44 Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL DESCRIPTION Anonymous Identity Enter the anonymous identity provided by your Internet Service Provider. Anonymous identity (also known as outer identity) is used with EAP-TTLS encryption. The anonymous identity is used to route your authentication request to the correct authentication server, and does not reveal your real user name.
  • Page 45: Ip Address

    Chapter 3 Internet Connection Wizard 3.1.4 IP Address This Internet Connection Wizard screen allows you to configure your IP address. The settings here correspond to the SETUP > Set IP Address screen (see Section 6.2 on page 66). A fixed IP address is a static IP that your ISP gives you. An automatic (dynamic) IP address is not fixed;...
  • Page 46: Setup Complete

    Chapter 3 Internet Connection Wizard 3.1.5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings. Figure 10 Internet Connection Wizard > Complete Launch your web browser and navigate to www.zyxel.com. If everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator.
  • Page 47: Voip Connection Wizard

    H A P T E R VoIP Connection Wizard 4.1 Overview This chapter shows you how to use the wizard to set up your voice account(s). The WiMAX Modem has Voice over IP (VoIP) communication capabilities that allow you to use a traditional analog telephone to make Internet calls. You can configure the WiMAX Modem to use up to two SIP based VoIP accounts.
  • Page 48: First Voice Account Settings

    Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 12.2 on page 133 for more information).
  • Page 49: Figure 13 Voip Connection > Sip Registration Test

    Chapter 4 VoIP Connection Wizard Table 8 VoIP Connection > First Voice Account Settings (continued) LABEL DESCRIPTION Apply Click to complete the wizard setup and save your configuration. Close Click to close the wizard without saving your settings. After you enter your voice account settings and click Apply, the WiMAX Modem attempts to register your SIP account with the SIP server.
  • Page 50: Setup Complete

    Chapter 4 VoIP Connection Wizard Internet connection was already working, you can click Back and try re-entering your SIP account settings. Figure 14 VoIP Connection > SIP Registration Fail 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings. Figure 15 VoIP Connection >...
  • Page 51: Tutorials

    H A P T E R Tutorials 5.1 Overview This chapter shows you how to configure some of the WiMAX Modem’s features. Note: Be sure to read Introducing the Web Configurator on page 35 before working through the tutorials presented here. For field descriptions of individual screens, see the related technical reference in this User's Guide.
  • Page 52 Chapter 5 Tutorials Required: The following table provides a summary of the information you will need to complete the tasks in this tutorial. INFORMATION VALUE SEE ALSO LAN IP Address 192.168.100.1 Chapter 6 on page 65 Starting IP Address 192.168.100.33 Chapter 7 on page 73 Pool Size DNS Servers...
  • Page 53: Connecting Your Small Network To The Internet

    Chapter 5 Tutorials Next, go to the ADVANCED > NAT Configuration > General screen and select the Enable Network Address Translation option. Click Apply to save your settings. Connect your computers to the WiMAX Modem’s Ethernet ports and you’re all set! Note: You may need to configure the computers on your LAN to automatically obtain IP addresses.
  • Page 54 Chapter 5 Tutorials In the Import Certificate screen, click Browse and locate the security certificate that was provided by your new ISP. Next, go to the ADVANCED > WAN Configuration screen and configure your new Internet access settings based on the information provided by your ISP. Note: You can also use the Internet Connection Wizard to configure these settings.
  • Page 55: Blocking Web Access During Specific Hours

    Chapter 5 Tutorials 5.2.3 Blocking Web Access During Specific Hours If your WiMAX Modem is in a home or office environment you may decide that you want to block web access and video chat during a specific block of hours, such as during your daughter’s designated study hours.
  • Page 56 Chapter 5 Tutorials Under Available Services, select HTTP(TCP:80) then click the Add button. Repeat this for CU-SEEME(TCP/UDP:7648,24032). This blocks all web and video chat traffic, while leaving other ports open for other types of traffic, such as ports 25 and 587 for e-mail and port 21 for FTP. The Blocked Services window updates accordingly.
  • Page 57: Blocking Web Sites By Keyword

    Chapter 5 Tutorials 5.2.4 Blocking Web Sites by Keyword You can further refine web access by specifying keywords that appear in a URL and blocking them. This allows you to control the content you do allow to pass through the WiMAX Modem. For example, once your daughter’s designated study hours end, you allow web access and video chat but want to restrict certain sites.
  • Page 58 Chapter 5 Tutorials Enter the first Keyword then click Add. Repeat for additional keywords. As you enter them, the keywords appear in the Keyword List. (Optional) If you want to allow websites with these keywords for a specific computer in your household, such as the computer in the master bedroom, then add that computer’s IP address to the Trusted IP Address field.
  • Page 59: Configuring Your Internet Phone

    Chapter 5 Tutorials 5.3 Configuring Your Internet Phone This tutorial shows you how to configure the WiMAX Modem’s VoIP settings when you connect an analog phone to place Internet phone calls. Goals: Connect an analog phone to the WiMAX Modem then configure your Internet phone settings.
  • Page 60 Chapter 5 Tutorials Connect an analog phone to your WiMAX Modem, as described in the included Quick Start Guide. Open the VOICE > Service Configuration > SIP Setting screen, then enter the required information as presented above. Tip: Unless otherwise told by a SIP service provider, you can often leave the Port settings at their default values.
  • Page 61: Placing An Internet Phone Call

    Chapter 5 Tutorials 5.3.1 Placing an Internet Phone Call Because you’re using an analog phone, you can’t just enter another party’s SIP number and dial straight away. The reason is there is no way to enter certain SIP- specific characters on your analog phone’s keypad in a way that the WiMAX Modem will recognize.
  • Page 62: Remotely Managing Your Wimax Modem

    Chapter 5 Tutorials 5.4 Remotely Managing Your WiMAX Modem The remote management feature allows you to log into the device over the Internet and configure its settings from a second trusted location. Goal: Set up the WiMAX Modem to allow management requests from the (demonstration) IP address 2.2.2.2.
  • Page 63: Basic Screens

    Basic Screens The Main Screen (38) The Setup Screens (65)
  • Page 65: The Setup Screens

    H A P T E R The Setup Screens 6.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 6.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 6.2 on page 66) lets you configure the WiMAX Modem’s IP address and subnet mask.
  • Page 66: Before You Begin

    Chapter 6 The Setup Screens you entered. You do not need to change the computer subnet mask unless you are instructed to do so. Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server.
  • Page 67: Dhcp Client

    Chapter 6 The Setup Screens The following table describes the labels in this screen. Table 9 SETUP > Set IP Address LABEL DESCRIPTION IP Address Enter the IP address of the WiMAX Modem on the LAN. Note: This field is the IP address you use to access the WiMAX Modem on the LAN.
  • Page 68: Time Setting

    Chapter 6 The Setup Screens Table 10 SETUP > DHCP Client (continued) LABEL DESCRIPTION Reserve This indicates whether the IP address for the connected client device is reserved. When the DHCP server issues IP addresses, reserved IPs are assigned to specific client devices. If the IP address is reserved, the client device identified by its MAC address will always receive this IP address from the DHCP server.
  • Page 69: Pre-Defined Ntp Time Servers List

    Chapter 6 The Setup Screens Table 11 SETUP > Time Setting (continued) LABEL DESCRIPTION Current Date Displays the current time according to the WiMAX Modem. Time and Date Setup Manual Select this if you want to specify the current date and time in the fields below.
  • Page 70: Resetting The Time

    Chapter 6 The Setup Screens the list in order until either it is successful or all the pre-defined NTP time servers have been tried. Table 12 Pre-defined NTP Time Servers ntp1.cs.wisc.edu ntp1.gbg.netnod.se ntp2.cs.wisc.edu tock.usno.navy.mil ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw 6.4.2 Resetting the Time The WiMAX Modem automatically resets the time in the following circumstances:...
  • Page 71: Advanced Screens

    Advanced Screens The LAN Configuration Screens (73) The WAN Configuration Screens (85) The NAT Configuration Screens (109) The System Configuration Screens (119)
  • Page 73: The Lan Configuration Screens

    H A P T E R The LAN Configuration Screens 7.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Modem on the LAN. You can configure DHCP services and control how the WiMAX Modem sends routing information using RIP. A Local Area Network (LAN) is a shared communication system to which many computers are attached.
  • Page 74: Dhcp Setup

    Chapter 7 The LAN Configuration Screens Subnet Masks Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa.
  • Page 75: Table 13 Advanced > Lan Configuration > Dhcp Setup

    Chapter 7 The LAN Configuration Screens The following table describes the labels in this screen. Table 13 ADVANCED > LAN Configuration > DHCP Setup LABEL DESCRIPTION DHCP Setup Enable DHCP Select this if you want the WiMAX Modem to be the DHCP server on the Server LAN.
  • Page 76: Static Dhcp

    Chapter 7 The LAN Configuration Screens 7.3 Static DHCP Click ADVANCED > LAN Configuration > Static DHCP to assign specific IP addresses to specific computers on the LAN. Note: This screen has no effect if the DHCP server is not enabled. You can enable it in ADVANCED >...
  • Page 77: Ip Static Route

    Chapter 7 The LAN Configuration Screens 7.4 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Modem. Note: The first static route is the default route and cannot be modified or deleted. Figure 22 Advanced>...
  • Page 78: Ip Static Route Setup

    Chapter 7 The LAN Configuration Screens 7.4.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Modem. Figure 23 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen.
  • Page 79: Other Settings

    Chapter 7 The LAN Configuration Screens Table 17 Advanced> LAN Configuration > IP Static Route > Edit (continued) LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 7.5 Other Settings Click ADVANCED >...
  • Page 80: Technical Reference

    Chapter 7 The LAN Configuration Screens Table 18 ADVANCED > LAN Configuration > Other Settings (continued) LABEL DESCRIPTION Multicast You do not have to enable multicasting to use RIP-2M. (See RIP Version.) Select which version of IGMP the WiMAX Modem uses to support multicasting on the LAN.
  • Page 81: Dhcp Setup

    Chapter 7 The LAN Configuration Screens Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your WiMAX Modem, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address.
  • Page 82: Dns Server Address

    Chapter 7 The LAN Configuration Screens 7.6.4 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask.
  • Page 83: Multicast

    Chapter 7 The LAN Configuration Screens • None - the WiMAX Modem will not send any RIP packets and will ignore any RIP packets received. The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Modem sends (it recognizes both formats when receiving).
  • Page 84 Chapter 7 The LAN Configuration Screens User’s Guide...
  • Page 85: The Wan Configuration Screens

    H A P T E R The WAN Configuration Screens 8.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Modem’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet.
  • Page 86: Figure 25 Wimax: Mobile Station

    Chapter 8 The WAN Configuration Screens for example). The following figure shows an MS-equipped notebook computer MS1 moving from base station BS1’s coverage area and connecting to BS2. Figure 25 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations.
  • Page 87: Figure 27 Using An Aaa Server

    Chapter 8 The WAN Configuration Screens Authentication When authenticating a user, the base station uses a third-party RADIUS or Diameter server known as an AAA (Authentication, Authorization and Accounting) server to authenticate the mobile or subscriber stations. The following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to access the Internet.
  • Page 88: Internet Connection

    Chapter 8 The WAN Configuration Screens 8.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Modem’s Internet settings. Note: Not all WiMAX Modem models have all the fields shown here. Figure 28 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
  • Page 89 Chapter 8 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION This field displays the Privacy Key Management version number. PKM provides security between the WiMAX Modem and the base station.
  • Page 90: Wimax Configuration

    Chapter 8 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Select this if you have a dynamic IP address. A dynamic IP address automatically is not fixed; the ISP assigns you a different one each time you from ISP connect to the Internet.
  • Page 91: Figure 29 Advanced > Wan Configuration >Wimax Configuration

    Chapter 8 The WAN Configuration Screens Radio frequency is measured in Hertz (Hz). Table 20 Radio Frequency Conversion 1 kHz = 1000 Hz 1 MHz = 1000 kHz (1000000 Hz) 1 GHz = 1000 MHz (1000000 kHz) Figure 29 ADVANCED > WAN Configuration >WiMAX Configuration The following table describes the labels in this screen.
  • Page 92: Frequency Ranges

    Chapter 8 The WAN Configuration Screens 8.3.1 Frequency Ranges The following figure shows the WiMAX Modem searching a range of frequencies to find a connection to a base station. Figure 30 Frequency Ranges In this figure, A is the WiMAX frequency range. “WiMAX frequency range” refers to the entire range of frequencies the WiMAX Modem is capable of using to transmit and receive (see the Product Specifications appendix for details).
  • Page 93: Using The Wimax Frequency Screen

    Chapter 8 The WAN Configuration Screens Note: It may take several minutes for the WiMAX Modem to find a connection. • The WiMAX Modem searches the DL Frequency settings in ascending numerical order, from [1] to [9]. Note: The Bandwidth field is not user-configurable; when the WiMAX Modem finds a WiMAX connection, its frequency is displayed in this field.
  • Page 94: Advanced

    Chapter 8 The WAN Configuration Screens In the DL Frequency [4] field, enter 2625000. Leave the rest of the DL Frequency fields at zero. The screen appears as follows. Figure 31 Completing the WiMAX Frequency Screen Click Apply. The WiMAX Modem stores your settings. When the WiMAX Modem searches for available frequencies, it scans all frequencies from DL Frequency [1] to DL Frequency [4].
  • Page 95: Table 23 Advanced > Wan Configuration > Advanced

    Chapter 8 The WAN Configuration Screens The following table describes the labels in this screen. Table 23 ADVANCED > WAN Configuration > Advanced LABEL DESCRIPTION DNS Servers First, Second and Select Obtained from ISP if your ISP dynamically assigns DNS Third DNS Server server information (and the WiMAX Modem's WAN IP address).
  • Page 96 Chapter 8 The WAN Configuration Screens User’s Guide...
  • Page 97: The Vpn Transport Screens

    H A P T E R The VPN Transport Screens 9.1 Overview This chapter describes the ADVANCED > VPN Transport screens, where you can configure the WiMAX Modem to allow traffic from multiple users to pass through the WiMAX network to the service provider’s router. Each user has his own personal connection to the service provider, even though there is only a single WiMAX connection.
  • Page 98: What You Need To Know

    Chapter 9 The VPN Transport Screens • The Ethernet Pseudowire screen (Section 9.4 on page 104) lets you configure the links over the WiMAX network between the WiMAX Modem and the service provider’s router. • The Statistics screen (Section 9.5 on page 107) lets you view performance information about the VPN transport connections.
  • Page 99: Before You Begin

    Chapter 9 The VPN Transport Screens 9.1.3 Before You Begin Before you start configuring your WiMAX Modem to use VPN transport, ensure that you have the following from the service provider: • The IP address or domain name of the service provider’s edge router. •...
  • Page 100: Customer Interface

    Chapter 9 The VPN Transport Screens 9.3 Customer Interface Customer interfaces connect data coming from your computers to Ethernet pseudowires, according to the data’s VLAN (Virtual Local Area Network) information. One customer interface is for traffic that has no tag; this is the default interface (rule 0) which cannot be deleted in the GUI.
  • Page 101: Generic Routing Encapsulation

    Chapter 9 The VPN Transport Screens 9.3.2 Generic Routing Encapsulation In order to transport the VPLS traffic over the WiMAX network, the WiMAX Modem uses the Generic Routing Encapsulation (GRE) protocol. Like MPLS, GRE is a tunneling protocol that has specified endpoints. The GRE tunnel is bi-directional, and transports both LSPs.
  • Page 102: Customer Interface Options

    Chapter 9 The VPN Transport Screens 9.3.3 Customer Interface Options Click ADVANCED > VPN Transport > Customer Interface to configure the VPNs used by the WiMAX Modem. Figure 38 ADVANCED > VPN Transport > Customer Interface The following table describes the icons in this screen. Table 25 Advanced>...
  • Page 103: Customer Interface Setup

    Chapter 9 The VPN Transport Screens Table 26 ADVANCED > VPN Transport > Customer Interface (continued) LABEL DESCRIPTION Associated This displays the number of the Ethernet pseudowire that this interface Ethernet uses, as well as the ingress and egress MPLS (Multi-Protocol Label Pseudowire Switching) VC (Virtual Circuit) label numbers.
  • Page 104: Ethernet Pseudowire

    Chapter 9 The VPN Transport Screens The following table describes the labels in this screen. Table 27 ADVANCED > VPN Transport > Customer Interface Setup LABEL DESCRIPTION Active Select to make this customer interface active. Deselect it to make the customer interface inactive. Customer Interface Type A customer interface can be tagged (controlling traffic that has a...
  • Page 105: Figure 40 Ethernet Pseudowire Settings Example

    Chapter 9 The VPN Transport Screens device must be the same as the egress label on the peer device, as shown in the following figure. A is your WiMAX Modem and B is your service provider’s router. Figure 40 Ethernet Pseudowire Settings Example TO Y PSEUDOWIRE TO X...
  • Page 106: Ethernet Pseudowire Setup

    Chapter 9 The VPN Transport Screens Table 29 ADVANCED > VPN Transport > Ethernet Pseudowire (continued) LABEL DESCRIPTION Ingress This is the MPLS virtual circuit label number for traffic coming from the peer device. Egress This is the MPLS virtual circuit label number for traffic going to the peer device.
  • Page 107: Statistics

    Chapter 9 The VPN Transport Screens Table 30 ADVANCED > VPN Transport > Ethernet Pseudowire Setup (continued) LABEL DESCRIPTION Pseudowire Enter a brief (up to 31 characters) description for this Description pseudowire. Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes.
  • Page 108 Chapter 9 The VPN Transport Screens User’s Guide...
  • Page 109: The Nat Configuration Screens

    H A P T E R The NAT Configuration Screens 10.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network.
  • Page 110: Port Forwarding

    Chapter 10 The NAT Configuration Screens The following table describes the labels in this screen. Table 32 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Select this if you want to use port forwarding, trigger ports, or any Address Translation of the ALG.
  • Page 111: Port Forwarding Options

    Chapter 10 The NAT Configuration Screens For example, let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address.
  • Page 112: Table 33 Advanced> Nat Configuration > Port Forwarding

    Chapter 10 The NAT Configuration Screens The following table describes the icons in this screen. Table 33 Advanced> NAT Configuration > Port Forwarding ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 34 ADVANCED >...
  • Page 113: Port Forwarding Rule Setup

    Chapter 10 The NAT Configuration Screens 10.3.2 Port Forwarding Rule Setup Click a port forwarding rule’s Edit icon in the ADVANCED > NAT Configuration > Port Forwarding screen to activate, deactivate, or edit it. Figure 47 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup The following table describes the labels in this screen.
  • Page 114: Trigger Port

    Chapter 10 The NAT Configuration Screens 10.4 Trigger Port Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN).
  • Page 115: Trigger Port Forwarding Example

    Chapter 10 The NAT Configuration Screens Table 36 ADVANCED > NAT Configuration > Trigger Port (continued) LABEL DESCRIPTION Start Port Enter the incoming port number or range of port numbers you want to End Port forward to the IP address the WiMAX Modem records. To forward one port number, enter the port number in the Start Port and End Port fields.
  • Page 116: Alg

    Chapter 10 The NAT Configuration Screens Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the WiMAX Modem to record Jane’s computer IP address. The WiMAX Modem associates Jane's computer IP address with the "incoming"...
  • Page 117: Figure 50 Advanced > Nat Configuration > Alg

    Chapter 10 The NAT Configuration Screens Click ADVANCED > NAT Configuration > ALG to enable and disable SIP (VoIP), FTP (file transfer), and H.323 (audio-visual) ALG in the WiMAX Modem. Figure 50 ADVANCED > NAT Configuration > ALG The following table describes the labels in this screen. Table 37 ADVANCED >...
  • Page 118 Chapter 10 The NAT Configuration Screens User’s Guide...
  • Page 119: The System Configuration Screens

    H A P T E R The System Configuration Screens 11.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 11.1.1 What You Can Do in This Chapter •...
  • Page 120: The System Configuration Screens

    Chapter 11 The System Configuration Screens • In Windows XP: Click Start > My Computer > View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the WiMAX Modem System Name. Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN.
  • Page 121: General

    Chapter 11 The System Configuration Screens 11.2 General Click ADVANCED > System Configuration > General to change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. Figure 51 ADVANCED > System Configuration > General The following table describes the labels in this screen.
  • Page 122: Dynamic Dns

    Chapter 11 The System Configuration Screens Table 38 ADVANCED > System Configuration > General (continued) LABEL DESCRIPTION Retype to Enter the new password again. Confirm Apply Click to save your changes. Reset Click to restore your previously saved settings. 11.3 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU- SeeMe, etc.).
  • Page 123: Figure 52 Advanced > System Configuration > Dynamic Dns

    Chapter 11 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client. Figure 52 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 39 ADVANCED >...
  • Page 124: Firmware

    Chapter 11 The System Configuration Screens Table 39 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Enable offline This field is available when CustomDNS is selected in the DDNS Type option field. Select this if your Dynamic DNS service provider redirects traffic to a URL that you can specify while you are off line.
  • Page 125: The Firmware Upload Process

    Chapter 11 The System Configuration Screens The following table describes the labels in this screen. Table 40 ADVANCED > System Configuration > Firmware LABEL DESCRIPTION File Path Enter the location of the *.bin file you want to upload, or click Browse...
  • Page 126: Configuration

    Chapter 11 The System Configuration Screens 11.5 Configuration Click ADVANCED > System Configuration > Configuration to back up or restore the configuration of the WiMAX Modem. You can also use this screen to reset the WiMAX Modem to the factory default settings. Figure 54 ADVANCED >...
  • Page 127: The Restore Configuration Process

    Chapter 11 The System Configuration Screens 11.5.1 The Restore Configuration Process When the WiMAX Modem restores a configuration file, the device automatically restarts. This causes a temporary network disconnect. Note: Do not turn off the device while configuration file upload is in progress. If the WiMAX Modem’s IP address is different in the configuration file you selected, you may need to change the IP address of your computer to be in the same subnet as that of the default management IP address (192.168.5.1).
  • Page 128: The Restart Process

    Chapter 11 The System Configuration Screens 11.6.1 The Restart Process When you click Restart, the the process usually takes about two minutes. Once the restart is complete you can log in again. User’s Guide...
  • Page 129: Voice Screens

    Voice Screens The Service Configuration Screens (131) The Phone Screens (149) The Phone Book Screens (159)
  • Page 131: The Service Configuration Screens

    H A P T E R The Service Configuration Screens 12.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network.
  • Page 132: The Service Configuration Screens

    Chapter 12 The Service Configuration Screens multimedia sessions over the Internet. SIP signaling is separate from the media for which it handles sessions. The media that is exchanged during the session can use a different path from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched telephone networks.
  • Page 133: Before You Begin

    Chapter 12 The Service Configuration Screens 12.1.3 Before you Begin • Ensure that you have all of your voice account information on hand. If not, contact your voice account service provider to find out which settings in this chapter you should configure in order to use your telephone with the WiMAX Modem.
  • Page 134: Table 43 Voice > Service Configuration > Sip Setting

    Chapter 12 The Service Configuration Screens The following table describes the labels in this screen. Table 43 VOICE > Service Configuration > SIP Setting LABEL DESCRIPTION SIP Account Select the SIP account you want to see in this screen. If you change this field, the screen automatically refreshes.
  • Page 135: Advanced Sip Settings

    Chapter 12 The Service Configuration Screens 12.2.1 Advanced SIP Settings This section describes the features of the Advanced SIP settings screen. 12.2.1.1 STUN STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) allows the WiMAX Modem to find the presence and types of NAT routers and/or firewalls between it and the public Internet.
  • Page 136 Chapter 12 The Service Configuration Screens • G.711 is a Pulse Code Modulation (PCM) waveform codec. PCM measures analog signal amplitudes at regular time intervals (sampling) and converts them into digital bits (quantization). Quantization “reads” the analog signal and then “writes”...
  • Page 137: Figure 58 Voice > Service Configuration > Sip Settings > Advanced

    Chapter 12 The Service Configuration Screens 12.2.1.5 Advanced SIP Settings Options Click Advanced in VOICE > Service Configuration > SIP Settings to set up and maintain advanced settings for each SIP account. Figure 58 VOICE > Service Configuration > SIP Settings > Advanced The following table describes the labels in this screen.
  • Page 138 Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Enter the number of seconds your SIP account is registered with the Duration SIP register server before it is deleted. The WiMAX Modem automatically tries to re-register your SIP account when one-half of this time has passed.
  • Page 139 Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION STUN Active Select this if all of the following conditions are satisfied. • There is a NAT router between the WiMAX Modem and the SIP server.
  • Page 140: Table 45 Custom Tones Details

    Chapter 12 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Time Keep the default value, unless your VoIP service provider tells you to change it. Enter the number of seconds the SIP server should provide the message waiting service each time the WiMAX Modem subscribes to the service.
  • Page 141 Chapter 12 The Service Configuration Screens Table 45 Custom Tones Details LABEL DESCRIPTION Maximum Time per 20 seconds Individual Tone Total Number of Tones Recordable You can record up to eight different custom tones but the total time must be 128 seconds or less. Use the following steps if you would like to create new tones or change your tones: Pick up the phone and press **** on your phone’s keypad and wait for the...
  • Page 142: Qos

    Chapter 12 The Service Configuration Screens 12.3 QoS Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the WiMAX Modem) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks.
  • Page 143: Technical Reference

    Chapter 12 The Service Configuration Screens Table 46 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure.
  • Page 144: Sip Client Server

    Chapter 12 The Service Configuration Screens After talking, A hangs up and sends a BYE request. B replies with an OK response confirming receipt of the BYE request and the call is terminated. 12.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests.
  • Page 145: Sip Redirect Server

    Chapter 12 The Service Configuration Screens The SIP proxy server forwards the call invitation to C. Figure 61 SIP Proxy Server 12.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request.
  • Page 146: Nat And Sip

    Chapter 12 The Service Configuration Screens Client device A then sends the call invitation to client device C. Figure 62 SIP Redirect Server 12.4.6 NAT and SIP The WiMAX Modem must register its public IP address with a SIP register server. If there is a NAT router between the WiMAX Modem and the SIP register server, the WiMAX Modem probably has a private IP address.
  • Page 147: Dscp And Per-Hop Behavior

    Chapter 12 The Service Configuration Screens 12.4.8 DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels.
  • Page 148 Chapter 12 The Service Configuration Screens User’s Guide...
  • Page 149: The Phone Screens

    H A P T E R The Phone Screens 13.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Modem. You can also select which SIP account to use for making outgoing calls. 13.1.1 What You Can Do in This Chapter •...
  • Page 150: Analog Phone

    Chapter 13 The Phone Screens Supplementary Phone Services Overview Supplementary services such as call hold, call waiting, call transfer, etc. are generally available from your VoIP service provider. The WiMAX Modem supports the following services: • Call Hold • Call Waiting •...
  • Page 151: Advanced Analog Phone Setup

    Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 48 VOICE > Phone > Analog Phone LABEL DESCRIPTION Phone Port Select the phone port you want to see in this screen. If you change this Settings field, the screen automatically refreshes.
  • Page 152: Common

    Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 49 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION Voice Volume Control Speaking Enter the loudness that the WiMAX Modem uses for speech that it sends Volume to the peer device.
  • Page 153: Region

    Chapter 13 The Phone Screens The following table describes the labels in this screen. Table 50 VOICE > Phone > Common LABEL DESCRIPTION Active Select this if you want to use the pound key (#) to tell the WiMAX Immediate Dial Modem to make the phone call immediately, instead of waiting the number of seconds you selected in the Dialing Interval Select in VOICE >...
  • Page 154: Technical Reference

    Chapter 13 The Phone Screens 13.5 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 13.5.1 The Flash Key Flashing means to press the hook for a short period of time (a few hundred milliseconds) before releasing it.
  • Page 155 Chapter 13 The Phone Screens If you have another call, press the flash key and then “2” to switch back and forth between caller A and B by putting either one on hold. Press the flash key and then “0” to disconnect the call presently on hold and keep the current call on line.
  • Page 156: Usa Type Supplementary Services

    Chapter 13 The Phone Screens Hang up the phone to drop the connection. If you want to separate the activated three-way conference into two individual connections (one is on-line, the other is on hold), press the flash key and press “2”.
  • Page 157 Chapter 13 The Phone Screens After you hear the ring signal or the second party answers it, hang up the phone. USA Three-Way Conference allows you to make three-way conference calls. To do so: When you are making a call, press the flash key to put the call on hold and get a dial tone.
  • Page 158 Chapter 13 The Phone Screens User’s Guide...
  • Page 159: The Phone Book Screens

    H A P T E R The Phone Book Screens 14.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Modem’s phone book for making VoIP calls. 14.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 14.2 on page 160) lets you maintain rules for handling incoming calls.
  • Page 160: Incoming Call Policy

    Chapter 14 The Phone Book Screens 14.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 68 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen.
  • Page 161 Chapter 14 The Phone Book Screens Table 54 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer Select this if you want the WiMAX Modem to forward incoming calls to Forward to the specified phone number if the call is unanswered. (See No Answer Number Waiting Time.) Specify the phone number in the field on the right.
  • Page 162: Speed Dial

    Chapter 14 The Phone Book Screens 14.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters. You can also create speed-dial entries for frequently-used SIP phone numbers.
  • Page 163: Table 56 Voice > Phone Book > Speed Dial

    Chapter 14 The Phone Book Screens The following table describes the labels in this screen. Table 56 VOICE > Phone Book > Speed Dial LABEL DESCRIPTION Speed Dial Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the WiMAX Modem to call when you dial the speed-dial number.
  • Page 164 Chapter 14 The Phone Book Screens User’s Guide...
  • Page 165: Tools & Status Screens

    Tools & Status Screens The Certificates Screens (167) The Firewall Screens (189) Content Filter (199) The Remote Management Screens (203) QoS (215) The Logs Screens (219) The Status Screen (235)
  • Page 167: The Certificates Screens

    H A P T E R The Certificates Screens 15.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Modem. The WiMAX Modem can use public key certificates (also sometimes called “digital IDs”) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
  • Page 168: My Certificates

    Chapter 15 The Certificates Screens WiMAX Modem to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 15.2 My Certificates Click TOOLS > Certificates > My Certificates to access this screen. Use this screen to generate and export self-signed certificates or certification requests and import the WiMAX Modem’s CA-signed certificates.
  • Page 169 Chapter 15 The Certificates Screens Table 58 TOOLS > Certificates > My Certificates (continued) LABEL DESCRIPTION Name This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. Type This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate.
  • Page 170: My Certificates Create

    Chapter 15 The Certificates Screens 15.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Modem create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
  • Page 171: Table 59 Tools > Certificates > My Certificates > Create

    Chapter 15 The Certificates Screens The following table describes the labels in this screen. Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
  • Page 172 Chapter 15 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Create a Select Create a certification request and enroll for a certification certificate immediately online to have the WiMAX Modem request and enroll generate a request for a certificate and apply to a certification for a certificate authority for a certificate.
  • Page 173 Chapter 15 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. If you configured the My Certificate Create screen to have the WiMAX Modem enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen.
  • Page 174: My Certificate Edit

    Chapter 15 The Certificates Screens 15.2.2 My Certificate Edit Click TOOLS > Certificates > My Certificates then the Edit icon to access this screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 72 TOOLS > Certificates > My Certificates > Edit The following table describes the labels in this screen.
  • Page 175 Chapter 15 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
  • Page 176 Chapter 15 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment”...
  • Page 177: My Certificate Import

    Chapter 15 The Certificates Screens 15.2.3 My Certificate Import Click TOOLS > Certificates > My Certificates > Import to access this screen. Use this screen to import a certificate that matches a corresponding certification request that was generated by the WiMAX Modem. You must remove any spaces from the certificate’s filename before you can import it.
  • Page 178: Trusted Cas

    Chapter 15 The Certificates Screens 15.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs access this screen. Use this screen to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted. The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy;...
  • Page 179 Chapter 15 The Certificates Screens Table 63 TOOLS > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
  • Page 180: Trusted Ca Edit

    Chapter 15 The Certificates Screens 15.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen. Use this screen to view in-depth certificate information and change the certificate’s name. Figure 75 TOOLS >...
  • Page 181 Chapter 15 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
  • Page 182 Chapter 15 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Key Usage This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment”...
  • Page 183: Trusted Ca Import

    Chapter 15 The Certificates Screens 15.3.2 Trusted CA Import Click TOOLS > Certificates > Trusted CAs and then click Import to open the Trusted CA Import screen. Follow the instructions in this screen to save a trusted certification authority’s certificate from a computer to the WiMAX Modem. The WiMAX Modem trusts any valid certificate signed by any of the imported trusted CA certificates.
  • Page 184: Certificate Authorities

    Chapter 15 The Certificates Screens 15.4.1 Certificate Authorities When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”).
  • Page 185 Chapter 15 The Certificates Screens Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The WiMAX Modem can check a peer’s certificate against a directory server’s list of revoked certificates.
  • Page 186: Verifying A Certificate

    Chapter 15 The Certificates Screens 15.4.2 Verifying a Certificate Before you import a certificate into the WiMAX Modem, you should verify that you have the correct certificate. This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates.
  • Page 187: Figure 78 Certificate Details

    Chapter 15 The Certificates Screens Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 78 Certificate Details Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields.
  • Page 188 Chapter 15 The Certificates Screens User’s Guide...
  • Page 189: The Firewall Screens

    H A P T E R The Firewall Screens 16.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Modem’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall"...
  • Page 190: Firewall Setting

    Chapter 16 The Firewall Screens the Internet. The WiMAX Modem can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The WiMAX Modem is installed between the LAN and a WiMAX base station connecting to the Internet.
  • Page 191: Triangle Route

    Chapter 16 The Firewall Screens LAN-to-LAN/WiMAX Modem means the LAN to the WiMAX Modem LAN interface. This is always allowed, as this is how you manage the WiMAX Modem from your local computer. WAN-to-LAN rules are Internet to your local network firewall rules. The default is to block all traffic from the Internet to your local network.
  • Page 192: General Options

    Chapter 16 The Firewall Screens 16.2.3 General Options Click TOOLS > Firewall > General to configure the basic settings for your firewall. Figure 81 TOOLS > Firewall > General The following table describes the labels in this screen. Table 66 TOOLS > Firewall > General LABEL DESCRIPTION Enable Firewall...
  • Page 193: Services

    Chapter 16 The Firewall Screens 16.3 Services Click TOOLS > Firewall > Services to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 82 TOOLS > Firewall > Service Setting The following table describes the labels in this screen.
  • Page 194: Technical Reference

    Chapter 16 The Firewall Screens Table 67 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Blocked This is a list of services (ports) that are inaccessible to computers on Services your LAN when service blocking is effective. To remove a service from this list, select the service, and click Delete.
  • Page 195: Guidelines For Enhancing Security With Your Firewall

    Chapter 16 The Firewall Screens 16.4.2 Guidelines For Enhancing Security With Your Firewall Change the default password via web configurator. Think about access control before you connect to the network in any way. Limit who can access your router. Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could present a potential security risk.
  • Page 196: Figure 83 "Triangle Route" Problem

    Chapter 16 The Firewall Screens As a result, the WiMAX Modem resets the connection, as the connection has not been acknowledged. Figure 83 “Triangle Route” Problem 16.4.3.1 Solving the “Triangle Route” Problem If you have the WiMAX Modem allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the WiMAX Modem and its firewall protection.
  • Page 197: Figure 84 Ip Alias

    Chapter 16 The Firewall Screens The WiMAX Modem then sends it to the computer on the LAN in Subnet 1. Figure 84 IP Alias User’s Guide...
  • Page 198 Chapter 16 The Firewall Screens User’s Guide...
  • Page 199: Content Filter

    H A P T E R Content Filter 17.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs.
  • Page 200: Filter

    Chapter 17 Content Filter 17.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective. Figure 85 TOOLS > Content Filter > Filter User’s Guide...
  • Page 201: Table 68 Tools > Content Filter > Filter

    Chapter 17 Content Filter The following table describes the labels in this screen. Table 68 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted You can allow a specific computer to access all Internet resources Computer IP without the restrictions you set in these screens.
  • Page 202: Schedule

    Chapter 17 Content Filter 17.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 86 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 69 TOOLS > Content Filter > Schedule LABEL DESCRIPTION Day to Block...
  • Page 203: The Remote Management Screens

    H A P T E R The Remote Management Screens 18.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Modem interface (if any) from which computers.
  • Page 204: What You Need To Know

    Chapter 18 The Remote Management Screens • The SNMP screen (Section 18.5 on page 207) lets you control SNMP access to your WiMAX Modem. • The DNS screen (Section 18.6 on page 210) lets you control DNS access to your WiMAX Modem.
  • Page 205: Www

    Chapter 18 The Remote Management Screens SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your WiMAX Modem supports SNMP agent functionality, which allows a manager station to manage and monitor the WiMAX Modem through the network.
  • Page 206: Telnet

    Chapter 18 The Remote Management Screens 18.3 Telnet Click TOOLS > Remote Management > Telnet to control Telnet access to your WiMAX Modem. Figure 88 TOOLS > Remote Management > Telnet The following table describes the labels in this screen. Table 72 TOOLS >...
  • Page 207: Snmp

    Chapter 18 The Remote Management Screens The following table describes the labels in this screen. Table 73 TOOLS > Remote Management > FTP LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the WiMAX Modem using this service.
  • Page 208: Snmp Traps

    Chapter 18 The Remote Management Screens The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
  • Page 209: Snmp Options

    Chapter 18 The Remote Management Screens 18.5.2 SNMP Options Click TOOLS > Remote Management > SNMP to access this screen. Use SNMP options to control SNMP access to your WiMAX Modem. Figure 91 TOOLS > Remote Management > SNMP The following table describes the labels in this screen. Table 75 TOOLS >...
  • Page 210: Dns

    Chapter 18 The Remote Management Screens Table 75 TOOLS > Remote Management > SNMP (continued) LABEL DESCRIPTION Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the WiMAX Modem using this service. Select All to allow any computer to access the WiMAX Modem using this service.
  • Page 211: Security

    Chapter 18 The Remote Management Screens 18.7 Security Click TOOLS > Remote Management > Security to access this screen. Use this screen to control how your WiMAX Modem responds to other types of requests. Figure 93 TOOLS > Remote Management > Security The following table describes the labels in this screen.
  • Page 212: Tr0-69

    Chapter 18 The Remote Management Screens 18.8 TR0-69 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipement (CPE), such as the WiMAX Modem. It can be managed over a WAN by means of an Auto Configuration Server (ACS).
  • Page 213: Figure 95 Tools > Remote Management > Tr069

    Chapter 18 The Remote Management Screens Click TOOLS > Remote Management > TR069 to access this screen. Use this screen to open WiMAX Modem’s auto-configuration and dynamic service configuration options. Figure 95 TOOLS > Remote Management > TR069 The following table describes the labels in this screen. Table 78 TOOLS >...
  • Page 214 Chapter 18 The Remote Management Screens Table 78 TOOLS > Remote Management > TR069 LABEL DESCRIPTION Periodic Inform Select this to allow the WiMAX Modem to periodically connect to the Enable ACS and check for configuration updates. If you do not enable this feature then the WiMAX Modem can only be updated automatically when the ACS initiates contact with it and if you selected the Active checkbox on this screen.
  • Page 215: Qos

    H A P T E R 19.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested.
  • Page 216: Class Setup

    Chapter 19 QoS 19.3 Class Setup Use this screen to add, edit or delete QoS classifiers. A classifier groups traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow.
  • Page 217: Class Configuration

    Chapter 19 QoS 19.3.1 Class Configuration Click the Create New Class button or the edit icon in the Class Setup screen to configure a classifier. Figure 98 QoS > Class Setup > Class Configuration The following table describes the labels in this screen. Table 81 QoS Class Setup LABEL DESCRIPTION...
  • Page 218 Chapter 19 QoS User’s Guide...
  • Page 219: The Logs Screens

    H A P T E R The Logs Screens 20.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Modem’s log and alert settings. For a list of log messages, see Section 20.4 on page 225.
  • Page 220: Table 82 Syslog Logs

    Chapter 20 The Logs Screens can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs. Table 82 Syslog Logs LOG MESSAGE DESCRIPTION This message is sent by the system ("RAS" displays Event Log: <Facility*8 + as the system name if you haven’t configured one) Severity>Mon dd hr:mm:ss when the router generates a syslog.
  • Page 221: View Logs

    Chapter 20 The Logs Screens 20.2 View Logs Click TOOLS > Logs > View Log to access this screen. Use this screen to look at log entries and alerts. Alerts are written in red. Figure 99 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order.
  • Page 222 Chapter 20 The Logs Screens Table 84 TOOLS > Logs > View Logs (continued) LABEL DESCRIPTION The number of the item in this list. Time This field displays the time the log entry was recorded. Message This field displays the reason for the log entry. See Section 20.4 on page 225.
  • Page 223: Log Settings

    Chapter 20 The Logs Screens 20.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Modem sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded. Figure 100 TOOLS > Logs > Log Settings User’s Guide...
  • Page 224: Table 85 Tools > Logs > Log Settings

    Chapter 20 The Logs Screens The following table describes the labels in this screen. Table 85 TOOLS > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e-mail logs and alerts.
  • Page 225: Log Message Descriptions

    Chapter 20 The Logs Screens Table 85 TOOLS > Logs > Log Settings LABEL DESCRIPTION Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 20.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 86 System Error Logs LOG MESSAGE DESCRIPTION...
  • Page 226: Table 88 Access Control Logs

    Chapter 20 The Logs Screens Table 87 System Maintenance Logs (continued) LOG MESSAGE DESCRIPTION The device got the time and date from the time Time initialized by Time server. server The device got the time and date from the NTP Time initialized by NTP server.
  • Page 227: Table 89 Tcp Reset Logs

    Chapter 20 The Logs Screens Table 89 TCP Reset Logs LOG MESSAGE DESCRIPTION The router sent a TCP reset packet when a host was Under SYN flood attack, under a SYN flood attack (the TCP incomplete count is per sent TCP RST destination host.) The router sent a TCP reset packet when the number of Exceed TCP MAX...
  • Page 228: Table 91 Icmp Logs

    Chapter 20 The Logs Screens or type and code details, see Table 97 on page 231. Table 91 ICMP Logs LOG MESSAGE DESCRIPTION ICMP access matched the default policy and was Firewall default policy: ICMP blocked or forwarded according to the user's <Packet Direction>, <type:%d>, setting.
  • Page 229: Table 94 Content Filtering Logs

    Chapter 20 The Logs Screens Table 94 Content Filtering Logs LOG MESSAGE DESCRIPTION The content of a requested web page matched a user defined %s: Keyword blocking keyword. The web site is not in a trusted domain, and the router blocks %s: Not in trusted web all traffic except trusted domain sites.
  • Page 230: Table 96 Remote Management Logs

    Chapter 20 The Logs Screens Table 95 Attack Logs (continued) LOG MESSAGE DESCRIPTION The firewall detected an ICMP IP spoofing attack on the ip spoofing - WAN ICMP WAN port. (type:%d, code:%d) The firewall detected an ICMP echo attack. icmp echo : ICMP (type:%d, code:%d) The firewall detected a TCP syn flood attack.
  • Page 231: Table 97 Icmp Notes

    Chapter 20 The Logs Screens Table 96 Remote Management Logs LOG MESSAGE DESCRIPTION Attempted use of WWW service was blocked Remote Management: WWW denied according to remote management settings. Attempted use of HTTPS service was blocked Remote Management: HTTPS according to remote management settings. denied Attempted use of SSH service was blocked Remote Management: SSH denied...
  • Page 232: Table 98 Sip Logs

    Chapter 20 The Logs Screens Table 97 ICMP Notes (continued) TYPE CODE DESCRIPTION Timestamp request message Timestamp Reply Timestamp reply message Information Request Information request message Information Reply Information reply message Table 98 SIP Logs LOG MESSAGE DESCRIPTION The listed SIP account was successfully registered with a SIP Registration Success SIP register server.
  • Page 233: Table 100 Fsm Logs: Caller Side

    Chapter 20 The Logs Screens Table 100 FSM Logs: Caller Side LOG MESSAGE DESCRIPTION Someone used a phone connected to the listed phone VoIP Call Start Ph[Phone port to initiate a VoIP call to the listed destination. Port Number] <- Outgoing Call Number Someone used a phone connected to the listed phone VoIP Call Established...
  • Page 234 Chapter 20 The Logs Screens User’s Guide...
  • Page 235: The Status Screen

    H A P T E R The Status Screen 21.1 Overview Use this screen to view a complete summary of your WiMAX Modem connection status. 21.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts.
  • Page 236: Table 103 Status

    Chapter 21 The Status Screen The following tables describe the labels in this screen. Table 103 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Modem system name.
  • Page 237 Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION WiMAX State This field displays the status of the WiMAX Modem’s current connection. • INIT: the WiMAX Modem is starting up. • DL_SYN: The WiMAX Modem is unable to connect to a base station. •...
  • Page 238 Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION Memory Usage This field displays what percentage of the WiMAX Modem’s memory is currently used. The higher the memory usage, the more likely the WiMAX Modem is to slow down. Some memory is required just to start the WiMAX Modem and to run the web configurator.
  • Page 239: Packet Statistics

    Chapter 21 The Status Screen Table 103 Status (continued) LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, Click Unregister to delete the SIP account’s registration in the SIP server.
  • Page 240: Table 104 Packet Statistics

    Chapter 21 The Status Screen The following table describes the fields in this screen. Table 104 Packet Statistics LABEL DESCRIPTION Port This column displays each interface of the WiMAX Modem. Status This field indicates whether or not the WiMAX Modem is using the interface.
  • Page 241: Wimax Site Information

    Chapter 21 The Status Screen 21.2.2 WiMAX Site Information Click Status > WiMAX Site Information to open this screen. This read-only screen shows WiMAX frequency information for the WiMAX Modem. These settings can be configured in the ADVANCED > WAN Configuration > WiMAX Configuration screen.
  • Page 242: Dhcp Table

    Chapter 21 The Status Screen 21.2.3 DHCP Table Click Status > DHCP Table to open this screen. This read-only screen shows the IP addresses, Host Names and MAC addresses of the devices currently connected to the WiMAX Modem. These settings can be configured in the ADVANCED > LAN Configuration >...
  • Page 243: Voip Statistics

    Chapter 21 The Status Screen 21.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 105 VoIP Statistics Each field is described in the following table.
  • Page 244 Chapter 21 The Status Screen Table 107 VoIP Statistics LABEL DESCRIPTION Last Outgoing This field displays the last number the SIP account called. It displays Number N/A if the SIP account has never dialed a number. Call Statistics Phone This field displays the WiMAX Modem’s phone port number. Hook This field indicates whether the phone is on the hook or off the hook.
  • Page 245: Wimax Profile

    Chapter 21 The Status Screen 21.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. Note: Not all WiMAX Modem models have all the fields shown here.
  • Page 246 Chapter 21 The Status Screen Table 108 The WiMAX Profile Screen (continued) LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station.
  • Page 247: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (249) Product Specifications (257)
  • Page 249: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Modem Access and Login • Internet Access •...
  • Page 250: Wimax Modem Access And Login

    Chapter 22 Troubleshooting Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adapter to the WiMAX Modem. If the problem continues, contact the vendor. 22.2 WiMAX Modem Access and Login I forgot the IP address for the WiMAX Modem.
  • Page 251 Chapter 22 Troubleshooting • If you changed the IP address (Section 6.2 on page 66), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the WiMAX Modem. Check the hardware connections, and make sure the LEDs are behaving as expected.
  • Page 252: Internet Access

    Chapter 22 Troubleshooting I cannot Telnet to the WiMAX Modem. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. 22.3 Internet Access I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected.
  • Page 253 Chapter 22 Troubleshooting I cannot access the Internet any more. I had access to the Internet (with the WiMAX Modem), but my Internet connection is not available any more. Check the hardware connections, and make sure the LEDs are behaving as expected.
  • Page 254: Phone Calls And Voip

    Chapter 22 Troubleshooting 22.4 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. Check the telephone connections and telephone wire. Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 12 on page 131).
  • Page 255: Reset The Wimax Modem To Its Factory Defaults

    Chapter 22 Troubleshooting 22.5 Reset the WiMAX Modem to Its Factory Defaults If you reset the WiMAX Modem, you lose all of the changes you have made. The WiMAX Modem re-loads its default settings, and the password resets to 1234. You have to make all of your changes again.
  • Page 256 Chapter 22 Troubleshooting User’s Guide...
  • Page 257: Product Specifications

    One analog ATA interfaces for standard telephones through RJ-11 FXS (Foreign Exchange Subscriber) analog connector Power over Ethernet One RJ-45-type PoE port providing 48V DC to the MAX- Interface (PoE) 306M1-ODU from the MAX-306M1-IDU Antennas One 15dBi ± 0.5dBi Cross-Polarization antenna (ODU) Weight 400g Dimensions ODU: 372 (L) mm x 232 (W) mm x 54.8 (H) mm...
  • Page 258: Table 110 Radio Specifications

    Chapter 23 Product Specifications Table 110 Radio Specifications FEATURE DESCRIPTION WiMAX Operating MAX-306M1: 2.5~2.7 GHz Frequency MAX-316M1: 3.4~3.6 GHz Channel Bandwidth 5MHz / 10MHz Maximum Transmit Power 26dbm with ODU antenna deployed. WiMAX Compliance Compliant to receiver performances defined in IEEE P802.16-2005, §8.4.13.
  • Page 259 Chapter 23 Product Specifications Table 111 Firmware Specifications (continued) FEATURE DESCRIPTION DHCP DHCP (Dynamic Host Configuration Protocol) allows the individual clients (computers) to obtain the TCP/IP configuration at start-up from a centralized DHCP server. Your device has built-in DHCP server capability enabled by default.
  • Page 260: Table 112 Standards Supported

    Chapter 23 Product Specifications Table 112 Standards Supported STANDARD DESCRIPTION RFC 768 User Datagram Protocol RFC 791 Internet Protocol v4 RFC 792 Internet Control Message Protocol RFC 792 Transmission Control Protocol RFC 826 Address Resolution Protocol RFC 854 Telnet Protocol RFC 1349 Type of Service Protocol RFC 1706...
  • Page 261: Table 113 Voice Features

    Chapter 23 Product Specifications Table 112 Standards Supported (continued) STANDARD DESCRIPTION IEEE 802.3 10BASE5 10 Mbit/s (1.25 MB/s) IEEE 802.3u 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) with auto-negotiation Table 113 Voice Features Call Park and Call park and pickup lets you put a call on hold (park) and then Pickup continue the call (pickup).
  • Page 262: Table 114 Star (*) And Pound (#) Code Support

    Chapter 23 Product Specifications Table 113 Voice Features Call waiting This feature allows you to hear an alert when you are already using the phone and another person calls you. You can then either reject the new incoming call, put your current call on hold and receive the new incoming call, or end the current call and receive the new incoming call.
  • Page 263 Chapter 23 Product Specifications Table 114 Star (*) and Pound (#) Code Support Followed by the 10 digit phone number to cancel Call Waiting on a single call basis Activate Call Forwarding (*72 followed by the 10 digit phone number that is requesting call forwarding service) *720 Activate Call Forwarding (*720 followed by the 10 digit phone...
  • Page 264 Chapter 23 Product Specifications User’s Guide...
  • Page 265: Appendices And Index

    Appendices and Index WiMAX Security (267) Setting Up Your Computer’s IP Address (271) Pop-up Windows, JavaScripts and Java Permissions (299) IP Addresses and Subnetting (309) Importing Certificates (321) SIP Passthrough (353) Common Services (355) Legal Information (359) Customer Support (363)
  • Page 267: Appendix A Wimax Security

    P P E N D I X WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times.
  • Page 268 Appendix A WiMAX Security RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The base station is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users.
  • Page 269 Appendix A WiMAX Security the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Diameter Diameter (RFC 3588) is a type of AAA server that provides several improvements over RADIUS in efficiency, security, and support for roaming. Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA).
  • Page 270 Appendix A WiMAX Security Authentication The WiMAX Modem supports EAP-TTLS authentication. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection (with EAP- TLS digital certifications are needed by both the server and the wireless clients for mutual authentication).
  • Page 271: Appendix B Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 272: Figure 107 Windows Xp: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. Figure 107 Windows XP: Start Menu In the Control Panel, click the Network Connections icon.
  • Page 273: Figure 109 Windows Xp: Control Panel > Network Connections > Properties

    Appendix B Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. Figure 109 Windows XP: Control Panel > Network Connections > Properties On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 110 Windows XP: Local Area Connection Properties User’s Guide...
  • Page 274: Figure 111 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Appendix B Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Figure 111 Windows XP: Internet Protocol (TCP/IP) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 275: Figure 112 Windows Vista: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. Figure 112 Windows Vista: Start Menu In the Control Panel, click the Network and Internet icon. Figure 113 Windows Vista: Control Panel Click the Network and Sharing Center icon.
  • Page 276: Figure 115 Windows Vista: Network And Sharing Center

    Appendix B Setting Up Your Computer’s IP Address Click Manage network connections. Figure 115 Windows Vista: Network and Sharing Center Right-click Local Area Connection and then select Properties. Figure 116 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
  • Page 277: Figure 117 Windows Vista: Local Area Connection Properties

    Appendix B Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 117 Windows Vista: Local Area Connection Properties User’s Guide...
  • Page 278: Figure 118 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    Appendix B Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 118 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 279: Figure 119 Mac Os X 10.4: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. Figure 119 Mac OS X 10.4: Apple Menu In the System Preferences window, click the Network icon.
  • Page 280: Figure 121 Mac Os X 10.4: Network Preferences

    Appendix B Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 121 Mac OS X 10.4: Network Preferences For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab.
  • Page 281: Figure 123 Mac Os X 10.4: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. •...
  • Page 282: Figure 124 Mac Os X 10.4: Network Utility

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click Apply Now and close the window. Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 124 Mac OS X 10.4: Network Utility User’s Guide...
  • Page 283: Figure 125 Mac Os X 10.5: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. Click Apple > System Preferences. Figure 125 Mac OS X 10.5: Apple Menu In System Preferences, click the Network icon. Figure 126 Mac OS X 10.5: Systems Preferences User’s Guide...
  • Page 284: Figure 127 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 127 Mac OS X 10.5: Network Preferences > Ethernet From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: •...
  • Page 285: Figure 128 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your WiMAX Modem. Figure 128 Mac OS X 10.5: Network Preferences > Ethernet Click Apply and close the window. User’s Guide...
  • Page 286: Figure 129 Mac Os X 10.5: Network Utility

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 129 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 287: Figure 130 Ubuntu 8: System > Administration Menu

    Appendix B Setting Up Your Computer’s IP Address Click System > Administration > Network. Figure 130 Ubuntu 8: System > Administration Menu When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
  • Page 288: Figure 132 Ubuntu 8: Administrator Account Authentication

    Appendix B Setting Up Your Computer’s IP Address In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 132 Ubuntu 8: Administrator Account Authentication In the Network Settings window, select the connection that you want to configure, then click Properties.
  • Page 289: Figure 134 Ubuntu 8: Network Settings > Properties

    Appendix B Setting Up Your Computer’s IP Address The Properties dialog box opens. Figure 134 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
  • Page 290: Figure 135 Ubuntu 8: Network Settings > Dns

    Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 135 Ubuntu 8: Network Settings > DNS Click the Close button to apply the changes.
  • Page 291: Figure 136 Ubuntu 8: Network Tools

    Appendix B Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 136 Ubuntu 8: Network Tools User’s Guide...
  • Page 292: Figure 137 Opensuse 10.3: K Menu > Computer Menu

    Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 293: Figure 138 Opensuse 10.3: K Menu > Computer Menu

    Appendix B Setting Up Your Computer’s IP Address When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 138 openSUSE 10.3: K Menu > Computer Menu When the YaST Control Center window opens, select Network Devices and then click the Network Card icon.
  • Page 294: Figure 140 Opensuse 10.3: Network Settings

    Appendix B Setting Up Your Computer’s IP Address When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 140 openSUSE 10.3: Network Settings User’s Guide...
  • Page 295: Figure 141 Opensuse 10.3: Network Card Setup

    Appendix B Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 141 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 296: Figure 142 Opensuse 10.3: Network Settings

    Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 142 openSUSE 10.3: Network Settings Click Finish to save your settings and close the window.
  • Page 297: Figure 143 Opensuse 10.3: Knetwork Manager

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 143 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
  • Page 298 Appendix B Setting Up Your Computer’s IP Address User’s Guide...
  • Page 299: Appendix C Pop-Up Windows, Javascripts And Java Permissions

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 300: Figure 146 Internet Options: Privacy

    Appendix C Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 146 Internet Options: Privacy Click Apply to save this setting.
  • Page 301: Figure 147 Internet Options: Privacy

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 147 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. User’s Guide...
  • Page 302: Figure 148 Pop-Up Blocker Settings

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 148 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 303: Figure 149 Internet Options: Security

    Appendix C Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 149 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 304: Figure 150 Security Settings - Java Scripting

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 150 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 305: Figure 151 Security Settings - Java

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 151 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. User’s Guide...
  • Page 306: Figure 152 Java (Sun)

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 152 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
  • Page 307: Figure 154 Mozilla Firefox Content Security

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 154 Mozilla Firefox Content Security User’s Guide...
  • Page 308 Appendix C Pop-up Windows, JavaScripts and Java Permissions User’s Guide...
  • Page 309: Appendix D Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 310: Figure 155 Network Number And Host Id

    Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 155 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 311: Table 116 Subnet Masks

    Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
  • Page 312: Table 118 Alternative Subnet Mask Notation

    Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
  • Page 313: Figure 156 Subnetting Example: Before Subnetting

    Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 156 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
  • Page 314: Figure 157 Subnetting Example: After Subnetting

    Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 157 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
  • Page 315: Table 119 Subnet 1

    Appendix D IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 119 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
  • Page 316: Table 123 Eight Subnets

    Appendix D IP Addresses and Subnetting Table 122 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
  • Page 317: Configuring Ip Addresses

    Appendix D IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 125 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK HOST BITS SUBNETS SUBNET 255.255.128.0 (/17) 32766...
  • Page 318 Appendix D IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the WiMAX Modem unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 319: Figure 158 Conflicting Computer Ip Addresses Example

    Appendix D IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 158 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers.
  • Page 320: Figure 160 Conflicting Computer And Router Ip Addresses Example

    Appendix D IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 160 Conflicting Computer and Router IP Addresses Example User’s Guide...
  • Page 321: Appendix E Importing Certificates

    P P E N D I X Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
  • Page 322: Figure 161 Internet Explorer 7: Certification Error

    Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 323: Figure 163 Internet Explorer 7: Certificate Error

    Appendix E Importing Certificates In the Address Bar, click Certificate Error > View certificates. Figure 163 Internet Explorer 7: Certificate Error In the Certificate dialog box, click Install Certificate. Figure 164 Internet Explorer 7: Certificate User’s Guide...
  • Page 324: Figure 165 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates In the Certificate Import Wizard, click Next. Figure 165 Internet Explorer 7: Certificate Import Wizard If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 166 Internet Explorer 7: Certificate Import Wizard User’s Guide...
  • Page 325: Figure 167 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates Otherwise, select Place all certificates in the following store and then click Browse. Figure 167 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
  • Page 326: Figure 169 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates In the Completing the Certificate Import Wizard screen, click Finish. Figure 169 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 170 Internet Explorer 7: Security Warning User’s Guide...
  • Page 327: Figure 171 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 171 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
  • Page 328: Figure 173 Internet Explorer 7: Public Key Certificate File

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 329: Figure 175 Internet Explorer 7: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer Open Internet Explorer and click TOOLS > Internet Options. Figure 175 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content >...
  • Page 330: Figure 177 Internet Explorer 7: Certificates

    Appendix E Importing Certificates In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 177 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 178 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes.
  • Page 331 Appendix E Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. User’s Guide...
  • Page 332: Figure 180 Firefox 2: Website Certified By An Unknown Authority

    Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 333: Figure 181 Firefox 2: Page Info

    Appendix E Importing Certificates The certificate is stored and you can now connect securely to the web configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information.
  • Page 334: Figure 182 Firefox 2: Tools Menu

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Firefox and click TOOLS >...
  • Page 335: Figure 184 Firefox 2: Certificate Manager

    Appendix E Importing Certificates In the Certificate Manager dialog box, click Web Sites > Import. Figure 184 Firefox 2: Certificate Manager Use the Select File dialog box to locate the certificate and then click Open. Figure 185 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
  • Page 336: Figure 186 Firefox 2: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click TOOLS > Options. Figure 186 Firefox 2: Tools Menu In the Options dialog box, click ADVANCED > Encryption > View Certificates. Figure 187 Firefox 2: Options User’s Guide...
  • Page 337: Figure 188 Firefox 2: Certificate Manager

    Appendix E Importing Certificates In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 188 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 189 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 338: Figure 190 Opera 9: Certificate Signer Not Found

    Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 339: Figure 191 Opera 9: Security Information

    Appendix E Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 191 Opera 9: Security information User’s Guide...
  • Page 340: Figure 192 Opera 9: Tools Menu

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click TOOLS >...
  • Page 341: Figure 193 Opera 9: Preferences

    Appendix E Importing Certificates In Preferences, click ADVANCED > Security > Manage certificates. Figure 193 Opera 9: Preferences User’s Guide...
  • Page 342: Figure 194 Opera 9: Certificate Manager

    Appendix E Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 194 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 195 Opera 9: Import certificate User’s Guide...
  • Page 343: Figure 196 Opera 9: Install Authority Certificate

    Appendix E Importing Certificates In the Install authority certificate dialog box, click Install. Figure 196 Opera 9: Install authority certificate Next, click OK. Figure 197 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 344: Figure 198 Opera 9: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. Open Opera and click TOOLS > Preferences. Figure 198 Opera 9: Tools Menu In Preferences, ADVANCED > Security > Manage certificates. Figure 199 Opera 9: Preferences User’s Guide...
  • Page 345: Figure 200 Opera 9: Certificate Manager

    Appendix E Importing Certificates In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 200 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 346: Figure 201 Konqueror 3.5: Server Authentication

    Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 347: Figure 203 Konqueror 3.5: Kde Ssl Information

    Appendix E Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 203 Konqueror 3.5: KDE SSL Information User’s Guide...
  • Page 348: Figure 204 Konqueror 3.5: Public Key Certificate File

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Double-click the public key certificate file.
  • Page 349 Appendix E Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. User’s Guide...
  • Page 350: Figure 207 Konqueror 3.5: Settings Menu

    Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. Open Konqueror and click Settings > Configure Konqueror. Figure 207 Konqueror 3.5: Settings Menu In the Configure dialog box, select Crypto. On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
  • Page 351 Appendix E Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. User’s Guide...
  • Page 352 Appendix E Importing Certificates User’s Guide...
  • Page 353: Appendix F Sip Passthrough

    P P E N D I X SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Modem, use the ip alg disable ALG_SIP command to turn off the SIP ALG.
  • Page 354 Appendix F SIP Passthrough User’s Guide...
  • Page 355: Appendix G Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
  • Page 356 Appendix G Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 357 Appendix G Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL User-Defined PPTP (Point-to-Point Tunneling (GRE) Protocol) enables secure transfer of data over public networks.
  • Page 358 Appendix G Common Services Table 126 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution.
  • Page 359: Appendix H Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 360 Appendix H Legal Information Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device complies with part 15 of the FCC Rules. • Operation is subject to the condition that this device does not cause harmful interference.
  • Page 361: Zyxel Limited Warranty

    Appendix H Legal Information 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à...
  • Page 362 Appendix H Legal Information implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
  • Page 363: Appendix I Customer Support

    • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-3-578-3942 • Fax: +886-3-578-2439 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan China - ZyXEL Communications (Beijing) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn •...
  • Page 364 Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 - Modrany, Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk •...
  • Page 365 Appendix I Customer Support • Fax: +358-9-4780-8448 • Web: www.zyxel.fi • Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest,...
  • Page 366 • Support E-mail: support@zyxel.com • Support Telephone: +1-800-978-7222 • Sales E-mail: sales@zyxel.com • Sales Telephone: +1-714-632-0882 • Fax: +1-714-632-0858 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806-2001, U.S.A. Norway • Support E-mail: support@zyxel.no User’s Guide...
  • Page 367 Appendix I Customer Support • Sales E-mail: sales@zyxel.no • Telephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • Web: www.zyxel.no • Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland • E-mail: info@pl.zyxel.com • Telephone: +48-22-333 8250 • Fax: +48-22-333 8251 •...
  • Page 368 • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 • Fax: +46-31-744-7701 • Web: www.zyxel.se • Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Taiwan • Support E-mail: support@zyxel.com.tw • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-2-27399889 •...
  • Page 369 • Support E-mail: support@zyxel.co.uk • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) User’s Guide...
  • Page 370 Appendix I Customer Support User’s Guide...
  • Page 371: Index

    Index Index Europe type service mode hold 154–156 service mode 154–156 transfer 155–156 waiting 155–156 accounting server CBC-MAC see AAA CCMP 267, 269 ACK message cell activity Certificate Management Protocol (CMP) Advanced Encryption Standard Certificate Revocation List (CRL) see AES certificates 167, 267 advantages...
  • Page 372 Index CMAC echo cancellation see MAC encryption 267–269 codec traffic comfort noise Ethernet encapsulation contact information Europe type call service mode copyright Extensible Authorization Protocol see EAP counter mode see CCMP coverage area cryptography customer support FCC interference statement firewall 189, 194, 195 flash key flashing...
  • Page 373 Index inner authentication Internet access 135, 317 Internet Assigned Numbers Authority and remote management see IANA routers server sets Internet Telephony Service Provider see ITSP network activity interoperability services IP-PBX ITSP ITU-T OK response outbound proxy 135, 146 server 44, 89, 267 request and reply pattern-spotting listening port...
  • Page 374 Index silence suppression silent packets Simple Certificate Enrollment Protocol (SCEP) Quality of Service, see QoS account ACK message 116, 146 Application Layer Gateway, see ALG authentication RADIUS 87, 268 authentication password Message Types BYE request Messages call progression Shared Secret Key client Real-time Transport Protocol client server...
  • Page 375 Index tags VLAN ID voice tampering activity detection TCP/IP configuration coding mail TFTP restrictions Voice over IP three-way conference 155, 157 see VoIP 44, 89, 267 VoIP transport encryption key see TEK transport layer security see TLS triangle route waveform codec problem solutions WiMAX...
  • Page 376 Index User’s Guide...

This manual is also suitable for:

Max-316m1

Table of Contents