ZyXEL Communications MAX-206M2 User Manual

ZyXEL Communications MAX-206M2 User Manual

Wimax mimo indoor cpe (2.5 ghz)
Hide thumbs Also See for MAX-206M2:
Table of Contents

Advertisement

Quick Links

MAX-206M2
WiMAX MIMO Indoor CPE (2.5 GHz)
User's Guide
Firmware Version 1.0
Edition 1, 08/2008
DEFAULT LOGIN
IP Address
http://192.168.100.1
User Name
admin
Password
1234
www.zyxel.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MAX-206M2 and is the answer not in the manual?

Questions and answers

Summary of Contents for ZyXEL Communications MAX-206M2

  • Page 1 MAX-206M2 WiMAX MIMO Indoor CPE (2.5 GHz) User’s Guide Firmware Version 1.0 Edition 1, 08/2008 DEFAULT LOGIN IP Address http://192.168.100.1 User Name admin Password 1234 www.zyxel.com...
  • Page 3: About This User's Guide

    Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
  • Page 4: Document Conventions

    Syntax Conventions • The MAX-206M2 may be referred to as the “WiMAX Modem”, the “device”, the “system” or the “product” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
  • Page 5: Table 1 Common Icons

    Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Modem icon is not an exact representation of your WiMAX Modem.\ Table 1 Common Icons WiMAX Device WiMAX Access Point Computer Notebook Server WiMAX Base Station...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7 Safety Warnings Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
  • Page 8 Safety Warnings User’s Guide...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview Introduction and Wizards ...................... 29 Getting Started ........................... 31 Introducing the Web Configurator ....................35 Internet Connection Wizard ....................... 41 VoIP Connection Wizard ......................47 Basic Screens ........................51 The Setup Screens ........................53 Advanced Screens ......................... 57 The LAN Configuration Screens ....................
  • Page 10 Contents Overview User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Contents Overview ........................9 Table of Contents........................11 List of Figures ......................... 19 List of Tables........................... 25 Part I: Introduction and Wizards............29 Chapter 1 Getting Started ........................
  • Page 12 Table of Contents 3.1.5 Setup Complete ......................46 Chapter 4 VoIP Connection Wizard......................47 4.1 Overview ..........................47 4.2 Welcome to the ZyXEL Setup Wizard ................. 47 4.2.1 First Voice Account Settings ..................48 4.2.2 Setup Complete ......................50 Part II: Basic Screens ................51 Chapter 5 The Setup Screens........................
  • Page 13 Table of Contents 6.7.5 RIP Setup ........................68 6.7.6 Multicast ........................69 Chapter 7 The WAN Configuration Screens................... 71 7.1 Overview ..........................71 7.1.1 What You Can Do in This Chapter ................71 7.1.2 What You Need to Know .................... 71 7.2 Internet Connection ......................
  • Page 14 Table of Contents Chapter 10 The System Configuration Screens ..................101 10.1 Overview .......................... 101 10.1.1 What You Can Do in This Chapter ................. 101 10.1.2 What You Need to Know ..................101 10.2 General ........................... 102 10.3 Dynamic DNS ........................103 10.4 Firmware ..........................
  • Page 15 Table of Contents 12.2.1 Advanced Analog Phone Setup ................127 12.3 Common .......................... 128 12.4 Region ..........................129 12.5 Technical Reference ......................129 12.5.1 The Flash Key ......................129 12.5.2 Europe Type Supplementary Phone Services ............130 12.5.3 USA Type Supplementary Services ............... 131 Chapter 13 The Phone Book Screens.....................
  • Page 16 Table of Contents 15.2.2 Triangle Route ......................161 15.2.3 Firewall Setting Options ..................161 15.3 Service Setting ........................ 163 15.4 Technical Reference ......................164 15.4.1 Stateful Inspection Firewall..................164 15.4.2 Guidelines For Enhancing Security With Your Firewall .......... 164 15.4.3 The “Triangle Route”...
  • Page 17 Table of Contents 19.2 UPnP ..........................196 19.3 Technical Reference ......................197 19.3.1 Installing UPnP in Windows XP ................197 19.3.2 Web Configurator Easy Access ................201 Chapter 20 The Status Screen......................... 203 20.1 Overview .......................... 203 20.2 Status Screen ........................203 20.2.1 Packet Statistics .....................
  • Page 18 Table of Contents Appendix G Common Services .................... 303 Appendix H Legal Information ....................307 Appendix I Customer Support ....................311 Index............................317 User’s Guide...
  • Page 19: List Of Figures

    List of Figures List of Figures Figure 1 Mobile Station and Base Station ....................31 Figure 2 WiMAX Modem’s VoIP Features - Peer-to-Peer Calls ............. 32 Figure 3 WiMAX Modem’s VoIP Features - Calls via VoIP Service Provider ......... 32 Figure 4 The WiMAX Modem’s LEDs .....................
  • Page 20 List of Figures Figure 39 VPN Transport Example ......................83 Figure 40 Identifying Users ........................84 Figure 41 ADVANCED > VPN Transport > General ................85 Figure 42 Pseudowire Mapping ......................86 Figure 43 VPLS Tunneling ........................87 Figure 44 ADVANCED > VPN Transport > Customer Interface ............. 87 Figure 45 ADVANCED >...
  • Page 21 List of Figures Figure 82 TOOLS > Certificates > Trusted CAs > Import ..............154 Figure 83 Remote Host Certificates ..................... 157 Figure 84 Certificate Details ........................ 157 Figure 85 Firewall Rule Directions ......................160 Figure 86 Ideal Firewall Setup ......................161 Figure 87 TOOLS >...
  • Page 22 List of Figures Figure 125 Windows XP: Internet Protocol (TCP/IP) Properties ............238 Figure 126 Windows Vista: Start Menu ....................239 Figure 127 Windows Vista: Control Panel .................... 239 Figure 128 Windows Vista: Network And Internet ................239 Figure 129 Windows Vista: Network and Sharing Center ..............240 Figure 130 Windows Vista: Network and Sharing Center ..............
  • Page 23 List of Figures Figure 168 Mozilla Firefox Content Security ..................265 Figure 169 Network Number and Host ID .................... 268 Figure 170 Subnetting Example: Before Subnetting ................270 Figure 171 Subnetting Example: After Subnetting ................271 Figure 172 Conflicting Computer IP Addresses Example ..............275 Figure 173 Conflicting Computer IP Addresses Example ..............
  • Page 24 List of Figures Figure 211 Opera 9: Install authority certificate ................... 294 Figure 212 Opera 9: Tools Menu ......................295 Figure 213 Opera 9: Preferences ......................295 Figure 214 Opera 9: Certificate manager .................... 296 Figure 215 Konqueror 3.5: Server Authentication ................297 Figure 216 Konqueror 3.5: Server Authentication ................
  • Page 25: List Of Tables

    List of Tables List of Tables Table 1 Common Icons ..........................5 Table 2 The WiMAX Modem ........................33 Table 3 Main > Icons ..........................39 Table 4 Main ............................39 Table 5 Internet Connection Wizard > System Information ..............42 Table 6 Internet Connection Wizard >...
  • Page 26 List of Tables Table 38 ADVANCED > NAT Configuration > ALG ................99 Table 39 ADVANCED > System Configuration > General ..............103 Table 40 ADVANCED > System Configuration > Dynamic DNS ............104 Table 41 ADVANCED > System Configuration > Firmware ..............105 Table 42 ADVANCED >...
  • Page 27 List of Tables Table 81 TOOLS > Logs > View Logs ....................183 Table 82 TOOLS > Logs > Log Settings ....................186 Table 83 System Error Logs ........................ 187 Table 84 System Maintenance Logs ....................187 Table 85 Access Control Logs ......................188 Table 86 TCP Reset Logs ........................
  • Page 28 List of Tables Table 124 Commonly Used Services ....................303 User’s Guide...
  • Page 29: Introduction And Wizards

    Introduction and Wizards Getting Started (31) Introducing the Web Configurator (35) Internet Connection Wizard (41) VoIP Connection Wizard (47)
  • Page 31: Getting Started

    H A P T E R Getting Started 1.1 About Your WiMAX Modem The WiMAX Modem has a built-in switch and two phone ports. It allows you to access the Internet by connecting to a WiMAX wireless network. You can use a traditional analog telephone to make Internet calls using the WiMAX Modem’s Voice over IP (VoIP) communication capabilities.
  • Page 32: Make Calls Via Internet Telephony Service Provider

    Chapter 1 Getting Started 1.1.2 Make Calls via Internet Telephony Service Provider In a home or small office environment, you can use the WiMAX Modem to make and receive the following types of VoIP telephone calls: • Peer-to-Peer calls - Use the WiMAX Modem to make a call directly to the recipient’s IP address without using a SIP proxy server.
  • Page 33: Wimax Modem Hardware

    Chapter 1 Getting Started 1.2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Modem. Figure 4 The WiMAX Modem’s LEDs VOICE POWER WIMAX STRENGTH...
  • Page 34: Good Habits For Managing The Wimax Modem

    Chapter 1 Getting Started Table 2 The WiMAX Modem STATE DESCRIPTION WiMAN Link The WiMAX Modem is not connected to a wireless (WiMAX) network. Green The WiMAX Modem is successfully connected to a wireless (WiMAX) network. Green (Blinking The WiMAX Modem is searching for a wireless (WiMAX) Slowly) network.
  • Page 35: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher.
  • Page 36: Figure 5 Password Screen

    Chapter 2 Introducing the Web Configurator 4 A password screen displays. The default password (“1234”) displays in non-readable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login.
  • Page 37: Figure 7 Replace Certificate Screen

    Chapter 2 Introducing the Web Configurator 6 Click Apply in the next screen to create a certificate using your WiMAX Modem’s MAC address that will be specific to this device. This certificate is used for authentication when using a secure HTTPS connection over the Internet. Figure 7 Replace Certificate Screen 7 A screen displays to let you choose whether to go to the wizard or the advanced screens.
  • Page 38: The Reset Button

    Chapter 2 Introducing the Web Configurator 2.1.2 The Reset Button If you forget your password or cannot access the web configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”.
  • Page 39: Table 3 Main > Icons

    Chapter 2 Introducing the Web Configurator The following table describes the icons in this screen. Table 3 Main > Icons DESCRIPTION ICON MAIN Click to return to the Main screen. SETUP Click to go the Setup screen, where you can configure LAN, DHCP and WAN settings.
  • Page 40 Chapter 2 Introducing the Web Configurator Table 4 Main (continued) LABEL DESCRIPTION WiMAX Connection This field indicates the current status of your WiMAX connection. Status Status messages are as follows: • Connected - Indicates that the WiMAX Modem is connected to the WiMAX network.
  • Page 41: Internet Connection Wizard

    H A P T E R Internet Connection Wizard 3.1 Overview This chapter provides information on the ZyXEL Setup Wizard screens. The wizard guides you through several steps where you can configure your Internet and VoIP settings. 3.1.1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard.
  • Page 42: System Information

    Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (see Section 10.2 on page 102 for more).
  • Page 43: Authentication Settings

    Chapter 3 Internet Connection Wizard 3.1.3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (see Section 7.2 on page 74 for more).
  • Page 44 Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL DESCRIPTION Authentication This field displays the user authentication method. Authentication is the process of confirming the identity of a mobile station (by means of a username and password, for example).
  • Page 45: Ip Address

    Chapter 3 Internet Connection Wizard 3.1.4 IP Address This Internet Connection Wizard screen allows you to configure your IP address. The settings here correspond to the SETUP > Set IP Address screen (see Section 5.2 on page 54). A fixed IP address is a static IP that your ISP gives you. An automatic (dynamic) IP address is not fixed;...
  • Page 46: Setup Complete

    Chapter 3 Internet Connection Wizard 3.1.5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings. Figure 14 Internet Connection Wizard > Complete Launch your web browser and navigate to www.zyxel.com. If if everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator.
  • Page 47: Voip Connection Wizard

    H A P T E R VoIP Connection Wizard 4.1 Overview This chapter shows you how to use the wizard to set up your voice account(s). The WiMAX Modem has Voice over IP (VoIP) communication capabilities that allow you to use a traditional analog telephone to make Internet calls.
  • Page 48: First Voice Account Settings

    Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 11.2 on page 113 for more information).
  • Page 49: Figure 17 Voip Connection > Sip Registration Test

    Chapter 4 VoIP Connection Wizard After you enter your voice account settings and click Next, the WiMAX Modem attempts to register your SIP account with the SIP server. Figure 17 VoIP Connection > SIP Registration Test This screen displays if SIP account registration fails. Check your WiMAX connection using the WiMAX Link and Strength Indicator LEDs on the front of the WiMAX Modem, then wait a few seconds and click Register Again.
  • Page 50: Setup Complete

    Chapter 4 VoIP Connection Wizard 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings or Run Setup Wizard Again to configure your Internet Connection settings. Figure 19 VoIP Connection > Finish This screen displays if your SIP account registration was successful. User’s Guide...
  • Page 51: Basic Screens

    Basic Screens The Main Screen (38) The Setup Screens (53)
  • Page 53: The Setup Screens

    H A P T E R The Setup Screens 5.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 5.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 5.2 on page 54) lets you configure the WiMAX Modem’s IP address and subnet mask.
  • Page 54: Before You Begin

    Chapter 5 The Setup Screens Time A network protocol for retrieving the current time from a server. The computer issuing the command compares the time on its clock to the information returned by the server, adjusts itself automatically for time zone differences, then calculates the difference and corrects itself if there has been any temporal drift.
  • Page 55: Time Setting

    Chapter 5 The Setup Screens 5.3 Time Setting Click SETUP > Time Setting to set the date, time, and time zone for the WiMAX Modem. Figure 21 SETUP > Time Setting The following table describes the labels in this screen. Table 10 SETUP >...
  • Page 56: Pre-Defined Ntp Time Servers List

    Chapter 5 The Setup Screens Table 10 SETUP > DHCP Client (continued) LABEL DESCRIPTION Time Zone Setup Time Zone Select the time zone at your location. Daylight Savings Select this if your location uses daylight savings time. Daylight savings is a period from late spring to early fall when many places set their clocks ahead of normal local time by one hour to give more daytime light in the evening.
  • Page 57: Advanced Screens

    Advanced Screens The LAN Configuration Screens (59) The WAN Configuration Screens (71) The VPN Transport Screens (83) The NAT Configuration Screens (93) The System Configuration Screens (101)
  • Page 59: The Lan Configuration Screens

    H A P T E R The LAN Configuration Screens 6.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Modem on the LAN. You can configure its IP address and subnet mask, DHCP services, and other subnets. You can also control how the WiMAX Modem sends routing information using RIP.
  • Page 60: Dhcp Setup

    Chapter 6 The LAN Configuration Screens DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a networking device before you can access it. DHCP A DHCP (Dynamic Host Configuration Protocol) server can assign your WiMAX Modem an IP address, subnet mask, DNS and other routing information when it’s turned on.
  • Page 61: Static Dhcp

    Chapter 6 The LAN Configuration Screens Table 12 ADVANCED > LAN Configuration > DHCP Setup (continued) LABEL DESCRIPTION First, Second and Specify the IP addresses of a maximum of three DNS servers that the network can Third DNS Server use. The WiMAX Modem provides these IP addresses to DHCP clients. You can specify these IP addresses two ways.
  • Page 62: Ip Alias

    Chapter 6 The LAN Configuration Screens The following table describes the labels in this screen. Table 13 ADVANCED > LAN Configuration > Static DHCP LABEL DESCRIPTION The number of the item in this list. MAC Address Enter the MAC address of the computer to which you want the WiMAX Modem to assign the same IP address.
  • Page 63 Chapter 6 The LAN Configuration Screens Table 14 ADVANCED > LAN Configuration> IP Alias (continued) LABEL DESCRIPTION RIP Direction Use this field to control how much routing information the WiMAX Modem sends and receives on the subnet. • None - The WiMAX Modem does not send or receive routing information on the subnet.
  • Page 64: Ip Static Route

    Chapter 6 The LAN Configuration Screens 6.5 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Modem. The first static route is the default route and cannot be modified or deleted. Figure 25 Advanced>...
  • Page 65: Ip Static Route Setup

    Chapter 6 The LAN Configuration Screens 6.5.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Modem. Figure 26 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen.
  • Page 66: Other Settings

    Chapter 6 The LAN Configuration Screens 6.6 Other Settings Click ADVANCED > LAN Configuration > Other Settings to set the RIP and Multicast options. Figure 27 ADVANCED > LAN Configuration > Advanced The following table describes the labels in this screen. Table 18 ADVANCED >...
  • Page 67: Technical Reference

    Chapter 6 The LAN Configuration Screens 6.7 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 6.7.1 IP Address and Subnet Mask Similar to the way houses on a street share a common street name, computers on a LAN share one common network number.
  • Page 68: Lan Tcp/Ip

    Chapter 6 The LAN Configuration Screens 6.7.3 LAN TCP/IP The WiMAX Modem has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. The LAN parameters of the WiMAX Modem are preset in the factory with the following values: •...
  • Page 69: Multicast

    Chapter 6 The LAN Configuration Screens • In Only - the WiMAX Modem will not send any RIP packets but will accept all RIP packets received. • Out Only - the WiMAX Modem will send out RIP packets but will not accept any RIP packets received.
  • Page 70 Chapter 6 The LAN Configuration Screens User’s Guide...
  • Page 71: The Wan Configuration Screens

    H A P T E R The WAN Configuration Screens 7.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Modem’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet.
  • Page 72: Figure 28 Wimax: Mobile Station

    Chapter 7 The WAN Configuration Screens Figure 28 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations. Numerous subscriber stations and mobile stations connect to the network through a single base station (BS), as in the following figure. Figure 29 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of meters, even under poor conditions.
  • Page 73: Figure 31 Traffic Redirect Wan Setup

    Chapter 7 The WAN Configuration Screens In this figure, the dashed arrow shows the PKM (Privacy Key Management) secured connection between the mobile station and the base station, and the solid arrow shows the EAP secured connection between the mobile station, the base station and the AAA server. See the WiMAX security appendix for more details.
  • Page 74: Internet Connection

    Chapter 7 The WAN Configuration Screens 7.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Modem’s Internet settings. Not all WiMAX Modem models have all the fields shown here. Figure 33 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
  • Page 75 Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Anonymous Enter the anonymous identity provided by your Internet Service Provider. Identity Anonymous identity (also known as outer identity) is used with EAP-TTLS encryption.
  • Page 76: Wimax Configuration

    Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION IP Subnet Mask Enter a subnet mask in dotted decimal notation. Refer to the appendices to calculate a subnet mask If you are implementing subnetting.
  • Page 77: Frequency Ranges

    Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 21 ADVANCED > WAN Configuration >WiMAX Configuration LABEL DESCRIPTION DL Frequency / These fields show the downlink frequency settings in kilohertz (kHz). Enter Bandwidth values in these fields to have the WiMAX Modem scan these frequencies for available channels in ascending numerical order.
  • Page 78: Configuring Frequency Settings

    Chapter 7 The WAN Configuration Screens 7.3.2 Configuring Frequency Settings You need to set the WiMAX Modem to scan one or more specific radio frequencies to find an available connection to a WiMAX base station. Use the WiMAX Frequency screen to define the radio frequencies to be searched for available wireless connections.
  • Page 79: Using The Wimax Frequency Screen

    Chapter 7 The WAN Configuration Screens 7.3.3 Using the WiMAX Frequency Screen In this example, your Internet service provider has given you a list of supported frequencies: 2.51, 2.525, 2.6, and 2.625. 1 In the DL Frequency [1] field, enter 2510000 (2510000 kilohertz (kHz) is equal to 2.51 gigahertz).
  • Page 80: Traffic Redirect

    Chapter 7 The WAN Configuration Screens 7.4 Traffic Redirect Click ADVANCED > WAN Configuration > Traffic Redirect to change your WiMAX Modem’s traffic redirect settings. Figure 37 ADVANCED > WAN Configuration > Traffic Redirect The following table describes the labels in this screen. Table 23 ADVANCED >...
  • Page 81: Other Settings

    Chapter 7 The WAN Configuration Screens Table 23 ADVANCED > WAN Configuration > Traffic Redirect (continued) LABEL DESCRIPTION Apply Click to save your changes. Reset Click to restore your previously saved settings. 7.5 Other Settings Click ADVANCED > WAN Configuration > Other Settings to configure your DNS server, RIP, Multicast and Windows Networking settings.
  • Page 82: Table 24 Advanced > Wan Configuration > Advanced

    Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 24 ADVANCED > WAN Configuration > Advanced LABEL DESCRIPTION DNS Servers First, Second and Third Select Obtained from ISP if your ISP dynamically assigns DNS server DNS Server information (and the WiMAX Modem's WAN IP address).
  • Page 83: The Vpn Transport Screens

    H A P T E R The VPN Transport Screens 8.1 Overview This chapter describes the ADVANCED > VPN Transport screens, where you can configure the WiMAX Modem to allow traffic from multiple users to pass through the WiMAX network to the service provider’s router.
  • Page 84: What You Can Do In This Chapter

    Chapter 8 The VPN Transport Screens 8.1.1 What You Can Do in This Chapter • The General screen (Section 8.2 on page 85) lets you turn VPN transport on or off, and to set the VPN transport endpoint (your service provider’s router). •...
  • Page 85: Before You Begin

    Chapter 8 The VPN Transport Screens 8.1.3 Before You Begin Before you start configuring your WiMAX Modem to use VPN transport, ensure that you have the following from the service provider: • The IP address or domain name of the service provider’s edge router. •...
  • Page 86: Customer Interface

    Chapter 8 The VPN Transport Screens 8.3 Customer Interface Customer interfaces connect data coming from your computers to Ethernet pseudowires, according to the data’s VLAN (Virtual Local Area Network) information. One customer interface is for traffic that has no tag; this is the default interface (rule 0) which cannot be deleted in the GUI.
  • Page 87: Generic Routing Encapsulation

    Chapter 8 The VPN Transport Screens 8.3.2 Generic Routing Encapsulation In order to transport the VPLS traffic over the WiMAX network, the WiMAX Modem uses the Generic Routing Encapsulation (GRE) protocol. Like MPLS, GRE is a tunneling protocol that has specified endpoints. The GRE tunnel is bi-directional, and transports both LSPs. The GRE tunnel runs across the WiMAX network between the WiMAX Modem and your service provider’s router.
  • Page 88: Table 26 Advanced> Vpn Transport > Customer Interface

    Chapter 8 The VPN Transport Screens The following table describes the icons in this screen. Table 26 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 27 ADVANCED >...
  • Page 89: Customer Interface Setup

    Chapter 8 The VPN Transport Screens 8.3.4 Customer Interface Setup Click the Edit icon in the ADVANCED > VPN Transport > Customer Interface screen to open the Customer Interface Setup. Customer interfaces map traffic onto specific Ethernet pseudowires for transport over the WiMAX network.
  • Page 90: Ethernet Pseudowire

    Chapter 8 The VPN Transport Screens 8.4 Ethernet Pseudowire Because VPLS mimics a simple wired Ethernet connection to your service provider’s router, the connection between the WiMAX Modem and the peer device is known as an “Ethernet pseudowire” or “PW”. The Ethernet pseudowires use MPLS (MultiProtocol Label Switching) virtual circuit labels to define the connection.
  • Page 91: Ethernet Pseudowire Setup

    Chapter 8 The VPN Transport Screens The following table describes the labels in this screen. Table 30 ADVANCED > VPN Transport > Ethernet Pseudowire LABEL DESCRIPTION The number of the item in this list. Active This icon is green if the associated pseudowire is enabled. The icon is grey if the associated pseudowire is disabled.
  • Page 92: Statistics

    Chapter 8 The VPN Transport Screens Table 31 ADVANCED > VPN Transport > Ethernet Pseudowire Setup (continued) LABEL DESCRIPTION Egress Enter the egress label number for this pseudowire. This must be the ingress label of the peer device. This should not be the egress label number of any other Ethernet pseudowire configured on the WiMAX Modem.
  • Page 93: The Nat Configuration Screens

    H A P T E R The NAT Configuration Screens 9.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network.
  • Page 94: Port Forwarding

    Chapter 9 The NAT Configuration Screens The following table describes the labels in this screen. Table 33 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Select this if you want to use port forwarding, trigger ports, or any of the Address Translation ALG.
  • Page 95: Port Forwarding Options

    Chapter 9 The NAT Configuration Screens Figure 51 Multiple Servers Behind NAT Example 9.3.1 Port Forwarding Options Click ADVANCED > NAT Configuration > Port Forwarding to look at the current port- forwarding rules in the WiMAX Modem, and to enable, disable, activate, and deactivate each one.
  • Page 96: Port Forwarding Rule Setup

    Chapter 9 The NAT Configuration Screens Table 35 ADVANCED > NAT Configuration > Port Forwarding (continued) LABEL DESCRIPTION Port Forwarding The number of the item in this list. Active Select this to enable this rule. Clear this to disable this rule. Name This field displays the name of the rule.
  • Page 97: Trigger Port

    Chapter 9 The NAT Configuration Screens Table 36 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup (continued) LABEL DESCRIPTION Start Port Enter the port number or range of port numbers you want to forward to the specified server. End Port To forward one port number, enter the port number in the Start Port and End Port fields.
  • Page 98: Trigger Port Forwarding Example

    Chapter 9 The NAT Configuration Screens The following table describes the labels in this screen. Table 37 ADVANCED > NAT Configuration > Trigger Port LABEL DESCRIPTION The number of the item in this list. Name Enter a name to identify this rule. You can use 1 - 15 printable ASCII characters, or you can leave this field blank.
  • Page 99: Alg

    Chapter 9 The NAT Configuration Screens 3 The Real Audio server responds using a port number ranging between 6970-7170. 4 The WiMAX Modem forwards the traffic to Jane’s computer IP address. 5 Only Jane can connect to the Real Audio server until the connection is closed or times out.
  • Page 100 Chapter 9 The NAT Configuration Screens User’s Guide...
  • Page 101: The System Configuration Screens

    H A P T E R The System Configuration Screens 10.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 10.1.1 What You Can Do in This Chapter •...
  • Page 102: General

    Chapter 10 The System Configuration Screens Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name) on each individual computer, the domain name can be assigned from the WiMAX Modem via DHCP.
  • Page 103: Dynamic Dns

    Chapter 10 The System Configuration Screens The following table describes the labels in this screen. Table 39 ADVANCED > System Configuration > General LABEL DESCRIPTION System Setup System Name Enter your computer's "Computer Name". This is for identification purposes, but some ISPs also check this field.
  • Page 104: Figure 58 Advanced > System Configuration > Dynamic Dns

    Chapter 10 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client. Figure 58 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 40 ADVANCED >...
  • Page 105: Firmware

    Chapter 10 The System Configuration Screens Table 40 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Dynamic DNS Select this if you want the DDNS server to update the IP address of the host server auto detect name(s) automatically. Select this option when there are one or more NAT routers IP address between the WiMAX Modem and the DDNS server.
  • Page 106: The Firmware Upload Process

    Chapter 10 The System Configuration Screens 10.4.1 The Firmware Upload Process When the WiMAX Modem uploads new firmware, the process usually takes about two minutes. The device also automatically restarts in this time. This causes a temporary network disconnect. Do not turn off the device while firmware upload is in progress! After two minutes, log in again, and check your new firmware version in the Status screen.
  • Page 107: The Restore Configuration Process

    Chapter 10 The System Configuration Screens The following table describes the labels in this screen. Table 42 ADVANCED > System Configuration > Configuration LABEL DESCRIPTION Backup Configuration Backup Click this to save the WiMAX Modem’s current configuration to a file on your computer.
  • Page 108: Restart

    Chapter 10 The System Configuration Screens 10.6 Restart Click ADVANCED > System Configuration > Restart to reboot the WiMAX Modem without turning the power off. Restarting the WiMAX Modem does not affect its configuration. Figure 61 ADVANCED > System Configuration > Restart The following table describes the labels in this screen.
  • Page 109: Voice Screens

    Voice Screens The Service Configuration Screens (111) The Phone Screens (125) The Phone Book Screens (133)
  • Page 111: The Service Configuration Screens

    H A P T E R The Service Configuration Screens 11.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network.
  • Page 112: Before You Begin

    Chapter 11 The Service Configuration Screens SIP Identities A SIP account uses an identity (sometimes referred to as a SIP address). A complete SIP identity is called a SIP URI (Uniform Resource Identifier). A SIP account's URI identifies the SIP account in a way similar to the way an e-mail address identifies an e-mail account. The format of a SIP identity is SIP-Number@SIP-Service-Domain.
  • Page 113: Sip Settings

    Chapter 11 The Service Configuration Screens 11.2 SIP Settings Click VOICE > Service Configuration > SIP Setting to setup and maintain your SIP account(s) in the WiMAX Modem. Your VoIP or Internet service provider should provide you with your account information. You can also enable and disable each SIP account. Figure 62 VOICE >...
  • Page 114: Advanced Sip Settings

    Chapter 11 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Setting (continued) LABEL DESCRIPTION REGISTER Enter the IP address or domain name of the SIP register server, if your VoIP Server service provider gave you one. Otherwise, enter the same address you entered in Address the SIP Server Address field.
  • Page 115: Figure 63 Stun

    Chapter 11 The Service Configuration Screens Figure 63 STUN 11.2.1.2 Outbound Proxy Your VoIP service provider may host a SIP outbound proxy server to handle all of the WiMAX Modem’s VoIP traffic. This allows the WiMAX Modem to work with any type of NAT router and eliminates the need for STUN or a SIP ALG.
  • Page 116: Figure 64 Voice > Service Configuration > Sip Settings > Advanced

    Chapter 11 The Service Configuration Screens 11.2.1.4 MWI (Message Waiting Indication) Enable Message Waiting Indication (MWI) enables your phone to give you a message–waiting (beeping) dial tone when you have one or more voice messages. Your VoIP service provider must have a messaging system that sends message-waiting-status SIP packets as defined in RFC 3842.
  • Page 117 Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Enter the number of seconds your SIP account is registered with the SIP register Duration server before it is deleted. The WiMAX Modem automatically tries to re-register your SIP account when one-half of this time has passed.
  • Page 118 Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Active Select this if you want the WiMAX Modem to send SIP traffic to a specific NAT router. You must also configure the NAT router to forward traffic with the specified port to the WiMAX Modem.
  • Page 119: Table 46 Custom Tones Details

    Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Caller Ringing Select the tone you want people to hear when they call you. See Custom Tones Tone (IVR) page 119 for information on how to record these tones.
  • Page 120: Qos

    Chapter 11 The Service Configuration Screens 2 Press a number from 1301~1308 followed by the # key to delete the tone of your choice. Press 14 followed by the # key if you wish to clear all your custom tones. 3 You can continue to add, listen to, or delete tones, or you can hang up the receiver when you are done.
  • Page 121: Technical Reference

    Chapter 11 The Service Configuration Screens Table 47 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure. Enter the VLAN ID provided by your network administrator in the field on the right.
  • Page 122: Sip Client Server

    Chapter 11 The Service Configuration Screens 11.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests. A SIP server responds to the SIP requests. When you use SIP to make a VoIP call, it originates at a client and terminates at a server. A SIP client could be a computer or a SIP phone.
  • Page 123: Sip Redirect Server

    Chapter 11 The Service Configuration Screens 11.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server.
  • Page 124: Diffserv

    Chapter 11 The Service Configuration Screens 11.4.7 DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific per- hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the level of service desired.
  • Page 125: The Phone Screens

    H A P T E R The Phone Screens 12.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Modem. You can also select which SIP account to use for making outgoing calls.
  • Page 126: Analog Phone

    Chapter 12 The Phone Screens • Making a Second Call • Call Transfer • Call Forwarding • Three-Way Conference • Internal Calls • Caller ID • CLIP (Calling Line Identification Presentation) • CLIR (Calling Line Identification Restriction) To take full advantage of the supplementary phone services available though the WiMAX Modem's phone port, you may need to subscribe to the services from your VoIP service provider.
  • Page 127: Advanced Analog Phone Setup

    Chapter 12 The Phone Screens Table 49 VOICE > Phone > Analog Phone LABEL DESCRIPTION Incoming Call apply to SIP1 Select this if you want to receive phone calls for the SIP1 account on this phone port. If you select more than one source for incoming calls, there is no way to distinguish between them when you receive phone calls.
  • Page 128: Common

    Chapter 12 The Phone Screens Table 50 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION G.168 Active Select this if you want to eliminate the echo caused by the sound of your voice reverberating in the telephone receiver while you talk. Dialing Interval Select Dialing Interval Enter the number of seconds the WiMAX Modem should wait after you stop dialing...
  • Page 129: Region

    Chapter 12 The Phone Screens 12.4 Region Click VOICE > Phone > Region to maintain settings that often depend on the region of the world in which the WiMAX Modem is located. Figure 73 VOICE > Phone > Region The following table describes the labels in this screen. Table 52 VOICE >...
  • Page 130: Europe Type Supplementary Phone Services

    Chapter 12 The Phone Screens 12.5.2 Europe Type Supplementary Phone Services This section describes how to use supplementary phone services with the Europe Type Call Service Mode. Commands for supplementary services are listed in the table below. After pressing the flash key, if you do not issue the sub-command before the default sub- command timeout (2 seconds) expires or issue an invalid sub-command, the current operation will be aborted.
  • Page 131: Usa Type Supplementary Services

    Chapter 12 The Phone Screens 2 When you hear the dial tone, dial “*98#” followed by the number to which you want to transfer the call. to operate the Intercom. 3 After you hear the ring signal or the second party answers it, hang up the phone. European Three-Way Conference allows you to make three-way conference calls.
  • Page 132 Chapter 12 The Phone Screens USA Three-Way Conference allows you to make three-way conference calls. To do so: 1 When you are making a call, press the flash key to put the call on hold and get a dial tone. 2 Dial a phone number to make a second call.
  • Page 133: The Phone Book Screens

    H A P T E R The Phone Book Screens 13.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Modem’s phone book for making VoIP calls. 13.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 13.2 on page 134) lets you maintain rules for handling incoming calls.
  • Page 134: Incoming Call Policy

    Chapter 13 The Phone Book Screens 13.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 74 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen.
  • Page 135 Chapter 13 The Phone Book Screens Table 55 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer This field is used by the No Answer Forward to Number feature and No Answer Waiting Time conditions below. Enter the number of seconds the WiMAX Modem should wait for you to answer an incoming call before it considers the call is unanswered.
  • Page 136: Speed Dial

    Chapter 13 The Phone Book Screens 13.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters.
  • Page 137 Chapter 13 The Phone Book Screens Table 57 VOICE > Phone Book > Speed Dial LABEL DESCRIPTION Type Select Use Proxy if you want to use one of your SIP accounts to call this phone number. Select Non-Proxy (Use IP or URL) if you want to use a different SIP server or if you want to make a peer-to-peer call.
  • Page 138 Chapter 13 The Phone Book Screens User’s Guide...
  • Page 139: Tools & Status Screens

    Tools & Status Screens The Certificates Screens (141) The Firewall Screens (159) Content Filter (167) The Remote Management Screens (171) The Logs Screens (181) The UPnP Screen (195) The Status Screen (203)
  • Page 141: The Certificates Screens

    H A P T E R The Certificates Screens 14.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Modem. The WiMAX Modem can use public key certificates (also sometimes called “digital IDs”) to authenticate users.
  • Page 142: My Certificates

    Chapter 14 The Certificates Screens 14.2 My Certificates Click TOOLS > Certificates > My Certificates to generate and export self-signed certificates or certification requests and import the WiMAX Modem’s CA-signed certificates. Figure 76 TOOLS > Certificates > My Certificates The following table describes the icons in this screen. Table 58 TOOLS >...
  • Page 143 Chapter 14 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates (continued) LABEL DESCRIPTION Subject This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
  • Page 144: My Certificates Create

    Chapter 14 The Certificates Screens 14.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Modem create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request. Figure 77 TOOLS >...
  • Page 145 Chapter 14 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION Common Name Select a radio button to identify the certificate’s owner by IP address, domain name or e-mail address. Type the IP address (in dotted decimal notation), domain name or e-mail address in the field provided.
  • Page 146 Chapter 14 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION CA Server Address This field applies when you select Create a certification request and enroll for a certificate immediately online. Enter the IP address (or URL) of the certification authority server.
  • Page 147: My Certificate Edit

    Chapter 14 The Certificates Screens 14.2.2 My Certificate Edit Click TOOLS > Certificates > My Certificates and then the Edit icon to view in-depth certificate information and change the certificate’s name. Figure 78 TOOLS > Certificates > My Certificates > Edit The following table describes the labels in this screen.
  • Page 148 Chapter 14 The Certificates Screens Table 61 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
  • Page 149: My Certificate Import

    Chapter 14 The Certificates Screens Table 61 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the SHA1 algorithm.
  • Page 150: Trusted Cas

    Chapter 14 The Certificates Screens 14.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted. The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy;...
  • Page 151 Chapter 14 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Valid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
  • Page 152: Trusted Ca Edit

    Chapter 14 The Certificates Screens 14.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen to view in-depth certificate information and change the certificate’s name. Figure 81 TOOLS > Certificates > Trusted CAs > Edit The following table describes the labels in this screen.
  • Page 153 Chapter 14 The Certificates Screens Table 65 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
  • Page 154: Trusted Ca Import

    Chapter 14 The Certificates Screens Table 65 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the SHA1 algorithm.
  • Page 155: Technical Reference

    Chapter 14 The Certificates Screens The following table describes the labels in this screen. Table 66 TOOLS > Certificates > Trusted CAs Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Choose...
  • Page 156 Chapter 14 The Certificates Screens A certification path is the hierarchy of certification authority certificates that validate a certificate. The WiMAX Modem does not trust a certificate if any certificate on its path has expired or been revoked. Certification authorities maintain directory servers with databases of valid and revoked certificates.
  • Page 157: Verifying A Certificate

    Chapter 14 The Certificates Screens 14.4.2 Verifying a Certificate Before you import a certificate into the WiMAX Modem, you should verify that you have the correct certificate. This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates. 14.4.2.1 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms.
  • Page 158 Chapter 14 The Certificates Screens User’s Guide...
  • Page 159: The Firewall Screens

    H A P T E R The Firewall Screens 15.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Modem’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks.
  • Page 160: Firewall Setting

    Chapter 15 The Firewall Screens The WiMAX Modem has one Ethernet (LAN) port. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP and the World Wide Web. However, “inbound access”...
  • Page 161: Triangle Route

    Chapter 15 The Firewall Screens • Configuring WAN or LAN & WAN access for services in the Remote MGMT screens or SMT menus. When you allow remote management from the WAN, you are actually configuring WAN-to-WAN/WiMAX Modem firewall rules. WAN-to-WAN/WiMAX Modem firewall rules are Internet to the WiMAX Modem WAN interface firewall rules.
  • Page 162: Table 67 Tools > Firewall > Firewall Setting

    Chapter 15 The Firewall Screens The following table describes the labels in this screen. Table 67 TOOLS > Firewall > Firewall Setting LABEL DESCRIPTION Enable Firewall Select this to activate the firewall. The WiMAX Modem controls access and protects against Denial of Service (DoS) attacks when the firewall is activated. Bypass Triangle Select this if you want to let some traffic from the WAN go directly to a computer in Route...
  • Page 163: Service Setting

    Chapter 15 The Firewall Screens 15.3 Service Setting Click TOOLS > Firewall > Service Setting to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 88 TOOLS >...
  • Page 164: Technical Reference

    Chapter 15 The Firewall Screens Table 68 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Port Number Enter the range of port numbers that defines the service. For example, suppose you want to define the Gnutella service. Select TCP type and enter a port range of 6345-6349.
  • Page 165: The "Triangle Route" Problem

    Chapter 15 The Firewall Screens 15.4.3 The “Triangle Route” Problem A traffic route is a path for sending or receiving data packets between two Ethernet devices. You may have more than one connection to the Internet (through one or more ISPs). If an alternate gateway is on the LAN (and its IP address is in the same subnet as the WiMAX Modem’s LAN IP address), the “triangle route”...
  • Page 166: Figure 90 Ip Alias

    Chapter 15 The Firewall Screens Figure 90 IP Alias User’s Guide...
  • Page 167: Content Filter

    H A P T E R Content Filter 16.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs.
  • Page 168: Filter

    Chapter 16 Content Filter 16.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective. Figure 91 TOOLS > Content Filter > Filter User’s Guide...
  • Page 169: Table 69 Tools > Content Filter > Filter

    Chapter 16 Content Filter The following table describes the labels in this screen. Table 69 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted Computer You can allow a specific computer to access all Internet resources without the IP Address restrictions you set in these screens.
  • Page 170: Schedule

    Chapter 16 Content Filter 16.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 92 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 70 TOOLS > Content Filter > Schedule LABEL DESCRIPTION Day to Block...
  • Page 171: The Remote Management Screens

    H A P T E R The Remote Management Screens 17.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Modem interface (if any) from which computers.
  • Page 172: What You Need To Know

    Chapter 17 The Remote Management Screens 17.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter. Remote Management Limitations Remote management over LAN or WAN will not work when: 1 A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service.
  • Page 173: Www

    Chapter 17 The Remote Management Screens 17.2 WWW Click TOOLS > Remote Management > WWW to control HTTP access to your WiMAX Modem. Figure 93 TOOLS > Remote Management > WWW The following table describes the labels in this screen. Table 72 TOOLS >...
  • Page 174: Ftp

    Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 73 TOOLS > Remote Management > Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number.
  • Page 175: Snmp

    Chapter 17 The Remote Management Screens 17.5 SNMP An SNMP managed network consists of two main types of component: agents and a manager. Figure 96 SNMP Management Model An agent is a management software module that resides in a managed device (the WiMAX Modem).
  • Page 176: Snmp Traps

    Chapter 17 The Remote Management Screens 17.5.1 SNMP Traps The WiMAX Modem sends traps to the SNMP manager when any of the following events occurs: Table 75 SNMP Traps TRAP # TRAP NAME DESCRIPTION coldStart (defined in RFC-1215) A trap is sent after booting (power on). warmStart (defined in RFC-1215) A trap is sent after booting (software reboot).
  • Page 177: Dns

    Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 76 TOOLS > Remote Management > SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station.
  • Page 178: Security

    Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 77 TOOLS > Remote Management > DNS LABEL DESCRIPTION Server Port This field is read-only. This field displays the port number this service uses to access the WiMAX Modem.
  • Page 179 Chapter 17 The Remote Management Screens User’s Guide...
  • Page 180 Chapter 17 The Remote Management Screens User’s Guide...
  • Page 181: The Logs Screens

    H A P T E R The Logs Screens 18.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Modem’s log and alert settings. For a list of log messages, see Section 18.4 on page 187.
  • Page 182: Table 79 Syslog Logs

    Chapter 18 The Logs Screens A traffic log summarizes the session's type, when it started and stopped the amount of traffic that was sent and received and so on. An external log analyzer can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs. Table 79 Syslog Logs LOG MESSAGE DESCRIPTION...
  • Page 183: View Logs

    Chapter 18 The Logs Screens 18.2 View Logs Click TOOLS > Logs > View Log to look at log entries and alerts. Alerts are written in red. Figure 100 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order.
  • Page 184 Chapter 18 The Logs Screens Table 81 TOOLS > Logs > View Logs (continued) LABEL DESCRIPTION Destination This field lists the destination IP address and the port number of the incoming packet. In many cases, some or all of this information may not be available. Note This field displays additional information about the log entry.
  • Page 185: Log Settings

    Chapter 18 The Logs Screens 18.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Modem sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded. Figure 101 TOOLS > Logs > Log Settings User’s Guide...
  • Page 186: Table 82 Tools > Logs > Log Settings

    Chapter 18 The Logs Screens The following table describes the labels in this screen. Table 82 TOOLS > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e-mail logs and alerts.
  • Page 187: Log Message Descriptions

    Chapter 18 The Logs Screens 18.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 83 System Error Logs LOG MESSAGE DESCRIPTION The WAN connection is down. You cannot access the network WAN connection is down. through this interface.
  • Page 188: Table 85 Access Control Logs

    Chapter 18 The Logs Screens Table 85 Access Control Logs LOG MESSAGE DESCRIPTION Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access Firewall default policy: [ TCP | matched the default policy and was blocked or forwarded UDP | IGMP | ESP | GRE | OSPF ] according to the default policy’s setting.
  • Page 189: Table 87 Packet Filter Logs

    Chapter 18 The Logs Screens Table 86 TCP Reset Logs (continued) LOG MESSAGE DESCRIPTION The router sent a TCP reset packet when the number of Exceed MAX incomplete, incomplete connections (TCP and UDP) exceeded the user- sent TCP RST configured threshold. (Incomplete count is for all TCP and UDP connections through the firewall.)Note: When the number of incomplete connections (TCP + UDP) >...
  • Page 190: Table 90 Upnp Logs

    Chapter 18 The Logs Screens Table 89 PPP Logs (continued) LOG MESSAGE DESCRIPTION The PPP connection’s Link Control Protocol stage is closing. ppp:LCP Closing The PPP connection’s Internet Protocol Control Protocol stage is closing. ppp:IPCP Closing Table 90 UPnP Logs LOG MESSAGE DESCRIPTION UPnP packets can pass through the firewall.
  • Page 191 Chapter 18 The Logs Screens Table 92 Attack Logs (continued) LOG MESSAGE DESCRIPTION The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land land [ TCP | UDP | IGMP | attack. ESP | GRE | OSPF ] The firewall detected an ICMP land attack. land ICMP (type:%d, code:%d) The firewall detected an IP spoofing attack on the WAN port.
  • Page 192: Table 93 Remote Management Logs

    Chapter 18 The Logs Screens Table 93 Remote Management Logs LOG MESSAGE DESCRIPTION Attempted use of FTP service was blocked according to Remote Management: FTP denied remote management settings. Attempted use of TELNET service was blocked according Remote Management: TELNET to remote management settings.
  • Page 193: Table 95 Sip Logs

    Chapter 18 The Logs Screens Table 94 ICMP Notes (continued) TYPE CODE DESCRIPTION Time to live exceeded in transit Fragment reassembly time exceeded Parameter Problem Pointer indicates the error Timestamp Timestamp request message Timestamp Reply Timestamp reply message Information Request Information request message Information Reply Information reply message...
  • Page 194: Table 97 Fsm Logs: Caller Side

    Chapter 18 The Logs Screens Table 97 FSM Logs: Caller Side LOG MESSAGE DESCRIPTION Someone used a phone connected to the listed phone port to VoIP Call Start Ph[Phone initiate a VoIP call to the listed destination. Port Number] <- Outgoing Call Number Someone used a phone connected to the listed phone port to VoIP Call Established...
  • Page 195: The Upnp Screen

    H A P T E R The UPnP Screen 19.1 Overview Use the TOOLS > UPnP screen to enable the WiMAX Modem’s UPnP feature. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 196: Upnp

    Chapter 19 The UPnP Screen Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with each other without additional configuration.
  • Page 197: Technical Reference

    Chapter 19 The UPnP Screen 19.3 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 19.3.1 Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start >...
  • Page 198: Figure 105 Networking Services

    Chapter 19 The UPnP Screen Figure 105 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 19.3.1.1 Auto-discover Your UPnP-enabled Network Device in Windows XP This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the WiMAX Modem.
  • Page 199: Figure 107 Internet Connection Properties

    Chapter 19 The UPnP Screen 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 107 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 108 Internet Connection Properties: Advanced Settings User’s Guide...
  • Page 200: Figure 109 Internet Connection Properties: Advanced Settings: Add

    Chapter 19 The UPnP Screen Figure 109 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 201: Web Configurator Easy Access

    Chapter 19 The UPnP Screen 19.3.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the WiMAX Modem without finding out the IP address of the WiMAX Modem first. This becomes helpful if you do not know the IP address of the WiMAX Modem.
  • Page 202: Figure 114 Network Connections: My Network Places: Properties: Example

    Chapter 19 The UPnP Screen 6 Right-click on the icon for your WiMAX Modem and select Properties. A properties window displays with basic information about the WiMAX Modem. Figure 114 Network Connections: My Network Places: Properties: Example User’s Guide...
  • Page 203: The Status Screen

    H A P T E R The Status Screen 20.1 Overview Use this screen to view a complete summary of your WiMAX Modem connection status. 20.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts.
  • Page 204: Table 101 Status

    Chapter 20 The Status Screen The following tables describe the labels in this screen. Table 101 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Modem system name.
  • Page 205 Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION WiMAX State This field displays the status of the WiMAX Modem’s current connection. • INIT: the WiMAX Modem is starting up. • DL_SYN: The WiMAX Modem is unable to connect to a base station. •...
  • Page 206 Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION Memory Usage This field displays what percentage of the WiMAX Modem’s memory is currently used. The higher the memory usage, the more likely the WiMAX Modem is to slow down.
  • Page 207: Packet Statistics

    Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, Click Unregister to delete the SIP account’s registration in the SIP server.
  • Page 208: Wimax Site Information

    Chapter 20 The Status Screen The following table describes the fields in this screen. Table 102 Packet Statistics LABEL DESCRIPTION Port This column displays each interface of the WiMAX Modem. Status This field indicates whether or not the WiMAX Modem is using the interface. For the WAN interface, this field displays the port speed and duplex setting when the WiMAX Modem is connected to a WiMAX network, and Down when the WiMAX Modem is not connected to a WiMAX network.
  • Page 209: Dhcp Table

    Chapter 20 The Status Screen The following table describes the labels in this screen. Table 103 WiMAX Site Information LABEL DESCRIPTION DL Frequency These fields show the downlink frequency settings in kilohertz (kHz). These settings determine how the WiMAX Modem searches for an available [0] ~ [9] wireless connection.
  • Page 210: Voip Statistics

    Chapter 20 The Status Screen 20.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 119 VoIP Statistics Each field is described in the following table.
  • Page 211 Chapter 20 The Status Screen Table 105 VoIP Statistics LABEL DESCRIPTION Hook This field indicates whether the phone is on the hook or off the hook. On - The phone is hanging up or already hung up. Off - The phone is dialing, calling, or connected. Status This field displays the current state of the phone call.
  • Page 212: Wimax Profile

    Chapter 20 The Status Screen 20.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. Not all WiMAX Modem models have all the fields shown here.
  • Page 213 Chapter 20 The Status Screen Table 106 The WiMAX Profile Screen (continued) LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station.
  • Page 214 Chapter 20 The Status Screen User’s Guide...
  • Page 215: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (217) Product Specifications (223)
  • Page 217: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • WiMAX Modem Access and Login • Internet Access •...
  • Page 218: Wimax Modem Access And Login

    Chapter 21 Troubleshooting 21.2 WiMAX Modem Access and Login I forgot the IP address for the WiMAX Modem. 1 The default IP address is http://192.168.100.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the WiMAX Modem by looking up the IP address of the default gateway for your computer.
  • Page 219: Internet Access

    Chapter 21 Troubleshooting Advanced Suggestions • Try to access the WiMAX Modem using another service, such as Telnet. If you can access the WiMAX Modem, check the remote management settings and firewall rules to find out why the WiMAX Modem does not respond to HTTP. •...
  • Page 220 Chapter 21 Troubleshooting the values are correct. If the values are incorrect, enter the correct frequency settings in the ADVANCED > WAN Configuration > WiMAX Configuration screen. If you are unsure of the correct values, contact your service provider. 5 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP.
  • Page 221: Phone Calls And Voip

    Chapter 21 Troubleshooting The Internet connection disconnects. 1 Check your WiMAX link and signal strength using the WiMAX Link and Strength Indicator LEDs on the device. 2 Contact your ISP if the problem persists. 21.4 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. 1 Check the telephone connections and telephone wire.
  • Page 222: Reset The Wimax Modem To Its Factory Defaults

    Chapter 21 Troubleshooting 21.5 Reset the WiMAX Modem to Its Factory Defaults If you reset the WiMAX Modem, you lose all of the changes you have made. The WiMAX Modem re-loads its default settings, and the password resets to 1234. You have to make all of your changes again.
  • Page 223: Product Specifications

    H A P T E R Product Specifications This chapter gives details about your WiMAX Modem’s hardware and firmware features. Table 107 Environmental and Hardware Specifications FEATURE DESCRIPTION Operating Temperature 0°C to 45°C Storage Temperature -25°C to 55°C Operating Humidity 20% ~ 90% (non-condensing) Storage Humidity 10% to 95% (non-condensing)
  • Page 224: Table 109 Firmware Specifications

    Chapter 22 Product Specifications Table 108 Radio Specifications (continued) Data Rate Download: Maximum 20 Mbps Average 6 Mbps Upload: Maximum 4 Mbps Average 3 Mbps Modulation QPSK (uplink and downlink) 16-QAM (uplink and downlink) 64-QAM (downlink only) Output Power 27dBm with external antennas attached Duplex mode Time Division Duplex (TDD) Security...
  • Page 225: Table 110 Standards Supported

    Chapter 22 Product Specifications Table 109 Firmware Specifications (continued) FEATURE DESCRIPTION DHCP DHCP (Dynamic Host Configuration Protocol) allows the individual clients (computers) to obtain the TCP/IP configuration at start-up from a centralized DHCP server. Your device has built-in DHCP server capability enabled by default.
  • Page 226 Chapter 22 Product Specifications Table 110 Standards Supported (continued) STANDARD DESCRIPTION RFC 1349 Type of Service Protocol RFC 1706 DNS NSAP Resource Records RFC 1889 Real-time Transport Protocol (RTP) RFC 1890 Real-time Transport Control Protocol (RTCP) RFC 2030 Simple Network Time Protocol RFC 2104 HMAC: Keyed-Hashing for Message Authentication RFC 2131...
  • Page 227: Table 111 Voice Features

    Chapter 22 Product Specifications Table 111 Voice Features Call Park and Call park and pickup lets you put a call on hold (park) and then continue the call Pickup (pickup). The caller must still pay while the call is parked. When you park the call, you enter a number of your choice (up to eight digits), which you must enter again when you pick up the call.
  • Page 228: Table 112 Star (*) And Pound (#) Code Support

    Chapter 22 Product Specifications Table 111 Voice Features SIP ALG Your device is a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass through NAT for devices behind it (such as a SIP-based VoIP software application on a computer). Other Voice SIP version 2 (Session Initiating Protocol RFC 3261) Features...
  • Page 229: Appendices And Index

    Appendices and Index WiMAX Security (231) Setting Up Your Computer’s IP Address (235) Pop-up Windows, JavaScripts and Java Permissions (259) IP Addresses and Subnetting (267) Importing Certificates (277) SIP Passthrough (301) Common Services (303) Legal Information (307) Customer Support (311)
  • Page 231: Appendix A Wimax Security

    P P E N D I X WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times.
  • Page 232 Appendix A WiMAX Security • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your base station acts as a message relay between the MS/SS and the network RADIUS server.
  • Page 233 Appendix A WiMAX Security Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA). In a WiMAX network, the process of security association has three stages. • Authorization request and reply The MS/SS presents its public certificate to the base station.
  • Page 234 Appendix A WiMAX Security User’s Guide...
  • Page 235: Appendix B Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 236: Figure 121 Windows Xp: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 121 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
  • Page 237: Figure 123 Windows Xp: Control Panel > Network Connections > Properties

    Appendix B Setting Up Your Computer’s IP Address Figure 123 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 124 Windows XP: Local Area Connection Properties User’s Guide...
  • Page 238: Figure 125 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 125 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 239: Figure 126 Windows Vista: Start Menu

    Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 126 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 127 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
  • Page 240: Figure 129 Windows Vista: Network And Sharing Center

    Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 129 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 130 Windows Vista: Network and Sharing Center During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
  • Page 241: Figure 131 Windows Vista: Local Area Connection Properties

    Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 131 Windows Vista: Local Area Connection Properties User’s Guide...
  • Page 242: Figure 132 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 132 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
  • Page 243: Figure 133 Mac Os X 10.4: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 133 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon.
  • Page 244: Figure 135 Mac Os X 10.4: Network Preferences

    Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 135 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab.
  • Page 245: Figure 137 Mac Os X 10.4: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. •...
  • Page 246: Figure 139 Mac Os X 10.5: Apple Menu

    Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 139 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 140 Mac OS X 10.5: Systems Preferences User’s Guide...
  • Page 247: Figure 141 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 141 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: •...
  • Page 248: Figure 142 Mac Os X 10.5: Network Preferences > Ethernet

    Appendix B Setting Up Your Computer’s IP Address Figure 142 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab.
  • Page 249: Figure 144 Ubuntu 8: System > Administration Menu

    Appendix B Setting Up Your Computer’s IP Address Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 250: Figure 146 Ubuntu 8: Administrator Account Authentication

    Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 146 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
  • Page 251: Figure 148 Ubuntu 8: Network Settings > Properties

    Appendix B Setting Up Your Computer’s IP Address Figure 148 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
  • Page 252: Figure 150 Ubuntu 8: Network Tools

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 150 Ubuntu 8: Network Tools User’s Guide...
  • Page 253: Figure 151 Opensuse 10.3: K Menu > Computer Menu

    Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 254: Figure 153 Opensuse 10.3: Yast Control Center

    Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 153 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
  • Page 255: Figure 155 Opensuse 10.3: Network Card Setup

    Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 155 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 256: Figure 156 Opensuse 10.3: Network Settings

    Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 156 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
  • Page 257: Figure 157 Opensuse 10.3: Knetwork Manager

    Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 157 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
  • Page 258 Appendix B Setting Up Your Computer’s IP Address User’s Guide...
  • Page 259: Appendix C Pop-Up Windows, Javascripts And Java Permissions

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Internet Explorer 6 screens are used here.
  • Page 260: Figure 160 Internet Options: Privacy

    Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 160 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
  • Page 261: Figure 161 Internet Options: Privacy

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 161 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 162 Pop-up Blocker Settings User’s Guide...
  • Page 262: Figure 163 Internet Options: Security

    Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 263: Figure 164 Security Settings - Java Scripting

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 164 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
  • Page 264: Figure 166 Java (Sun)

    Appendix C Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 166 Java (Sun) User’s Guide...
  • Page 265: Figure 167 Mozilla Firefox: Tools > Options

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 167 Mozilla Firefox: TOOLS >...
  • Page 266 Appendix C Pop-up Windows, JavaScripts and Java Permissions User’s Guide...
  • Page 267: Appendix D Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 268: Figure 169 Network Number And Host Id

    Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 169 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 269: Table 114 Subnet Masks

    Appendix D IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
  • Page 270: Figure 170 Subnetting Example: Before Subnetting

    Appendix D IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 116 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.0 0000 0000 255.255.255.128 1000 0000 255.255.255.192 1100 0000 255.255.255.224 1110 0000...
  • Page 271: Figure 171 Subnetting Example: After Subnetting

    Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub- networks, A and B. Figure 171 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 –...
  • Page 272: Table 117 Subnet 1

    Appendix D IP Addresses and Subnetting Table 117 Subnet 1 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.100.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 118 Subnet 2 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE...
  • Page 273: Table 121 Eight Subnets

    Appendix D IP Addresses and Subnetting Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 121 Eight Subnets SUBNET LAST BROADCAST...
  • Page 274: Configuring Ip Addresses

    Appendix D IP Addresses and Subnetting Table 123 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.252.0 (/22) 1022 255.255.254.0 (/23) 255.255.255.0 (/24) 255.255.255.128 (/25) 255.255.255.192 (/26) 1024 255.255.255.224 (/27) 2048 255.255.255.240 (/28) 4096...
  • Page 275: Figure 172 Conflicting Computer Ip Addresses Example

    Appendix D IP Addresses and Subnetting You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks.
  • Page 276: Figure 173 Conflicting Computer Ip Addresses Example

    Appendix D IP Addresses and Subnetting Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets.
  • Page 277: Appendix E Importing Certificates

    P P E N D I X Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
  • Page 278: Figure 175 Internet Explorer 7: Certification Error

    Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 279: Figure 178 Internet Explorer 7: Certificate

    Appendix E Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 178 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next. Figure 179 Internet Explorer 7: Certificate Import Wizard User’s Guide...
  • Page 280: Figure 180 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 180 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 181 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
  • Page 281: Figure 183 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 183 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 184 Internet Explorer 7: Security Warning User’s Guide...
  • Page 282: Figure 185 Internet Explorer 7: Certificate Import Wizard

    Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 185 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar.
  • Page 283: Figure 187 Internet Explorer 7: Public Key Certificate File

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file.
  • Page 284: Figure 189 Internet Explorer 7: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 189 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content >...
  • Page 285: Figure 191 Internet Explorer 7: Certificates

    Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 191 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 192 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
  • Page 286: Figure 194 Firefox 2: Website Certified By An Unknown Authority

    Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 287: Figure 196 Firefox 2: Tools Menu

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS >...
  • Page 288: Figure 198 Firefox 2: Certificate Manager

    Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import Figure 198 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 199 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
  • Page 289: Figure 200 Firefox 2: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 200 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates. Figure 201 Firefox 2: Options User’s Guide...
  • Page 290: Figure 202 Firefox 2: Certificate Manager

    Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 202 Firefox 2: Certificate Manager 4 In the Delete Web Site Certificates dialog box, click OK. Figure 203 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 291: Figure 204 Opera 9: Certificate Signer Not Found

    Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 292: Figure 206 Opera 9: Tools Menu

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS >...
  • Page 293: Figure 208 Opera 9: Certificate Manager

    Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 208 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 209 Opera 9: Import certificate User’s Guide...
  • Page 294: Figure 210 Opera 9: Install Authority Certificate

    Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 210 Opera 9: Install authority certificate 6 Next, click OK. Figure 211 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
  • Page 295: Figure 212 Opera 9: Tools Menu

    Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 212 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates. Figure 213 Opera 9: Preferences User’s Guide...
  • Page 296: Figure 214 Opera 9: Certificate Manager

    Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 214 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
  • Page 297: Figure 215 Konqueror 3.5: Server Authentication

    Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
  • Page 298: Figure 218 Konqueror 3.5: Public Key Certificate File

    Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file.
  • Page 299: Figure 221 Konqueror 3.5: Settings Menu

    Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 221 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
  • Page 300 Appendix E Importing Certificates User’s Guide...
  • Page 301: Appendix F Sip Passthrough

    P P E N D I X SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Modem, use the ip alg disable ALG_SIP command to turn off the SIP ALG.
  • Page 302 Appendix F SIP Passthrough User’s Guide...
  • Page 303: Appendix G Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
  • Page 304 Appendix G Common Services Table 124 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 1720 NetMeeting uses this protocol. HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide web.
  • Page 305 Appendix G Common Services Table 124 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION RTSP TCP/UDP The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet. SFTP Simple File Transfer Protocol. SMTP Simple Mail Transfer Protocol is the message-exchange standard for the Internet.
  • Page 306 Appendix G Common Services User’s Guide...
  • Page 307: Appendix H Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 308 Appendix H Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 309: Zyxel Limited Warranty

    Appendix H Legal Information Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
  • Page 310 Appendix H Legal Information User’s Guide...
  • Page 311: Appendix I Customer Support

    • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-3-578-3942 • Fax: +886-3-578-2439 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan China - ZyXEL Communications (Beijing) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn •...
  • Page 312 Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 - Modrany, Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk •...
  • Page 313 Appendix I Customer Support Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-6909-69 • Fax: +49-2405-6909-99 • Web: www.zyxel.de • Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen, Germany Hungary • Support E-mail: support@zyxel.hu • Sales E-mail: info@zyxel.hu •...
  • Page 314 • Support Telephone: +1-800-978-7222 • Sales E-mail: sales@zyxel.com • Sales Telephone: +1-714-632-0882 • Fax: +1-714-632-0858 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no •...
  • Page 315 • Support E-mail: support@zyxel.es • Sales E-mail: sales@zyxel.es • Telephone: +34-902-195-420 • Fax: +34-913-005-345 • Web: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 •...
  • Page 316 • Support E-mail: support@zyxel.co.uk • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) User’s Guide...
  • Page 317: Index

    Index Index Europe type service mode forwarding hold 130–131 72–73 park and pickup return service mode 130–131 accounting server transfer 130–131 see AAA waiting 130–131, 227 ACK message caller ID activity CBC-MAC Advanced Encryption Standard CCMP 231, 233 see AES cell Certificate Management Protocol (CMP) 99, 225, 228...
  • Page 318 Index comfort noise generation contact information copyright echo cancellation 125, 225 encryption 231–233 counter mode traffic see CCMP environmental specifications country code Ethernet coverage area encapsulation cryptography Europe type call service mode customer support Extensible Authorization Protocol see EAP data 231–233 decryption FCC interference statement...
  • Page 319 Index IEEE 802.16 71, 231 Metropolitan Area Network see MAN IEEE 802.16e microwave 71, 72 IEEE 802.1Q VLAN mobile station IGD 1.0 see MS inner authentication modulation interface Internet multimedia access 72, 224 gateway device multiple SIP accounts Internet Assigned Numbers Authority see IANA My Certificates Internet Telephony Service Provider...
  • Page 320 Index services RFC 1889 112, 228 physical specifications RFC 1890 pickup RFC 2327 PKMv2 43, 73, 75, 231, 233 RFC 2510. See Certificate Management Protocol. plain text encryption RFC 3261 point-to-point calls RFC 3489 power RFC 3842 output Ringer Equivalence Number supply RTCP Privacy Key Management...
  • Page 321 Index user agent uniform resource identifier version 2 Universal Plug and Play SNMP see UPnP manager UPnP 195–196, 224 sound quality application auto-discovery specifications security issues physical and environmental Windows XP speed dial USA type call service mode 71, 72 use NAT stateful inspection use NAT feature...
  • Page 322 Index access standard wireless security 224, 231 wizard setup User’s Guide...

Table of Contents