Comtrend Corporation CT-820C User Manual
Comtrend Corporation CT-820C User Manual

Comtrend Corporation CT-820C User Manual

Voip gateway

Advertisement

Quick Links

CT-820C

VoIP Gateway

User's Manual
Version A2.0, December 26, 2007
261053-034

Advertisement

Table of Contents
loading

Summary of Contents for Comtrend Corporation CT-820C

  • Page 1: Voip Gateway

    CT-820C VoIP Gateway User’s Manual Version A2.0, December 26, 2007 261053-034...
  • Page 2 Copyright Copyright©2007 Comtrend Corporation. All rights reserved. The information contained herein is proprietary to Comtrend Corporation. No part of this document may be translated, transcribed, reproduced, in any form, or by any means without prior written permission by Comtrend Corporation.
  • Page 3: Table Of Contents

    Table of Contents CHAPTER 1 INTRODUCTION .....................4 1.1 F ............................4 EATURES 1.2 A ...........................5 PPLICATION 1.3 LED I ..........................6 NDICATORS CHAPTER 2 HARDWARE SETUP....................7 CHAPTER 3 WEB USER INTERFACE ..................8 3.1 D .........................8 EFAULT ETTINGS 3.2 TCP/IP S ..........................9 ETTINGS 3.3 L ........................10 OGIN...
  • Page 4 9.5.2 IP Addresses ........................74 9.5.3 Passwords ........................75 9.6 U ........................76 PDATE OFTWARE 9.7 S ........................77 AVE AND EBOOT APPENDIX A: FIREWALL ........................78 APPENDIX B: PIN ASSIGNMENTS....................81 APPENDIX C: SPECIFICATIONS....................82 APPENDIX D: SSH CLIENT ......................84...
  • Page 5: Chapter 1 Introduction

    Internet. The CT-820C is designed for residential and business users with broadband DSL or cable access, who need to integrate Wi-Fi AP and VoIP technologies. The CT-820C offers users easy access to the Internet via WLAN or Ethernet and provides VoIP via standard analog phones.
  • Page 6: Application

    1.2 Application The following diagram depicts the application of the CT-820C.
  • Page 7: Led Indicators

    1.3 LED Indicators The front panel LED indicators are shown in this illustration and followed by detailed explanations in the table below. Color Mode Function Green The device is powered up. POWER The device is powered down. Green An Ethernet Link is established. An Ethernet Link is not established.
  • Page 8: Chapter 2 Hardware Setup

    Chapter 2 Hardware Setup Follow the instructions below to complete the hardware setup. The diagram below shows the back panel of the device. Wi-Fi antenna Connection to Power Connect the Power jack to the power cord. Attach the power adapter to the wall outlet or other AC source.
  • Page 9: Chapter 3 Web User Interface

    Chapter 3 Web User Interface This section describes how to access the device via the web user interface using an Internet browser such as Microsoft Internet Explorer (version 5.0 and later). 3.1 Default Settings The following are the default settings for the device. •...
  • Page 10: Tcp/Ip Settings

    3.2 TCP/IP Settings DHCP Mode When the device powers up, the DHCP server (on the device) will start automatically. To set your PC for DHCP mode, check the Internet Protocol properties of your Local Area Connection. You can set your PC to DHCP mode by selecting Obtain an IP address automatically in the dialog box shown below.
  • Page 11: Login Procedure

    STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button. The screen should now display as below. Change the IP address to the domain of 192.168.1.x/24 (i.e. subnet mask=255.255.255.0). STEP 3: Click OK to submit the settings. 3.3 Login Procedure Perform the following steps to login to the web user interface.
  • Page 13 STEP 2: A dialog box will appear, such as the one below. Enter the default username and password, as defined in section 3.1 Default Settings. Click OK to continue. NOTE: The login password can be changed later (see 9.5.3 Passwords) STEP 3: After successfully logging in, you will reach this screen.
  • Page 14: Chapter 4 Device Information

    Chapter 4 Device Information The web user interface is divided into two window panes, the main menu (at left) and the display screen (on the right). The main menu has the following options: Device Info, Advanced Setup, Wireless, Voice, Diagnostics, Management. Selecting one of these options will open a submenu with more options.
  • Page 15: Wan

    4.1 WAN Select WAN from the Device Info submenu to display the configured PVC(s). The display screen table headings (above) are described in the table below. Con. ID Shows the connection ID Category Shows the ATM service classes Service Shows the name for WAN connection Interface Shows connection interfaces Protocol...
  • Page 16: Statistics

    4.2 Statistics The Statistics screens show detailed information for LAN or WAN Interfaces. NOTE: These statistics are updated every 15 seconds. 4.2.1 LAN Statistics This screen shows statistics for Ethernet and Wireless interfaces on the LAN. Interface Shows connection interfaces in the following format: nas_(VPI number_VCI number).
  • Page 17: Wan Statistics

    4.2.2 WAN Statistics This screen shows statistics for interfaces on the WAN. Service Shows the service type, as configured by the administrator Protocol Shows the connection type, such as PPPoE, PPPoA, etc. Interface Shows connection interfaces in the following format: nas_(VPI number_VCI number). These interfaces are devised by the system and not the user.
  • Page 18: Route

    4.3 Route Choose Route to display the routes that the route information has learned. Field Description Destination Destination network or destination host Gateway Next hub IP address Subnet Mask Subnet Mask of Destination Flag U: route is up !: reject route G: use gateway H: target is a host R: reinstate route for dynamic routing...
  • Page 19: Arp

    4.4 ARP Click ARP to display the ARP information.
  • Page 20: Dhcp

    4.5 DHCP Click DHCP to display the DHCP Leases information.
  • Page 21: Chapter 5 Advanced Setup

    Chapter 5 Advanced Setup This chapter explains the setup screens for the following services: • WAN – Wide Area Network • SECURITY • LAN – Local Area Network • QUALITY OF SERVICE • NAT – Network Address Translation • ROUTING 5.1 WAN Follow the steps on the following pages to configure WAN interfaces.
  • Page 22 STEP 2: The WAN Configuration screen will display as below. Quality of Service (QoS) is enabled when the box at bottom is checked ( ). Click Next. STEP 3: On this screen, you can choose either PPPoE or IPoE connection types. Once you have chosen, click Next to proceed.
  • Page 23 Important Note: For PPPoE connections follow Steps 4-6 For IPoE connections follow Steps 7-9 PPPoE –PPP over Ethernet Step 4: Enter the Username and Password and select the connection options. Review the descriptions below for more details. Click Next to continue. PPP Username/PPP Password The PPP Username and the PPP password requirement are dependent on the particular requirements of the service provider.
  • Page 24 PPP IP Extension The PPP IP Extension is a special feature deployed by some service providers. Unless your service provider specially requires this setup, do not select it. The PPP IP Extension supports the following conditions: • Allows only one PC on the LAN •...
  • Page 25 Enable IGMP Multicast checkbox Tick the checkbox to enable IGMP multicast (proxy). IGMP (Internet Group Membership Protocol) is a protocol used by IP hosts to report their multicast group memberships to any immediately neighboring multicast device’s. STEP 6: Click Next to display the WAN Setup-Summary screen that presents the entire configuration summary review.
  • Page 26 IPoE – Internet Protocol over Ethernet STEP 7: The WAN IP Settings screen below allows for configuration of the connection in DHCP (automatic) or Static IP (manual) modes. Enter information provided to you by your ISP to configure the WAN IP settings. DHCP mode must be enabled when Obtain an IP address automatically is chosen.
  • Page 27 Enable NAT If the LAN is configured with a private IP address, the user should select this checkbox. The user can then configure NAT-related features. If a private IP address is not used on the LAN side, this checkbox should not be selected, so as to free up system resources for improved performance.
  • Page 28: Lan

    5.2 LAN Configure the device IP Address and Subnet Mask for LAN interface. Save button only saves the LAN configuration data. Save/Reboot button saves the LAN configuration data and reboots the device to apply the new configuration. IP Address: Enter the IP address for the LAN port. Subnet Mask: Enter the subnet mask for the LAN port.
  • Page 29: Nat

    To configure a secondary IP address tick the checkbox shown below. IP Address: Enter the secondary IP address for the LAN port. Subnet Mask: Enter the secondary subnet mask for the LAN port. 5.3 NAT NOTE: To display the NAT function, you must enable NAT in WAN Setup. 5.3.1 Virtual Servers Virtual Servers allow you to direct incoming traffic from the WAN side (identified...
  • Page 30 Select a Service User should select the service from the list. Custom Server User can enter the name of their choice. Server IP Address Enter the IP address for the server. External Port Start Enter the starting external port number (when you select Custom Server).
  • Page 31: Port Triggering

    5.3.2 Port Triggering Some applications require that specific ports in the device's firewall be opened for access by the remote parties. Port Trigger dynamically opens up the 'Open Ports' in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote party using the 'Triggering Ports'.
  • Page 32 Select an User should select the application from the list. Application User can enter the name of their choice. Custom Application Trigger Port Start Enter the starting trigger port number (when you select custom application). When an application is selected the port ranges are automatically configured.
  • Page 33: Dmz Host

    5.3.3 DMZ Host The device will forward IP packets from the WAN that do not belong to any of the applications configured in the Virtual Servers table to the DMZ host computer. Enter the computer's IP address and click Apply to activate the DMZ host. Clear the IP address field and click Apply to deactivate the DMZ host.
  • Page 34: Security

    5.4 Security NOTE: The Firewall must be enabled to access this option 5.4.1 IP Filtering IP filtering allows you to create a filter rule to identify outgoing/incoming IP traffic by specifying a new filter name and at least one condition below. All of the specified conditions in this filter rule must be satisfied for the rule to take effect.
  • Page 35 Filter Name Type a name for the filter rule. Protocol TCP, TCP/UDP, UDP or ICMP. Source IP address Enter source IP address. Source Subnet Mask Enter source subnet mask. Source Port (port or port:port) Enter source port number or port range. Destination IP address Enter destination IP address.
  • Page 36 Incoming NOTE: The default setting for all Incoming traffic is BLOCKED. To add a filtering rule, click the Add button. The following screen will display. To configure the parameters, please reference the Outgoing IP Filter table.
  • Page 37: Parental Control

    5.4.2 Parental Control Daytime Parental Control This feature restricts access of a selected LAN device to an outside network through the router, as per chosen days of the week and the chosen times. Click Add to display the following screen. See below for instructions.
  • Page 38: Quality Of Service

    User Name: Name of the Filter. Browser's MAC Address: Displays MAC address of the LAN device on which the browser is running. Other MAC Address: If restrictions are to be applied to a device other than the one on which the browser is running, the MAC address of that LAN device is entered.
  • Page 39: Routing

    5.6 Routing This option allows for Default Gateway and Static Route configuration. 5.6.1 Default Gateway If Enable Automatic Assigned Default Gateway checkbox is selected, this device will accept the first received default gateway assignment from one of the enabled PVC(s). If the checkbox is not selected, enter the static default gateway and/or WAN interface.
  • Page 40: Static Route

    5.6.2 Static Route The Static Route screen lists the configured static routes. Choose Add or Remove to configure the static routes. Click the Add button and the following screen will display. Enter the destination network address, subnet mask, gateway AND/OR available WAN interface then click Save/Apply to add the entry to the routing table.
  • Page 41: Chapter 6 Wireless

    Chapter 6 Wireless The Wireless menu allow you to enable the wireless capability, hide the access point, set the wireless network name and restrict the channel set. 6.1 Basic This screen allows you to enable or disable the wireless LAN interface, hide the network from active scans, set the wireless network name (also known as SSID) and restrict the channel set based on country requirements.
  • Page 42 Option Description Enable Wireless A checkbox that enables or disables the wireless LAN interface. When selected, the Web UI displays Hide Access point, SSID, and County settings. The default is Enable Wireless. Hide Access Point Select Hide Access Point to protect device access point from detection by wireless active scans.
  • Page 43: Security

    6.2 Security Security options include authentication and encryption services based on the wired equivalent privacy (WEP) algorithm. WEP is a set of security services used to protect 802.11 networks from unauthorized access, such as eavesdropping; in this case, the capture of wireless network traffic. When data encryption is enabled, secret shared encryption keys are generated and used by the source station and the destination station to alter frame bits, thus avoiding disclosure to eavesdroppers.
  • Page 44 Option Description Network It specifies the network authentication. When this checkbox is Authentication selected, it specifies that a network key be used for authentication to the wireless network. If the Network Authentication (Shared mode) checkbox is not shared (that is, if open system authentication is used), no authentication is provided.
  • Page 45 Choosing WPA-PSK, you must enter WPA Pre-Shared Key and Group Rekey Interval. It specifies that a network key is used to encrypt the data is sent Encryption over the network. When this checkbox is selected, it enables data encryption and prompts the Encryption Strength drop-down menu. Data Encryption (WEP Enabled) and Network Authentication use the same key.
  • Page 46: Mac Filter

    6.3 MAC Filter This MAC Filter page allows access to be restricted/allowed based on a MAC address. All NICs have a unique 48-bit MAC address burned into the ROM chip on the card. When MAC address filtering is enabled, you are restricting the NICs that are allowed to connect to your access point.
  • Page 47 Option Description MAC Restrict Mode Radio buttons that allow settings of; Off: MAC filtering function is disabled. Allow: Permits PCs with listed MAC addresses to connect to the access point. Deny: Prevents PCs with listed MAC from connecting to the access point.
  • Page 48: Wireless Bridge

    6.4 Wireless Bridge This page allows you to configure wireless bridge features of the wireless LAN interface. You can select Wireless Bridge (also known as Wireless Distribution System) to disable access point functionality. Selecting Access Point enables access point functionality. Wireless bridge functionality will still be available and wireless stations will be able to associate to the AP.
  • Page 49: Advanced

    6.5 Advanced The Advanced page allows you to configure advanced features of the wireless LAN interface. You can select a particular channel on which to operate, force the transmission rate to a particular speed, set the fragmentation threshold, set the RTS threshold, set the wakeup interval for clients in power-save mode, set the beacon interval for the access point and set whether short or long preambles are used.
  • Page 50 54g™ Rate Drop-down menu that specifies the following fixed rates: Auto: Default. Uses the 11 Mbps data rate when possible but drops to lower rates when necessary. 1 Mbps, 2Mbps, 5Mbps, or 11Mbps fixed rates. The appropriate setting is dependent on signal strength. Multicast Rate Setting multicast packet transmit rate Basic Rate...
  • Page 51 Maximum Associated The maximum number of clients that may connect to Clients the access point. The device supports up to 128. Xpress Technology Xpress Technology is compliant with draft specifications of two planned wireless industry standards. Mode Select the mode to 54g Auto for the widest compatibility.
  • Page 52: Station Info

    6.6 Station Info This page shows authenticated wireless stations and their status. BSSID The BSSID is a 48bit identity used to identify a particular BSS (Basic Service Set) within an area. In Infrastructure BSS networks, the BSSID is the MAC (Medium Access Control) address of the AP (Access Point) and in Independent BSS or ad hoc networks, the BSSID is generated randomly.
  • Page 53: Chapter 7 Voice

    Chapter 7 Voice This chapter first describes the SIP and Dial Plan configuration screens. The last section (7.3 Telephone Calls) describes how to use the VoIP (Voice over IP) and PSTN (Public Switched Telephone Network) voice services. 7.1 SIP Session Initiation Protocol (SIP) is a signaling protocol for Internet conferencing, telephony, presence, events notification and instant messaging.
  • Page 54 To access the SIP configuration screen, click SIP from the Voice submenu. Once the settings are configured click Apply and Save All VoIP Parameters to reset the VoIP service to use the new settings.
  • Page 55 This table describes the SIP configuration options shown on the previous page. Interface name WAN interface name Local Selection Set tone, ring type and physical characteristics for each specific country. Preferred codec The default is G.711U. Preferred ptime The default is 20. Use SIP proxy A proxy is an intermediary program that acts as both a server and a client for the...
  • Page 56 Payload for DTMF Digits, Telephony Tones and Telephony Signals. A payload type is a number from 96 to 127 that identifies the type of payload carried in the packet. The payload type should be identical on the GW and call agent. Enable Pass '*' Call Feature to Only Tick if your VoIP Service Provider Sip Proxy...
  • Page 57 you are on Phone 1. Please note that you may not be able to Call Forward from Line 1 to Line 2 and then if Line 2 is also busy to Call Forward to a 3 party number even if you have correctly setup a rule for Call Forward on Line 2.
  • Page 58: Dial Plan

    7.2 Dial Plan With this function you can modify the translation rules for phone numbers. This is can be done by establishing Incoming and Outgoing rules, while the Advance screen provides for even greater customization. All three screens are similar in design as can be seen in the figures below. Outgoing Incoming Advance...
  • Page 59 Modify Select a dial plan rule and click this button to go to the modify rule screen. Follow the detailed instructions given there. After adjusting the values in the form, click Apply to change the dial plan rule. Apply/Save Use this button to save and apply a new Dial Plan configuration. CONFIGURATION PARAMETERS The following table of parameters is included for your reference.
  • Page 60 For this example, assume that the device needs to convert the following 11 digit dial sequence “123-xxx-xxxxx” into “002-xxx-xxxxx”, where “x” is any number. Here are the steps involved. Step 1: Enter any number between 0 and 32767 in the Priority field. Step 2: In the prefix field enter “123”.
  • Page 61: Telephone Calls

    7.3 Telephone Calls To make a call, simply dial the number. The dial plan (i.e. the dialed digits) is normally customized for each installation. The default dial plan delivered by Comtrend allows dialing of 4-digit extensions or direct IP addresses. Shorter extension numbers (e.g.
  • Page 62 Conference Calling To turn a two-party call into a three-party conference call, press flash and dial the third party. Wait for the party to answer, then press flash. To drop the third party and return to a two-party call, press flash again. To drop yourself out of the conference, hang up.
  • Page 63: Chapter 8 Diagnostics

    Chapter 8 Diagnostics The Diagnostics menu provides feedback on the connection status of the device. The individual tests are listed below. If a test displays a fail status, click Rerun Diagnostic Tests at the bottom of this page to make sure the fail status is consistent.
  • Page 64 Test Description Ping Primary Domain Name Server Pass: Indicates that the device can communicate with the primary Domain Name Server (DNS). Fail: Indicates that the device was unable to communicate with the primary Domain Name Server (DNS). It may not have an effect on your Internet connectivity.
  • Page 65: Chapter 9 Management

    Chapter 9 Management The Management section of the device supports the following maintenance functions and processes: • Settings • System log • SNMP Agent • Internet Time • Access Control • Update software • Save/Reboot 9.1 Settings The Settings screen allows for the backup, retrieval and restoration of settings. Each of these functions is accessed from the Settings submenu and described in more detail in the following discussion.
  • Page 66: Update Settings

    9.1.2 Update Settings Select Update from the Settings submenu to access the screen shown below. Enter a previously saved configuration backup file in the Settings File Name field and click the Update Settings button to load it. If you forget the filename and path you can search your PC by clicking on the Browse button.
  • Page 67: Restore Default

    9.1.3 Restore Default Select Restore Default from the Settings submenu to access the screen shown below. Click the Restore Default Settings button to restore the device to the default firmware settings. Restoring system settings require a device reboot. The default settings can be found in section 3.1 Default Settings.
  • Page 68: System Log

    9.2 System Log The System Log option under Management allows for the viewing of system events and configuration of related options. The default setting for the System Log is enabled. Follow the steps below to enable and view the System Log. STEP 1: Click Configure System Log to continue.
  • Page 69 “Emergency” down to this configured level will be recorded to the log buffer on the CT-820C SDRAM. When the log buffer is full, the newer event will wrap up to the top of the log buffer and overwrite the old event.
  • Page 70 Option Description Mode Allows you to specify whether events should be stored in the local memory, or be sent to a remote syslog server, or both simultaneously. If remote mode is selected, view system log will not be able to display events saved in the remote syslog server.
  • Page 71: Snmp Agent

    9.3 SNMP Agent Simple Network Management Protocol (SNMP) allows a management application to retrieve statistics and status from the SNMP agent in this device. Select the desired values and click Save/Apply to configure the SNMP options.
  • Page 72: Internet Time

    9.4 Internet Time NOTE: Internet Time must be activated to use Parental Control (section 5.4.2) The Internet Time option under the Management submenu configures the time settings of the device. To automatically synchronize with Internet timeservers, tick the corresponding box displayed on this screen, then click Save/Apply. On the screen below, choose your Time Zone and click Save/Apply to continue.
  • Page 73: Access Control

    9.5 Access Control The Access Control option under Management menu bar configures access related parameters in three areas: Services, IP Addresses, and Passwords. Use Access Control to control local and remote management settings for the device. 9.5.1 Services The Services option limits or opens the access services over the LAN or WAN. These access services are available: FTP, HTTP, ICMP, SSH, TELNET, and TFTP.
  • Page 74: Ip Addresses

    9.5.2 IP Addresses The IP Addresses option limits local access by IP address. When the Access Control Mode is enabled, only the IP addresses listed here can access the device. Before enabling Access Control Mode, add IP addresses with the Add button. On this screen, enter the IP address of a local PC which you wish to give management permissions.
  • Page 75: Passwords

    9.5.3 Passwords The Passwords option configures the user account access passwords for the device. Access to the device is limited to the following three user accounts: • root is to be used for local unrestricted access control. • support is to be used for remote maintenance of the device •...
  • Page 76: Update Software

    9.6 Update Software The Update Software screen allows for firmware updates. Manual device upgrades from a locally stored file can be performed using the following screen. Step 1: Obtain an updated software image file from your ISP. Step 2: Enter the path and filename of the firmware image file in the Software File Name field or click the Browse button to locate the image file.
  • Page 77: Save And Reboot

    9.7 Save and Reboot The Save/Reboot option saves the current configuration and reboots the device. Close your browser, wait about 2 minutes and then restart the web user interface. NOTE: It may be necessary to reconfigure your TCP/IP settings to adjust for the new configuration.
  • Page 78: Appendix A: Firewall

    Appendix A: Firewall Stateful Packet Inspection Refers to an architecture, where the firewall keeps track of packets on each connection traversing all its interfaces and makes sure they are valid. This is in contrast to static packet filtering which only examines a packet based on the information in the packet header.
  • Page 79 This filter will Drop all TCP packets coming from LAN with IP Address/Sub. Mask 192.168.1.45/24 having a source port of 80 irrespective of the destination. All other packets will be Accepted. Filter Name : Out_Filter2 Protocol : UDP Source Address : 192.168.1.45 Source Subnet Mask : 255.255.255.0...
  • Page 80 Selected WAN interface: mer_0_35/nas_0_35 This filter will ACCEPT all TCP packets coming from WAN interface mer_0_35/nas_0_35 with IP Address/Sub. Mask 210.168.219.45/16 having a source port of 80 irrespective of the destination. All other incoming packets on this interface are DROPPED. Filter Name : In_Filter2 Protocol...
  • Page 81: Appendix B: Pin Assignments

    Appendix B: Pin Assignments Pin Assignments of the RJ11 Port Line port (RJ11) Definition Definition ADSL_TIP ADSL_RING Pin assignments of the LAN Port LAN Port (RJ45) Definition Definition Transmit data+ Transmit data- Receive data- Receive data+...
  • Page 82: Appendix C: Specifications

    Appendix C: Specifications WAN Interface Ethernet x 1 LAN Interface Ethernet x 4 WLAN Standard IEEE802.11g, backward compatible with 802.11b Encryption 64, 128-bit Wired Equivalent Privacy (WEP) Channels 11 (US, Canada)/ 13 (Europe)/ 14 (Japan) Data Rate Up to 54Mbps MAC Address Filtering, WEP, WPA, IEEE 802.1x 10, 25, 50, 100mW @ 22MHz channel bandwidth Output power level can be selected according to the environment...
  • Page 83 Security Functions Authentication protocols......PAP, CHAP VPN............. PPTP/L2TP/IpSec pass-through Stateful Packet Inspection, Packet filtering, Denial Of Service protection, Traffic Conditioning, WFQ-based Bandwidth Management, HTTP proxy L3 policy-based QoS, IP QoS, ToS Voice Functions SIP ............. RFC 3261 Codec..........G.711a/u, G.729, ILBC RTP .............
  • Page 84: Appendix D: Ssh Client

    Appendix D: SSH Client Linux OS comes with an ssh client. Microsoft Windows does not have ssh client but there is a public domain one called “putty” that you can download here: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html To access the device using Linux ssh client: From LAN: Use the device WEB UI to enable SSH access from LAN.

Table of Contents