Инструкция для ZyXEL MAX-206M2 Перейти в карточку товара 8 800 775 98 98 л чит т нич ю н льт цию. гл т чн . Б з вы дны www.sotmarket.
MAX-206M2 WiMAX MIMO Indoor CPE (2.5 GHz) User’s Guide Firmware Version 1.0 Edition 1, 08/2008 DEFAULT LOGIN IP Address http://192.168.100.1 User Name admin Password 1234 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the ZyXEL WiMAX Modem using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. P A Warnings tell you about things that could harm you or your WiMAX Modem. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The MAX-206M2 may be referred to as the “WiMAX Modem”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WiMAX Modem icon is not an exact representation of your WiMAX Modem.
Safety Warnings Safety Warnings P For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
Safety Warnings 8 User’s Guide
Contents Overview Contents Overview Introduction and Wizards ...................................................................................................... 29 Getting Started ........................................................................................................................... 31 Introducing the Web Configurator .............................................................................................. 35 Internet Connection Wizard ...........................................
Contents Overview 10 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents 3.1.5 Setup Complete ......................................................................................................... 46 Chapter 4 VoIP Connection Wizard......................................................................................................... 47 4.1 Overview .............................................................................................................................. 47 4.2 Welcome to the ZyXEL Setup Wizard ........................................
Table of Contents 6.7.5 RIP Setup ................................................................................................................... 68 6.7.6 Multicast ..................................................................................................................... 69 Chapter 7 The WAN Configuration Screens........................................................................................... 71 7.1 Overview .........................................................................
Table of Contents Chapter 10 The System Configuration Screens .................................................................................... 101 10.1 Overview .......................................................................................................................... 101 10.1.1 What You Can Do in This Chapter ......................................................................... 101 10.1.2 What You Need to Know .........................................................................
Table of Contents 12.2.1 Advanced Analog Phone Setup ............................................................................. 127 12.3 Common .......................................................................................................................... 128 12.4 Region ............................................................................................................................. 129 12.5 Technical Reference ......................................................................
Table of Contents 15.2.2 Triangle Route ........................................................................................................ 161 15.2.3 Firewall Setting Options ......................................................................................... 161 15.3 Service Setting ................................................................................................................ 163 15.4 Technical Reference .........................................................................
Table of Contents 19.2 UPnP ............................................................................................................................... 196 19.3 Technical Reference ........................................................................................................ 197 19.3.1 Installing UPnP in Windows XP ............................................................................. 197 19.3.2 Web Configurator Easy Access ..............................................................
Table of Contents Appendix G Common Services ............................................................................................ 303 Appendix H Legal Information .............................................................................................. 307 Appendix I Customer Support .............................................................................................. 311 Index.............................................................................................................
List of Figures List of Figures Figure 1 Mobile Station and Base Station ............................................................................................... 31 Figure 2 WiMAX Modem’s VoIP Features - Peer-to-Peer Calls ............................................................. 32 Figure 3 WiMAX Modem’s VoIP Features - Calls via VoIP Service Provider ......................................... 32 Figure 4 The WiMAX Modem’s LEDs ....................................................................
List of Figures Figure 39 VPN Transport Example ......................................................................................................... 83 Figure 40 Identifying Users ..................................................................................................................... 84 Figure 41 ADVANCED > VPN Transport > General ............................................................................... 85 Figure 42 Pseudowire Mapping ................................................
List of Figures Figure 82 TOOLS > Certificates > Trusted CAs > Import ..................................................................... 154 Figure 83 Remote Host Certificates ..................................................................................................... 157 Figure 84 Certificate Details ................................................................................................................ 157 Figure 85 Firewall Rule Directions ............................................
List of Figures Figure 125 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 238 Figure 126 Windows Vista: Start Menu ................................................................................................. 239 Figure 127 Windows Vista: Control Panel ............................................................................................ 239 Figure 128 Windows Vista: Network And Internet ................................................
List of Figures Figure 168 Mozilla Firefox Content Security ......................................................................................... 265 Figure 169 Network Number and Host ID ............................................................................................ 268 Figure 170 Subnetting Example: Before Subnetting ............................................................................ 270 Figure 171 Subnetting Example: After Subnetting ............................................
List of Figures Figure 211 Opera 9: Install authority certificate ................................................................................... 294 Figure 212 Opera 9: Tools Menu .......................................................................................................... 295 Figure 213 Opera 9: Preferences ......................................................................................................... 295 Figure 214 Opera 9: Certificate manager .................................
List of Tables List of Tables Table 1 Common Icons ............................................................................................................................ 5 Table 2 The WiMAX Modem .................................................................................................................. 33 Table 3 Main > Icons ............................................................................................................................. 39 Table 4 Main ............................
List of Tables Table 38 ADVANCED > NAT Configuration > ALG ................................................................................ 99 Table 39 ADVANCED > System Configuration > General ................................................................... 103 Table 40 ADVANCED > System Configuration > Dynamic DNS ......................................................... 104 Table 41 ADVANCED > System Configuration > Firmware .................................................................
List of Tables Table 81 TOOLS > Logs > View Logs ................................................................................................. 183 Table 82 TOOLS > Logs > Log Settings .............................................................................................. 186 Table 83 System Error Logs ................................................................................................................ 187 Table 84 System Maintenance Logs ...............................................
List of Tables Table 124 Commonly Used Services ...................................................................................................
P ART I Introduction and Wizards Getting Started (31) Introducing the Web Configurator (35) Internet Connection Wizard (41) VoIP Connection Wizard (47) 29
30
CHAPTER 1 Getting Started 1.1 About Your WiMAX Modem The WiMAX Modem has a built-in switch and two phone ports. It allows you to access the Internet by connecting to a WiMAX wireless network. You can use a traditional analog telephone to make Internet calls using the WiMAX Modem’s Voice over IP (VoIP) communication capabilities. You can configure firewall and content filtering as well as a host of other features.
Chapter 1 Getting Started 1.1.2 Make Calls via Internet Telephony Service Provider In a home or small office environment, you can use the WiMAX Modem to make and receive the following types of VoIP telephone calls: • Peer-to-Peer calls - Use the WiMAX Modem to make a call directly to the recipient’s IP address without using a SIP proxy server.
Chapter 1 Getting Started 1.2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections. 1.2.1 LEDs The following figure shows the LEDs (lights) on the WiMAX Modem. Figure 4 The WiMAX Modem’s LEDs WI MAX LI NK STRENGTH I NDI CATOR VOI CE LEDS 1&2 LAN LEDS 1&2 POWER LED The following table describes your WiMAX Modem’s LEDs (from right to left). Table 2 The WiMAX Modem LED STATE DESCRIPTION Power Off The WiMAX Modem is not receiving power.
Chapter 1 Getting Started Table 2 The WiMAX Modem LED STATE DESCRIPTION WiMAN Link Off The WiMAX Modem is not connected to a wireless (WiMAX) network. Green The WiMAX Modem is successfully connected to a wireless (WiMAX) network. Green (Blinking Slowly) The WiMAX Modem is searching for a wireless (WiMAX) network. Green (Blinking Quickly) The WiMAX Modem has found a wireless (WiMAX) network and is connecting.
CHAPTER 2 Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device set up and management via any web browser that supports: HTML 4.0, CSS 2.0, and JavaScript 1.5, and higher. The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16-bit color, or higher. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 2 Introducing the Web Configurator 4 A password screen displays. The default password (“1234”) displays in non-readable characters. If you haven’t changed the password yet, you can just click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login. Figure 5 Password Screen 5 The following screen displays if you have not yet changed your password. It is highly recommended you change the default password.
Chapter 2 Introducing the Web Configurator 6 Click Apply in the next screen to create a certificate using your WiMAX Modem’s MAC address that will be specific to this device. This certificate is used for authentication when using a secure HTTPS connection over the Internet. Figure 7 Replace Certificate Screen 7 A screen displays to let you choose whether to go to the wizard or the advanced screens. • Click Go to Wizard setup if you are logging in for the first time or if you want to make basic changes.
Chapter 2 Introducing the Web Configurator 2.1.2 The Reset Button If you forget your password or cannot access the web configurator, you will need to use the Reset button to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”. 2.1.2.1 Using The Reset Button 1 Make sure the Power light is on (not blinking).
Chapter 2 Introducing the Web Configurator The following table describes the icons in this screen. Table 3 Main > Icons ICON DESCRIPTION MAIN Click to return to the Main screen. SETUP Click to go the Setup screen, where you can configure LAN, DHCP and WAN settings. ADVANCED Click to go to the Advanced screen, where you can configure features like Port Forwarding and Triggering, SNTP and so on. VOICE Click to go to the Voice screen, where you can configure your voice service and phone settings.
Chapter 2 Introducing the Web Configurator Table 4 Main (continued) 40 LABEL DESCRIPTION WiMAX Connection Status This field indicates the current status of your WiMAX connection. Status messages are as follows: • Connected - Indicates that the WiMAX Modem is connected to the WiMAX network. Use the Strength Indicator icon to determine the quality of your network connection. • Disconnected - Indicates that the WiMAX Modem is not connected to the WiMAX network.
CHAPTER 3 Internet Connection Wizard 3.1 Overview This chapter provides information on the ZyXEL Setup Wizard screens. The wizard guides you through several steps where you can configure your Internet and VoIP settings. 3.1.1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard. You can choose to either configure your Internet connection or your VoIP connection. The Internet Connection Wizard screens are described in detail in the following sections.
Chapter 3 Internet Connection Wizard 3.1.2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem’s system information. The settings here correspond to the ADVANCED > System Configuration > General screen (see Section 10.2 on page 102 for more). Figure 11 Internet Connection Wizard > System Information The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard 3.1.3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings. The settings here correspond to the ADVANCED > WAN Configuration > Internet Connection screen (see Section 7.2 on page 74 for more). Figure 12 Internet Connection Wizard > Authentication Settings Screen The following table describes the labels in this screen.
Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard > Authentication Settings Screen (continued) LABEL Authentication DESCRIPTION This field displays the user authentication method. Authentication is the process of confirming the identity of a mobile station (by means of a username and password, for example). Check with your service provider if you are unsure of the correct setting for your account.
Chapter 3 Internet Connection Wizard 3.1.4 IP Address This Internet Connection Wizard screen allows you to configure your IP address. The settings here correspond to the SETUP > Set IP Address screen (see Section 5.2 on page 54). A fixed IP address is a static IP that your ISP gives you. An automatic (dynamic) IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
Chapter 3 Internet Connection Wizard 3.1.5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings. Figure 14 Internet Connection Wizard > Complete Launch your web browser and navigate to www.zyxel.com. If if everything was configured properly, the web page should display. You can now surf the Internet! Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator.
CHAPTER 4 VoIP Connection Wizard 4.1 Overview This chapter shows you how to use the wizard to set up your voice account(s). The WiMAX Modem has Voice over IP (VoIP) communication capabilities that allow you to use a traditional analog telephone to make Internet calls. You can configure the WiMAX Modem to use up to two SIP based VoIP accounts. 4.2 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard.
Chapter 4 VoIP Connection Wizard 4.2.1 First Voice Account Settings This VoIP Connection Wizard screen allows you to configure your voice account. The settings here correspond to the VOICE > Service Configuration > SIP Setting screen (see Section 11.2 on page 113 for more information).
Chapter 4 VoIP Connection Wizard After you enter your voice account settings and click Next, the WiMAX Modem attempts to register your SIP account with the SIP server. Figure 17 VoIP Connection > SIP Registration Test This screen displays if SIP account registration fails. Check your WiMAX connection using the WiMAX Link and Strength Indicator LEDs on the front of the WiMAX Modem, then wait a few seconds and click Register Again.
Chapter 4 VoIP Connection Wizard 4.2.2 Setup Complete Click Close to complete and save the VoIP Connection settings or Run Setup Wizard Again to configure your Internet Connection settings. Figure 19 VoIP Connection > Finish This screen displays if your SIP account registration was successful.
P ART II Basic Screens The Main Screen (38) The Setup Screens (53) 51
52
CHAPTER 5 The Setup Screens 5.1 Overview Use these screens to configure or view LAN, DHCP Client and WAN settings. 5.1.1 What You Can Do in This Chapter • The Set IP Address screen (Section 5.2 on page 54) lets you configure the WiMAX Modem’s IP address and subnet mask. • The Time Setting screen (Section 5.3 on page 55) lets you configure your WiMAX Modem’s time and date keeping settings. 5.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter.
Chapter 5 The Setup Screens Time A network protocol for retrieving the current time from a server. The computer issuing the command compares the time on its clock to the information returned by the server, adjusts itself automatically for time zone differences, then calculates the difference and corrects itself if there has been any temporal drift. NTP NTP stands for Network Time Protocol.
Chapter 5 The Setup Screens 5.3 Time Setting Click SETUP > Time Setting to set the date, time, and time zone for the WiMAX Modem. Figure 21 SETUP > Time Setting The following table describes the labels in this screen. Table 10 SETUP > DHCP Client LABEL DESCRIPTION Current Time and Date Current Time Displays the current time according to the WiMAX Modem. Current Date Displays the current time according to the WiMAX Modem.
Chapter 5 The Setup Screens Table 10 SETUP > DHCP Client (continued) LABEL DESCRIPTION Time Zone Setup Time Zone Select the time zone at your location. Daylight Savings Select this if your location uses daylight savings time. Daylight savings is a period from late spring to early fall when many places set their clocks ahead of normal local time by one hour to give more daytime light in the evening. Start Date Enter which hour on which day of which week of which month daylightsavings time starts.
P ART III Advanced Screens The LAN Configuration Screens (59) The WAN Configuration Screens (71) The VPN Transport Screens (83) The NAT Configuration Screens (93) The System Configuration Screens (101) 57
58
CHAPTER 6 The LAN Configuration Screens 6.1 Overview Use the ADVANCED > LAN Configuration screens to set up the WiMAX Modem on the LAN. You can configure its IP address and subnet mask, DHCP services, and other subnets. You can also control how the WiMAX Modem sends routing information using RIP. A Local Area Network (LAN) is a shared communication system to which many computers are attached.
Chapter 6 The LAN Configuration Screens DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a networking device before you can access it. DHCP A DHCP (Dynamic Host Configuration Protocol) server can assign your WiMAX Modem an IP address, subnet mask, DNS and other routing information when it’s turned on. 6.
Chapter 6 The LAN Configuration Screens Table 12 ADVANCED > LAN Configuration > DHCP Setup (continued) LABEL DESCRIPTION First, Second and Third DNS Server Specify the IP addresses of a maximum of three DNS servers that the network can use. The WiMAX Modem provides these IP addresses to DHCP clients. You can specify these IP addresses two ways. From ISP - provide the DNS servers provided by the ISP on the WAN port. User Defined - enter a static IP address.
Chapter 6 The LAN Configuration Screens The following table describes the labels in this screen. Table 13 ADVANCED > LAN Configuration > Static DHCP LABEL DESCRIPTION # The number of the item in this list. MAC Address Enter the MAC address of the computer to which you want the WiMAX Modem to assign the same IP address. IP Address Enter the IP address you want the WiMAX Modem to assign to the computer. Apply Click to save your changes. Reset Click to restore your previously saved settings. 6.
Chapter 6 The LAN Configuration Screens Table 14 ADVANCED > LAN Configuration> IP Alias (continued) LABEL RIP Direction Use this field to control how much routing information the WiMAX Modem sends and receives on the subnet. • None - The WiMAX Modem does not send or receive routing information on the subnet. • Both - The WiMAX Modem sends and receives routing information on the subnet. • In Only - The WiMAX Modem only receives routing information on the subnet.
Chapter 6 The LAN Configuration Screens 6.5 IP Static Route Click ADVANCED > LAN Configuration > IP Static Route to look at the static routes configured in the WiMAX Modem. A The first static route is the default route and cannot be modified or deleted. Figure 25 Advanced> LAN Configuration > IP Static Route The following table describes the icons in this screen. Table 15 Advanced> LAN Configuration > IP Static Route ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item.
Chapter 6 The LAN Configuration Screens 6.5.1 IP Static Route Setup Click an Edit icon in ADVANCED > LAN Configuration > IP Static Route to edit a static route in the WiMAX Modem. Figure 26 Advanced> LAN Configuration > IP Static Route Setup The following table describes the labels in this screen. Table 17 Management > Static Route > IP Static Route > Edit User’s Guide LABEL DESCRIPTION Route Name Enter the name of the static route. Active Select this if you want the static route to be used.
Chapter 6 The LAN Configuration Screens 6.6 Other Settings Click ADVANCED > LAN Configuration > Other Settings to set the RIP and Multicast options. Figure 27 ADVANCED > LAN Configuration > Advanced The following table describes the labels in this screen. Table 18 ADVANCED > LAN Configuration > Other Settings LABEL DESCRIPTION RIP & Multicast Setup 66 RIP Direction Use this field to control how much routing information the WiMAX Modem sends and receives on the subnet.
Chapter 6 The LAN Configuration Screens 6.7 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 6.7.1 IP Address and Subnet Mask Similar to the way houses on a street share a common street name, computers on a LAN share one common network number. Where you obtain your network number depends on your particular situation.
Chapter 6 The LAN Configuration Screens 6.7.3 LAN TCP/IP The WiMAX Modem has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. The LAN parameters of the WiMAX Modem are preset in the factory with the following values: • IP address of 192.168.100.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 32 client IP addresses starting from 192.168.1.33. These parameters should work for the majority of installations.
Chapter 6 The LAN Configuration Screens • In Only - the WiMAX Modem will not send any RIP packets but will accept all RIP packets received. • Out Only - the WiMAX Modem will send out RIP packets but will not accept any RIP packets received. • None - the WiMAX Modem will not send any RIP packets and will ignore any RIP packets received. The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Modem sends (it recognizes both formats when receiving).
Chapter 6 The LAN Configuration Screens 70 User’s Guide
CHAPTER 7 The WAN Configuration Screens 7.1 Overview Use the ADVANCED > WAN Configuration screens to set up your WiMAX Modem’s Wide Area Network (WAN) or Internet features. A Wide Area Network (or WAN) links geographically dispersed locations to other networks or the Internet. A WAN configuration can include switched and permanent telephone circuits, terrestrial radio systems and satellite systems. 7.1.1 What You Can Do in This Chapter • The Internet Connection screen (Section 7.
Chapter 7 The WAN Configuration Screens Figure 28 WiMax: Mobile Station WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to local base stations. Numerous subscriber stations and mobile stations connect to the network through a single base station (BS), as in the following figure. Figure 29 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of meters, even under poor conditions.
Chapter 7 The WAN Configuration Screens In this figure, the dashed arrow shows the PKM (Privacy Key Management) secured connection between the mobile station and the base station, and the solid arrow shows the EAP secured connection between the mobile station, the base station and the AAA server. See the WiMAX security appendix for more details. Traffic Redirect Traffic redirect forwards WAN traffic to a backup gateway when the WiMAX Modem cannot connect to the Internet through its normal gateway.
Chapter 7 The WAN Configuration Screens 7.2 Internet Connection Click ADVANCED > WAN Configuration to set up your WiMAX Modem’s Internet settings. A Not all WiMAX Modem models have all the fields shown here. Figure 33 ADVANCED > WAN Configuration > Internet Connection The following table describes the labels in this screen.
Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION Anonymous Identity Enter the anonymous identity provided by your Internet Service Provider. Anonymous identity (also known as outer identity) is used with EAP-TTLS encryption. The anonymous identity is used to route your authentication request to the correct authentication server, and does not reveal your real user name.
Chapter 7 The WAN Configuration Screens Table 19 ADVANCED > WAN Configuration > Internet Connection > ISP Parameters for Internet Access (continued) LABEL DESCRIPTION IP Subnet Mask Enter a subnet mask in dotted decimal notation. Refer to the appendices to calculate a subnet mask If you are implementing subnetting. Gateway IP Address Specify a gateway IP address (supplied by your ISP). Apply Click to save your changes. Reset Click to restore your previously saved settings. 7.
Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 21 ADVANCED > WAN Configuration >WiMAX Configuration LABEL DESCRIPTION DL Frequency / Bandwidth These fields show the downlink frequency settings in kilohertz (kHz). Enter values in these fields to have the WiMAX Modem scan these frequencies for available channels in ascending numerical order.
Chapter 7 The WAN Configuration Screens 7.3.2 Configuring Frequency Settings You need to set the WiMAX Modem to scan one or more specific radio frequencies to find an available connection to a WiMAX base station. Use the WiMAX Frequency screen to define the radio frequencies to be searched for available wireless connections. See Section 7.3.3 on page 79 for an example of using the WiMAX Frequency screen. A It may take several minutes for the WiMAX Modem to find a connection.
Chapter 7 The WAN Configuration Screens 7.3.3 Using the WiMAX Frequency Screen In this example, your Internet service provider has given you a list of supported frequencies: 2.51, 2.525, 2.6, and 2.625. 1 In the DL Frequency [1] field, enter 2510000 (2510000 kilohertz (kHz) is equal to 2.51 gigahertz). 2 In the DL Frequency [2] field, enter 2525000. 3 In the DL Frequency [3] field, enter 2600000. 4 In the DL Frequency [4] field, enter 2625000. Leave the rest of the DL Frequency fields at zero.
Chapter 7 The WAN Configuration Screens 7.4 Traffic Redirect Click ADVANCED > WAN Configuration > Traffic Redirect to change your WiMAX Modem’s traffic redirect settings. Figure 37 ADVANCED > WAN Configuration > Traffic Redirect The following table describes the labels in this screen. Table 23 ADVANCED > WAN Configuration > Traffic Redirect LABEL DESCRIPTION Active Select this check box to have the WiMAX Modem use traffic redirect if the normal WAN connection goes down.
Chapter 7 The WAN Configuration Screens Table 23 ADVANCED > WAN Configuration > Traffic Redirect (continued) LABEL DESCRIPTION Apply Click to save your changes. Reset Click to restore your previously saved settings. 7.5 Other Settings Click ADVANCED > WAN Configuration > Other Settings to configure your DNS server, RIP, Multicast and Windows Networking settings.
Chapter 7 The WAN Configuration Screens The following table describes the labels in this screen. Table 24 ADVANCED > WAN Configuration > Advanced LABEL DESCRIPTION DNS Servers First, Second and Third DNS Server Select Obtained from ISP if your ISP dynamically assigns DNS server information (and the WiMAX Modem's WAN IP address). Use the drop-down list box to select a DNS server IP address that the ISP assigns in the field to the right. Select UserDefined if you have the IP address of a DNS server.
CHAPTER 8 The VPN Transport Screens 8.1 Overview This chapter describes the ADVANCED > VPN Transport screens, where you can configure the WiMAX Modem to allow traffic from multiple users to pass through the WiMAX network to the service provider’s router. Each user has his own personal connection to the service provider, even though there is only a single WiMAX connection. This allows the service provider to identify which user traffic comes from. VPN stands for “Virtual Private Network”.
Chapter 8 The VPN Transport Screens 8.1.1 What You Can Do in This Chapter • The General screen (Section 8.2 on page 85) lets you turn VPN transport on or off, and to set the VPN transport endpoint (your service provider’s router). • The Customer Interface screen (Section 8.3 on page 86) lets you specify which users can use which WiMAX network links. • The Ethernet Pseudowire screen (Section 8.
Chapter 8 The VPN Transport Screens 8.1.3 Before You Begin Before you start configuring your WiMAX Modem to use VPN transport, ensure that you have the following from the service provider: • The IP address or domain name of the service provider’s edge router. • Virtual circuit (VC) labels for each Ethernet Pseudowire you want to create. • Also make sure that you know the VLAN IDs (Virtual LAN IDentifiers) of the VLANs on your LAN. 8.
Chapter 8 The VPN Transport Screens 8.3 Customer Interface Customer interfaces connect data coming from your computers to Ethernet pseudowires, according to the data’s VLAN (Virtual Local Area Network) information. One customer interface is for traffic that has no tag; this is the default interface (rule 0) which cannot be deleted in the GUI. All other customer interfaces are identified by their VLAN ID.
Chapter 8 The VPN Transport Screens 8.3.2 Generic Routing Encapsulation In order to transport the VPLS traffic over the WiMAX network, the WiMAX Modem uses the Generic Routing Encapsulation (GRE) protocol. Like MPLS, GRE is a tunneling protocol that has specified endpoints. The GRE tunnel is bi-directional, and transports both LSPs. The GRE tunnel runs across the WiMAX network between the WiMAX Modem and your service provider’s router.
Chapter 8 The VPN Transport Screens The following table describes the icons in this screen. Table 26 Advanced> VPN Transport > Customer Interface ICON DESCRIPTION Edit Click to edit this item. Delete Click to delete this item. The following table describes the labels in this screen. Table 27 ADVANCED > VPN Transport > Customer Interface LABEL DESCRIPTION # The number of the item in this list. Active This icon is green if the associated interface is enabled.
Chapter 8 The VPN Transport Screens 8.3.4 Customer Interface Setup Click the Edit icon in the ADVANCED > VPN Transport > Customer Interface screen to open the Customer Interface Setup. Customer interfaces map traffic onto specific Ethernet pseudowires for transport over the WiMAX network. There is also a default customer interface for routing traffic that does not possess a VLAN tag. Figure 45 ADVANCED > VPN Transport > Customer Interface Setup The following table describes the labels in this screen.
Chapter 8 The VPN Transport Screens 8.4 Ethernet Pseudowire Because VPLS mimics a simple wired Ethernet connection to your service provider’s router, the connection between the WiMAX Modem and the peer device is known as an “Ethernet pseudowire” or “PW”. The Ethernet pseudowires use MPLS (MultiProtocol Label Switching) virtual circuit labels to define the connection.
Chapter 8 The VPN Transport Screens The following table describes the labels in this screen. Table 30 ADVANCED > VPN Transport > Ethernet Pseudowire LABEL DESCRIPTION # The number of the item in this list. Active This icon is green if the associated pseudowire is enabled. The icon is grey if the associated pseudowire is disabled. Enable or disable a pseudowire by clicking its Edit icon. MPLS VC Label Ingress This is the MPLS virtual circuit label number for traffic coming from the peer device.
Chapter 8 The VPN Transport Screens Table 31 ADVANCED > VPN Transport > Ethernet Pseudowire Setup (continued) LABEL Egress Pseudowire Description DESCRIPTION Enter the egress label number for this pseudowire. This must be the ingress label of the peer device. This should not be the egress label number of any other Ethernet pseudowire configured on the WiMAX Modem. Enter a brief (up to 31 characters) description for this pseudowire. Apply Click to save your changes.
CHAPTER 9 The NAT Configuration Screens 9.1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem. You can also enable and disable SIP, FTP, and H.323 ALG. Network Address Translation (NAT) maps a host’s IP address within one network to a different IP address in another network. For example, you can use a NAT router to map one IP address from your ISP to multiple private IP addresses for the devices in your home network. 9.1.
Chapter 9 The NAT Configuration Screens The following table describes the labels in this screen. Table 33 ADVANCED > NAT Configuration > General LABEL DESCRIPTION Enable Network Address Translation Select this if you want to use port forwarding, trigger ports, or any of the ALG. Max NAT/Firewall Session Per User When computers use peer to peer applications, such as file sharing applications, they may use a large number of NAT sessions.
Chapter 9 The NAT Configuration Screens Figure 51 Multiple Servers Behind NAT Example 9.3.1 Port Forwarding Options Click ADVANCED > NAT Configuration > Port Forwarding to look at the current portforwarding rules in the WiMAX Modem, and to enable, disable, activate, and deactivate each one. You can also set up a default server to handle ports not covered by rules. Figure 52 ADVANCED > NAT Configuration > Port Forwarding The following table describes the icons in this screen.
Chapter 9 The NAT Configuration Screens Table 35 ADVANCED > NAT Configuration > Port Forwarding (continued) LABEL DESCRIPTION Port Forwarding # The number of the item in this list. Active Select this to enable this rule. Clear this to disable this rule. Name This field displays the name of the rule. It does not have to be unique. Start Port This field displays the beginning of the range of port numbers forwarded by this rule.
Chapter 9 The NAT Configuration Screens Table 36 ADVANCED > NAT Configuration > Port Forwarding > Rule Setup (continued) LABEL DESCRIPTION Start Port End Port Enter the port number or range of port numbers you want to forward to the specified server. To forward one port number, enter the port number in the Start Port and End Port fields.
Chapter 9 The NAT Configuration Screens The following table describes the labels in this screen. Table 37 ADVANCED > NAT Configuration > Trigger Port LABEL DESCRIPTION # The number of the item in this list. Name Enter a name to identify this rule. You can use 1 - 15 printable ASCII characters, or you can leave this field blank. It does not have to be a unique name.
Chapter 9 The NAT Configuration Screens 3 The Real Audio server responds using a port number ranging between 6970-7170. 4 The WiMAX Modem forwards the traffic to Jane’s computer IP address. 5 Only Jane can connect to the Real Audio server until the connection is closed or times out. The WiMAX Modem times out in three minutes with UDP (User Datagram Protocol), or two hours with TCP/IP (Transfer Control Protocol/Internet Protocol).
Chapter 9 The NAT Configuration Screens 100 User’s Guide
CHAPTER 10 The System Configuration Screens 10.1 Overview Click ADVANCED > System Configuration to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 10.1.1 What You Can Do in This Chapter • The General screen (Section 10.2 on page 102) lets you change the WiMAX Modem’s mode, set up its system name, domain name, idle timeout, and administrator password. • The Dynamic DNS screen (Section 10.
Chapter 10 The System Configuration Screens Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name) on each individual computer, the domain name can be assigned from the WiMAX Modem via DHCP.
Chapter 10 The System Configuration Screens The following table describes the labels in this screen. Table 39 ADVANCED > System Configuration > General LABEL DESCRIPTION System Setup System Name Enter your computer's "Computer Name". This is for identification purposes, but some ISPs also check this field. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes “-” and underscores "_" are accepted.
Chapter 10 The System Configuration Screens Click ADVANCED > System Configuration > Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client. Figure 58 ADVANCED > System Configuration > Dynamic DNS The following table describes the labels in this screen. Table 40 ADVANCED > System Configuration > Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic DNS Select this to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider.
Chapter 10 The System Configuration Screens Table 40 ADVANCED > System Configuration > Dynamic DNS (continued) LABEL DESCRIPTION Dynamic DNS server auto detect IP address Select this if you want the DDNS server to update the IP address of the host name(s) automatically. Select this option when there are one or more NAT routers between the WiMAX Modem and the DDNS server.
Chapter 10 The System Configuration Screens 10.4.1 The Firmware Upload Process When the WiMAX Modem uploads new firmware, the process usually takes about two minutes. The device also automatically restarts in this time. This causes a temporary network disconnect. A Do not turn off the device while firmware upload is in progress! After two minutes, log in again, and check your new firmware version in the Status screen. You might have to open a new browser window to log in.
Chapter 10 The System Configuration Screens The following table describes the labels in this screen. Table 42 ADVANCED > System Configuration > Configuration LABEL DESCRIPTION Backup Configuration Backup Click this to save the WiMAX Modem’s current configuration to a file on your computer. Once your device is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
Chapter 10 The System Configuration Screens 10.6 Restart Click ADVANCED > System Configuration > Restart to reboot the WiMAX Modem without turning the power off. A Restarting the WiMAX Modem does not affect its configuration. Figure 61 ADVANCED > System Configuration > Restart The following table describes the labels in this screen. Table 43 ADVANCED > System Configuration > Firmware LABEL DESCRIPTION Restart Click this button to have the device perform a software restart.
P ART IV Voice Screens The Service Configuration Screens (111) The Phone Screens (125) The Phone Book Screens (133) 109
110
CHAPTER 11 The Service Configuration Screens 11.1 Overview The VOICE > Service Configuration screens allow you to set up your voice accounts and configure your QoS settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail.
Chapter 11 The Service Configuration Screens SIP Identities A SIP account uses an identity (sometimes referred to as a SIP address). A complete SIP identity is called a SIP URI (Uniform Resource Identifier). A SIP account's URI identifies the SIP account in a way similar to the way an e-mail address identifies an e-mail account. The format of a SIP identity is SIP-Number@SIP-Service-Domain. SIP Number The SIP number is the part of the SIP URI that comes before the “@” symbol.
Chapter 11 The Service Configuration Screens 11.2 SIP Settings Click VOICE > Service Configuration > SIP Setting to setup and maintain your SIP account(s) in the WiMAX Modem. Your VoIP or Internet service provider should provide you with your account information. You can also enable and disable each SIP account. Figure 62 VOICE > Service Configuration > SIP Setting The following table describes the labels in this screen.
Chapter 11 The Service Configuration Screens Table 44 VOICE > Service Configuration > SIP Setting (continued) LABEL DESCRIPTION REGISTER Server Address Enter the IP address or domain name of the SIP register server, if your VoIP service provider gave you one. Otherwise, enter the same address you entered in the SIP Server Address field. You can use up to 95 printable ASCII characters.
Chapter 11 The Service Configuration Screens Figure 63 STUN 1 B NAT C A 11.2.1.2 Outbound Proxy Your VoIP service provider may host a SIP outbound proxy server to handle all of the WiMAX Modem’s VoIP traffic. This allows the WiMAX Modem to work with any type of NAT router and eliminates the need for STUN or a SIP ALG. Turn off a SIP ALG on a NAT router in front of the WiMAX Modem to keep it from re-translating the IP address (since this is already handled by the outbound proxy server). 11.2.1.
Chapter 11 The Service Configuration Screens 11.2.1.4 MWI (Message Waiting Indication) Enable Message Waiting Indication (MWI) enables your phone to give you a message–waiting (beeping) dial tone when you have one or more voice messages. Your VoIP service provider must have a messaging system that sends message-waiting-status SIP packets as defined in RFC 3842. 11.2.1.
Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Expiration Duration Enter the number of seconds your SIP account is registered with the SIP register server before it is deleted. The WiMAX Modem automatically tries to re-register your SIP account when one-half of this time has passed. (The SIP register server might have a different expiration.
Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Active Select this if you want the WiMAX Modem to send SIP traffic to a specific NAT router. You must also configure the NAT router to forward traffic with the specified port to the WiMAX Modem. This eliminates the need for STUN or a SIP ALG. Server Address Enter the public IP address or domain name of the NAT router.
Chapter 11 The Service Configuration Screens Table 45 VOICE > Service Configuration > SIP Settings > Advanced (continued) LABEL DESCRIPTION Caller Ringing Tone Select the tone you want people to hear when they call you. See Custom Tones (IVR) on page 119 for information on how to record these tones. On Hold Enable Check this box if you want people to hear a customized recording when you put them on hold. On Hold Tone Select the tone you want people to hear when you put them on hold.
Chapter 11 The Service Configuration Screens 2 Press a number from 1301~1308 followed by the # key to delete the tone of your choice. Press 14 followed by the # key if you wish to clear all your custom tones. 3 You can continue to add, listen to, or delete tones, or you can hang up the receiver when you are done. 11.
Chapter 11 The Service Configuration Screens Table 47 VOICE > Service Configuration > QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server. Ask your network administrator, if you are not sure. Enter the VLAN ID provided by your network administrator in the field on the right. Your LAN and gateway must be configured to use VLAN tags. Otherwise, clear this field. Apply Click to save your changes.
Chapter 11 The Service Configuration Screens 11.4.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests. A SIP server responds to the SIP requests. When you use SIP to make a VoIP call, it originates at a client and terminates at a server. A SIP client could be a computer or a SIP phone. One device can act as both a SIP client and a SIP server. 11.4.3 SIP User Agent A SIP user agent can make and receive VoIP telephone calls.
Chapter 11 The Service Configuration Screens 11.4.5 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server. Redirect servers do not initiate SIP requests.
Chapter 11 The Service Configuration Screens 11.4.7 DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific perhop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the level of service desired.
CHAPTER 12 The Phone Screens 12.1 Overview Use the VOICE > Phone screens to configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the WiMAX Modem. You can also select which SIP account to use for making outgoing calls. 12.1.1 What You Can Do in This Chapter • The Analog Phone screen (Section 12.2 on page 126) lets you control which SIP accounts each phone uses. • The Common screen (Section 12.3 on page 128) lets you activate and deactivate immediate dialing.
Chapter 12 The Phone Screens • • • • • • • • A Making a Second Call Call Transfer Call Forwarding Three-Way Conference Internal Calls Caller ID CLIP (Calling Line Identification Presentation) CLIR (Calling Line Identification Restriction) To take full advantage of the supplementary phone services available though the WiMAX Modem's phone port, you may need to subscribe to the services from your VoIP service provider. 12.
Chapter 12 The Phone Screens Table 49 VOICE > Phone > Analog Phone LABEL DESCRIPTION Incoming Call apply to SIP1 Select this if you want to receive phone calls for the SIP1 account on this phone port. If you select more than one source for incoming calls, there is no way to distinguish between them when you receive phone calls. SIP2 Select this if you want to receive phone calls for the SIP2 account on this phone port.
Chapter 12 The Phone Screens Table 50 VOICE > Phone > Analog Phone > Advanced LABEL DESCRIPTION G.168 Active Select this if you want to eliminate the echo caused by the sound of your voice reverberating in the telephone receiver while you talk. Dialing Interval Select Dialing Interval Select Enter the number of seconds the WiMAX Modem should wait after you stop dialing numbers before it makes the phone call. The value depends on how quickly you dial phone numbers.
Chapter 12 The Phone Screens 12.4 Region Click VOICE > Phone > Region to maintain settings that often depend on the region of the world in which the WiMAX Modem is located. Figure 73 VOICE > Phone > Region The following table describes the labels in this screen. Table 52 VOICE > Phone > Region LABEL DESCRIPTION Region Settings Select the place in which the WiMAX Modem is located. Do not select Default.
Chapter 12 The Phone Screens 12.5.2 Europe Type Supplementary Phone Services This section describes how to use supplementary phone services with the Europe Type Call Service Mode. Commands for supplementary services are listed in the table below. After pressing the flash key, if you do not issue the sub-command before the default subcommand timeout (2 seconds) expires or issue an invalid sub-command, the current operation will be aborted.
Chapter 12 The Phone Screens 2 When you hear the dial tone, dial “*98#” followed by the number to which you want to transfer the call. to operate the Intercom. 3 After you hear the ring signal or the second party answers it, hang up the phone. European Three-Way Conference allows you to make three-way conference calls. To do so: 1 When you are on the phone talking to someone, place the flash key to put the caller on hold and get a dial tone. 2 Dial a phone number directly to make another call.
Chapter 12 The Phone Screens USA Three-Way Conference allows you to make three-way conference calls. To do so: 1 When you are making a call, press the flash key to put the call on hold and get a dial tone. 2 Dial a phone number to make a second call. 3 When the second call is answered, press the flash key to create a three-way conversation. 4 If you want to separate the three-way conference into two individual calls (one call is online, the other is on hold), press the flash key.
CHAPTER 13 The Phone Book Screens 13.1 Overview The VOICE > Phone Book screens allow you to configure the WiMAX Modem’s phone book for making VoIP calls. 13.1.1 What You Can Do in This Chapter • The Incoming Call Policy screen (Section 13.2 on page 134) lets you maintain rules for handling incoming calls. You can block, redirect, or accept them. • The Speed Dial screen (Section 13.3 on page 136) lets you add, edit, or remove speed-dial entries. 13.1.
Chapter 13 The Phone Book Screens 13.2 Incoming Call Policy Click VOICE > Phone Book > Incoming Call Policy to maintain rules for handling incoming calls. You can block, redirect, or accept them. Figure 74 VOICE > Phone Book > Incoming Call Policy The following table describes the labels in this screen. Table 55 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION Table Number Select the call-forwarding table you want to see in this screen.
Chapter 13 The Phone Book Screens Table 55 VOICE > Phone Book > Incoming Call Policy LABEL DESCRIPTION No Answer Waiting Time This field is used by the No Answer Forward to Number feature and No Answer conditions below. Enter the number of seconds the WiMAX Modem should wait for you to answer an incoming call before it considers the call is unanswered. Advanced Setup A # The number of the item in this list. Activate Select this to enable this rule. Clear this to disable this rule.
Chapter 13 The Phone Book Screens 13.3 Speed Dial Click VOICE > Phone Book > Speed Dial to add, edit, or remove speed-dial entries. You must create speed-dial entries if you want to make peer-to-peer calls or call SIP numbers that use letters. You can also create speed-dial entries for frequently-used SIP phone numbers. Figure 75 VOICE > Phone Book > Speed Dial The following table describes the icons in this screen.
Chapter 13 The Phone Book Screens Table 57 VOICE > Phone Book > Speed Dial User’s Guide LABEL DESCRIPTION Type Select Use Proxy if you want to use one of your SIP accounts to call this phone number. Select Non-Proxy (Use IP or URL) if you want to use a different SIP server or if you want to make a peer-to-peer call. In this case, enter the IP address or domain name of the SIP server or the other party in the field below. Add Click to add the new number to the list below.
Chapter 13 The Phone Book Screens 138 User’s Guide
P ART V Tools & Status Screens The Certificates Screens (141) The Firewall Screens (159) Content Filter (167) The Remote Management Screens (171) The Logs Screens (181) The UPnP Screen (195) The Status Screen (203) 139
140
CHAPTER 14 The Certificates Screens 14.1 Overview Use the TOOLS > Certificates screens to manage public key certificates on the WiMAX Modem. The WiMAX Modem can use public key certificates (also sometimes called “digital IDs”) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 14 The Certificates Screens 14.2 My Certificates Click TOOLS > Certificates > My Certificates to generate and export self-signed certificates or certification requests and import the WiMAX Modem’s CA-signed certificates. Figure 76 TOOLS > Certificates > My Certificates The following table describes the icons in this screen. Table 58 TOOLS > Certificates > My Certificates ICON DESCRIPTION Edit Click to edit this item. Import Click to import an item. Delete Click to delete this item.
Chapter 14 The Certificates Screens Table 59 TOOLS > Certificates > My Certificates (continued) User’s Guide LABEL DESCRIPTION Subject This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Chapter 14 The Certificates Screens 14.2.1 My Certificates Create Click TOOLS > Certificates > My Certificates and then the Create icon to open the My Certificates Create screen. Use this screen to have the WiMAX Modem create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request. Figure 77 TOOLS > Certificates > My Certificates > Create The following table describes the labels in this screen.
Chapter 14 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Create User’s Guide LABEL DESCRIPTION Common Name Select a radio button to identify the certificate’s owner by IP address, domain name or e-mail address. Type the IP address (in dotted decimal notation), domain name or e-mail address in the field provided. The domain name or email address is for identification purposes only and can be any string. A domain name can be up to 255 characters.
Chapter 14 The Certificates Screens Table 60 TOOLS > Certificates > My Certificates > Create LABEL DESCRIPTION CA Server Address This field applies when you select Create a certification request and enroll for a certificate immediately online. Enter the IP address (or URL) of the certification authority server. For a URL, you can use up to 511 of the following characters. a-zA-Z0-9'()+,/ :.
Chapter 14 The Certificates Screens 14.2.2 My Certificate Edit Click TOOLS > Certificates > My Certificates and then the Edit icon to view in-depth certificate information and change the certificate’s name. Figure 78 TOOLS > Certificates > My Certificates > Edit The following table describes the labels in this screen. Table 61 TOOLS > Certificates > My Certificates > Edit User’s Guide LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 14 The Certificates Screens Table 61 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 14 The Certificates Screens Table 61 TOOLS > Certificates > My Certificates > Edit LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the SHA1 algorithm. Certificate in PEM (Base-64) Encoded Format This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format.
Chapter 14 The Certificates Screens 14.3 Trusted CAs Click TOOLS > Certificates > Trusted CAs to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted. The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities.
Chapter 14 The Certificates Screens Table 64 TOOLS > Certificates > Trusted CAs (continued) User’s Guide LABEL DESCRIPTION Valid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. Valid To This field displays the date that the certificate expires.
Chapter 14 The Certificates Screens 14.3.1 Trusted CA Edit Click TOOLS > Certificates > Trusted CAs and then click the Edit icon to open the Trusted CAs screen to view in-depth certificate information and change the certificate’s name. Figure 81 TOOLS > Certificates > Trusted CAs > Edit The following table describes the labels in this screen. Table 65 TOOLS > Certificates > Trusted CAs > Edit 152 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 14 The Certificates Screens Table 65 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION Certification Path This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
Chapter 14 The Certificates Screens Table 65 TOOLS > Certificates > Trusted CAs > Edit (continued) LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the WiMAX Modem calculated using the SHA1 algorithm. Certificate in PEM (Base-64) Encoded Format This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format.
Chapter 14 The Certificates Screens The following table describes the labels in this screen. Table 66 TOOLS > Certificates > Trusted CAs Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Choose... Click to find the certificate file you want to upload. Apply Click to save your changes. Cancel Click to return to the previous screen without saving your changes. 14.
Chapter 14 The Certificates Screens A certification path is the hierarchy of certification authority certificates that validate a certificate. The WiMAX Modem does not trust a certificate if any certificate on its path has expired or been revoked. Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List).
Chapter 14 The Certificates Screens 14.4.2 Verifying a Certificate Before you import a certificate into the WiMAX Modem, you should verify that you have the correct certificate. This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates. 14.4.2.1 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms.
Chapter 14 The Certificates Screens 158 User’s Guide
CHAPTER 15 The Firewall Screens 15.1 Overview Use the TOOLS > Firewall screens to manage WiMAX Modem’s firewall security measures. Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an untrusted network.
Chapter 15 The Firewall Screens The WiMAX Modem has one Ethernet (LAN) port. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP and the World Wide Web. However, “inbound access” is not allowed (by default) unless the remote host is authorized to use a specific service. 15.
Chapter 15 The Firewall Screens • Configuring WAN or LAN & WAN access for services in the Remote MGMT screens or SMT menus. When you allow remote management from the WAN, you are actually configuring WAN-to-WAN/WiMAX Modem firewall rules. WAN-to-WAN/WiMAX Modem firewall rules are Internet to the WiMAX Modem WAN interface firewall rules. The default is to block all such traffic.
Chapter 15 The Firewall Screens The following table describes the labels in this screen. Table 67 TOOLS > Firewall > Firewall Setting LABEL DESCRIPTION Enable Firewall Select this to activate the firewall. The WiMAX Modem controls access and protects against Denial of Service (DoS) attacks when the firewall is activated. Bypass Triangle Route Select this if you want to let some traffic from the WAN go directly to a computer in the LAN without passing through the WiMAX Modem.
Chapter 15 The Firewall Screens 15.3 Service Setting Click TOOLS > Firewall > Service Setting to enable service blocking, set up the date and time service blocking is effective, and to maintain the list of services you want to block. Figure 88 TOOLS > Firewall > Service Setting The following table describes the labels in this screen. Table 68 TOOLS > Firewall > Service Setting LABEL DESCRIPTION Service Setup User’s Guide Enable Services Blocking Select this to activate service blocking.
Chapter 15 The Firewall Screens Table 68 TOOLS > Firewall > Service Setting (continued) LABEL DESCRIPTION Port Number Enter the range of port numbers that defines the service. For example, suppose you want to define the Gnutella service. Select TCP type and enter a port range of 6345-6349. Add Click this to add the selected service in Available Services to the Blocked Services list. Delete Select a service in the Blocked Services, and click this to remove the service from the list.
Chapter 15 The Firewall Screens 15.4.3 The “Triangle Route” Problem A traffic route is a path for sending or receiving data packets between two Ethernet devices. You may have more than one connection to the Internet (through one or more ISPs). If an alternate gateway is on the LAN (and its IP address is in the same subnet as the WiMAX Modem’s LAN IP address), the “triangle route” (also called asymmetrical route) problem may occur. The steps below describe the “triangle route” problem.
Chapter 15 The Firewall Screens Figure 90 IP Alias 166 User’s Guide
CHAPTER 16 Content Filter 16.1 Overview Use the TOOLS > Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs. Content filtering is the ability to block certain web features or specific URL keywords. The WiMAX Modem can block web features such as ActiveX controls, Java applets, cookies and disable web proxies.
Chapter 16 Content Filter 16.2 Filter Click TOOLS > Content Filter > Filter to set up a trusted IP address, which web features are restricted, and which keywords are blocked when content filtering is effective.
Chapter 16 Content Filter The following table describes the labels in this screen. Table 69 TOOLS > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted Computer IP Address You can allow a specific computer to access all Internet resources without the restrictions you set in these screens. Enter the IP address of the trusted computer. Restrict Web Features Select the web features you want to disable.
Chapter 16 Content Filter 16.3 Schedule Click TOOLS > Content Filter > Schedule to schedule content filtering. Figure 92 TOOLS > Content Filter > Schedule The following table describes the labels in this screen. Table 70 TOOLS > Content Filter > Schedule 170 LABEL DESCRIPTION Day to Block Select which days of the week you want content filtering to be effective. Time of Day to Block Select what time each day you want content filtering to be effective.
CHAPTER 17 The Remote Management Screens 17.1 Overview Use the TOOLS > Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface. Remote management allows you to determine which services/protocols can access which WiMAX Modem interface (if any) from which computers. You may manage your WiMAX Modem from a remote location via: Table 71 Remote Management • Internet (WAN only) • ALL (LAN and WAN) • LAN only • Neither (Disable).
Chapter 17 The Remote Management Screens 17.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter. Remote Management Limitations Remote management over LAN or WAN will not work when: 1 A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service. 2 You have disabled that service in one of the remote management screens. 3 The IP address in the Secured Client IP field does not match the client IP address.
Chapter 17 The Remote Management Screens 17.2 WWW Click TOOLS > Remote Management > WWW to control HTTP access to your WiMAX Modem. Figure 93 TOOLS > Remote Management > WWW The following table describes the labels in this screen. Table 72 TOOLS > Remote Management > WWW LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number.
Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 73 TOOLS > Remote Management > Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the WiMAX Modem using this service. Secured Client IP Address Select All to allow any computer to access the WiMAX Modem using this service.
Chapter 17 The Remote Management Screens 17.5 SNMP An SNMP managed network consists of two main types of component: agents and a manager. Figure 96 SNMP Management Model An agent is a management software module that resides in a managed device (the WiMAX Modem). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions.
Chapter 17 The Remote Management Screens 17.5.1 SNMP Traps The WiMAX Modem sends traps to the SNMP manager when any of the following events occurs: Table 75 SNMP Traps TRAP # TRAP NAME DESCRIPTION 0 coldStart (defined in RFC-1215) A trap is sent after booting (power on). 1 warmStart (defined in RFC-1215) A trap is sent after booting (software reboot).
Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 76 TOOLS > Remote Management > SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests. Set Community Enter the Set community, which is the password for incoming Set requests from the management station.
Chapter 17 The Remote Management Screens The following table describes the labels in this screen. Table 77 TOOLS > Remote Management > DNS LABEL DESCRIPTION Server Port This field is read-only. This field displays the port number this service uses to access the WiMAX Modem. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the WiMAX Modem using this service.
Chapter 17 The Remote Management Screens User’s Guide 179
Chapter 17 The Remote Management Screens 180 User’s Guide
CHAPTER 18 The Logs Screens 18.1 Overview Use the TOOLS > Logs screens to look at log entries and alerts and to configure the WiMAX Modem’s log and alert settings. For a list of log messages, see Section 18.4 on page 187. 18.1.1 What You Can Do in This Chapter • The View Logs screen (Section 18.2 on page 183) lets you look at log entries and alerts. • The Log Settings screen (Section 18.
Chapter 18 The Logs Screens A traffic log summarizes the session's type, when it started and stopped the amount of traffic that was sent and received and so on. An external log analyzer can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs.
Chapter 18 The Logs Screens 18.2 View Logs Click TOOLS > Logs > View Log to look at log entries and alerts. Alerts are written in red. Figure 100 TOOLS > Logs > View Logs Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order. The small triangle next to a column header indicates how the table is currently sorted (pointing downward is descending; pointing upward is ascending). The following table describes the labels in this screen.
Chapter 18 The Logs Screens Table 81 TOOLS > Logs > View Logs (continued) 184 LABEL DESCRIPTION Destination This field lists the destination IP address and the port number of the incoming packet. In many cases, some or all of this information may not be available. Note This field displays additional information about the log entry.
Chapter 18 The Logs Screens 18.3 Log Settings Click TOOLS > Logs > Log Settings to configure where the WiMAX Modem sends logs and alerts, the schedule for sending logs, and which logs and alerts are sent or recorded.
Chapter 18 The Logs Screens The following table describes the labels in this screen. Table 82 TOOLS > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e-mail logs and alerts. Leave this field blank if you do not want to send logs or alerts by e-mail. Mail Subject Enter the subject line used in e-mail messages the WiMAX Modem sends.
Chapter 18 The Logs Screens 18.4 Log Message Descriptions The following tables provide descriptions of example log messages. Table 83 System Error Logs LOG MESSAGE DESCRIPTION WAN connection is down. The WAN connection is down. You cannot access the network through this interface. %s exceeds the max. number of session per host! This attempt to create a NAT session exceeds the maximum number of NAT session table entries allowed to be created per host.
Chapter 18 The Logs Screens Table 85 Access Control Logs LOG MESSAGE DESCRIPTION Firewall default policy: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched the default policy and was blocked or forwarded according to the default policy’s setting.
Chapter 18 The Logs Screens Table 86 TCP Reset Logs (continued) LOG MESSAGE DESCRIPTION Exceed MAX incomplete, sent TCP RST The router sent a TCP reset packet when the number of incomplete connections (TCP and UDP) exceeded the userconfigured threshold. (Incomplete count is for all TCP and UDP connections through the firewall.
Chapter 18 The Logs Screens Table 89 PPP Logs (continued) LOG MESSAGE DESCRIPTION ppp:LCP Closing The PPP connection’s Link Control Protocol stage is closing. ppp:IPCP Closing The PPP connection’s Internet Protocol Control Protocol stage is closing. Table 90 UPnP Logs LOG MESSAGE DESCRIPTION UPnP pass through Firewall UPnP packets can pass through the firewall.
Chapter 18 The Logs Screens Table 92 Attack Logs (continued) User’s Guide LOG MESSAGE DESCRIPTION land [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land attack. land ICMP (type:%d, code:%d) The firewall detected an ICMP land attack. ip spoofing - WAN [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The firewall detected an IP spoofing attack on the WAN port.
Chapter 18 The Logs Screens Table 93 Remote Management Logs LOG MESSAGE DESCRIPTION Remote Management: FTP denied Attempted use of FTP service was blocked according to remote management settings. Remote Management: TELNET denied Attempted use of TELNET service was blocked according to remote management settings. Remote Management: HTTP or UPnP denied Attempted use of HTTP or UPnP service was blocked according to remote management settings.
Chapter 18 The Logs Screens Table 94 ICMP Notes (continued) TYPE CODE DESCRIPTION 0 Time to live exceeded in transit 1 Fragment reassembly time exceeded Parameter Problem 12 0 Pointer indicates the error Timestamp 13 0 Timestamp request message Timestamp Reply 14 0 Timestamp reply message Information Request 15 0 Information request message Information Reply 16 0 Information reply message Table 95 SIP Logs LOG MESSAGE DESCRIPTION SIP Registration Success by SIP:SIP Phone Number The list
Chapter 18 The Logs Screens Table 97 FSM Logs: Caller Side LOG MESSAGE DESCRIPTION VoIP Call Start Ph[Phone Port Number] <- Outgoing Call Number Someone used a phone connected to the listed phone port to initiate a VoIP call to the listed destination. VoIP Call Established Ph[Phone Port] -> Outgoing Call Number Someone used a phone connected to the listed phone port to make a VoIP call to the listed destination.
CHAPTER 19 The UPnP Screen 19.1 Overview Use the TOOLS > UPnP screen to enable the WiMAX Modem’s UPnP feature. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use. 19.1.
Chapter 19 The UPnP Screen Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention.
Chapter 19 The UPnP Screen 19.3 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter. 19.3.1 Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start > Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….
Chapter 19 The UPnP Screen Figure 105 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 19.3.1.1 Auto-discover Your UPnP-enabled Network Device in Windows XP This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the WiMAX Modem. Make sure the computer is connected to a LAN port of the WiMAX Modem. Turn on your computer and the WiMAX Modem.
Chapter 19 The UPnP Screen 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 107 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings.
Chapter 19 The UPnP Screen Figure 109 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 110 System Tray Icon 7 Double-click on the icon to display your current Internet connection status.
Chapter 19 The UPnP Screen 19.3.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the WiMAX Modem without finding out the IP address of the WiMAX Modem first. This becomes helpful if you do not know the IP address of the WiMAX Modem. Follow the steps below to access the web configurator: 1 Click Start and then Control Panel. 2 Double-click Network Connections. 3 Select My Network Places under Other Places.
Chapter 19 The UPnP Screen 6 Right-click on the icon for your WiMAX Modem and select Properties. A properties window displays with basic information about the WiMAX Modem.
CHAPTER 20 The Status Screen 20.1 Overview Use this screen to view a complete summary of your WiMAX Modem connection status. 20.2 Status Screen Click the STATUS icon in the navigation bar to go to this screen, where you can view the current status of the device, system resources, interfaces (LAN and WAN), and SIP accounts. You can also register and un-register SIP accounts as well as view detailed information from DHCP and statistics from WiMAX, VoIP, bandwidth management, and traffic.
Chapter 20 The Status Screen The following tables describe the labels in this screen. Table 101 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen. Refresh Now Click this to update this screen immediately. Device Information System Name This field displays the WiMAX Modem system name. It is used for identification. You can change this in the ADVANCED > System Configuration > General screen’s System Name field.
Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION WiMAX State This field displays the status of the WiMAX Modem’s current connection. • INIT: the WiMAX Modem is starting up. • DL_SYN: The WiMAX Modem is unable to connect to a base station. • RANGING: the WiMAX Modem and the base station are transmitting and receiving information about the distance between them.
Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION Memory Usage This field displays what percentage of the WiMAX Modem’s memory is currently used. The higher the memory usage, the more likely the WiMAX Modem is to slow down. Some memory is required just to start the WiMAX Modem and to run the web configurator.
Chapter 20 The Status Screen Table 101 Status (continued) LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, Click Unregister to delete the SIP account’s registration in the SIP server. This does not cancel your SIP account, but it deletes the mapping between your SIP identity and your IP address or domain name.
Chapter 20 The Status Screen The following table describes the fields in this screen. Table 102 Packet Statistics LABEL DESCRIPTION Port This column displays each interface of the WiMAX Modem. Status This field indicates whether or not the WiMAX Modem is using the interface. For the WAN interface, this field displays the port speed and duplex setting when the WiMAX Modem is connected to a WiMAX network, and Down when the WiMAX Modem is not connected to a WiMAX network.
Chapter 20 The Status Screen The following table describes the labels in this screen. Table 103 WiMAX Site Information LABEL DESCRIPTION DL Frequency [0] ~ [9] These fields show the downlink frequency settings in kilohertz (kHz). These settings determine how the WiMAX Modem searches for an available wireless connection. 20.2.3 DHCP Table Click Status > DHCP Table to open this screen.
Chapter 20 The Status Screen 20.2.4 VoIP Statistics Click Status > DHCP Table to open this screen. This read-only screen shows SIP registration information, status of calls and VoIP traffic statistics. These settings can be configured in the VOICE > Service Configuration > SIP Setting screen. Figure 119 VoIP Statistics Each field is described in the following table. Table 105 VoIP Statistics LABEL DESCRIPTION SIP Status Port This column displays each SIP account in the WiMAX Modem.
Chapter 20 The Status Screen Table 105 VoIP Statistics User’s Guide LABEL DESCRIPTION Hook This field indicates whether the phone is on the hook or off the hook. On - The phone is hanging up or already hung up. Off - The phone is dialing, calling, or connected. Status This field displays the current state of the phone call. N/A - There are no current VoIP calls, incoming calls or outgoing calls being made. DIAL - The callee’s phone is ringing. RING - The phone is ringing for an incoming VoIP call.
Chapter 20 The Status Screen 20.2.5 WiMAX Profile Click Status > WiMAX Profile to open this screen. This read-only screen displays information about the security settings you are using. To configure these settings, go to the ADVANCED > WAN Configuration > Internet Connection screen. A Not all WiMAX Modem models have all the fields shown here. Figure 120 WiMAX Profile The following table describes the labels in this screen.
Chapter 20 The Status Screen Table 106 The WiMAX Profile Screen (continued) User’s Guide LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method. Once a secure EAP-TTLS connection is established, the inner EAP is the protocol used to exchange security information between the mobile station, the base station and the AAA server to authenticate the mobile station. See the WiMAX security appendix for more details.
Chapter 20 The Status Screen 214 User’s Guide
P ART VI Troubleshooting and Specifications Troubleshooting (217) Product Specifications (223) 215
216
CHAPTER 21 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • • • • • Power, Hardware Connections, and LEDs WiMAX Modem Access and Login Internet Access Phone Calls and VoIP Reset the WiMAX Modem to Its Factory Defaults 21.1 Power, Hardware Connections, and LEDs u The WiMAX Modem does not turn on. None of the LEDs turn on.
Chapter 21 Troubleshooting 21.2 WiMAX Modem Access and Login u I forgot the IP address for the WiMAX Modem. 1 The default IP address is http://192.168.100.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the WiMAX Modem by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 21 Troubleshooting Advanced Suggestions • Try to access the WiMAX Modem using another service, such as Telnet. If you can access the WiMAX Modem, check the remote management settings and firewall rules to find out why the WiMAX Modem does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/ ETHERNET port. u I can see the Login screen, but I cannot log in to the WiMAX Modem. 1 Make sure you have entered the user name and password correctly.
Chapter 21 Troubleshooting the values are correct. If the values are incorrect, enter the correct frequency settings in the ADVANCED > WAN Configuration > WiMAX Configuration screen. If you are unsure of the correct values, contact your service provider. 5 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP.
Chapter 21 Troubleshooting u The Internet connection disconnects. 1 Check your WiMAX link and signal strength using the WiMAX Link and Strength Indicator LEDs on the device. 2 Contact your ISP if the problem persists. 21.4 Phone Calls and VoIP u The telephone port won’t work or the telephone lacks a dial tone. 1 Check the telephone connections and telephone wire. 2 Make sure you have the VOICE > Service Configuration > SIP Settings screen properly configured (Chapter 11 on page 111).
Chapter 21 Troubleshooting 21.5 Reset the WiMAX Modem to Its Factory Defaults If you reset the WiMAX Modem, you lose all of the changes you have made. The WiMAX Modem re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. u You will lose all of your changes when you push the Reset button. To reset the WiMAX Modem, 1 Make sure the Power LED is on and not blinking. 2 Press and hold the Reset button for five to ten seconds.
CHAPTER 22 Product Specifications This chapter gives details about your WiMAX Modem’s hardware and firmware features.
Chapter 22 Product Specifications Table 108 Radio Specifications (continued) Data Rate Download: Maximum 20 Mbps Average 6 Mbps Upload: Maximum 4 Mbps Average 3 Mbps Modulation QPSK (uplink and downlink) 16-QAM (uplink and downlink) 64-QAM (downlink only) Output Power 27dBm with external antennas attached Duplex mode Time Division Duplex (TDD) Security PKMv2 EAP CCMP, 128-bit AES Table 109 Firmware Specifications 224 FEATURE DESCRIPTION Web-based Configuration and Management Tool Also known
Chapter 22 Product Specifications Table 109 Firmware Specifications (continued) FEATURE DESCRIPTION DHCP DHCP (Dynamic Host Configuration Protocol) allows the individual clients (computers) to obtain the TCP/IP configuration at start-up from a centralized DHCP server. Your device has built-in DHCP server capability enabled by default. It can assign IP addresses, an IP default gateway and DNS servers to DHCP clients.
Chapter 22 Product Specifications Table 110 Standards Supported (continued) 226 STANDARD DESCRIPTION RFC 1349 Type of Service Protocol RFC 1706 DNS NSAP Resource Records RFC 1889 Real-time Transport Protocol (RTP) RFC 1890 Real-time Transport Control Protocol (RTCP) RFC 2030 Simple Network Time Protocol RFC 2104 HMAC: Keyed-Hashing for Message Authentication RFC 2131 Dynamic Host Configuration Protocol RFC 2401 Security Architecture for the Internet Protocol RFC 2409 Internet Key Excha
Chapter 22 Product Specifications Table 111 Voice Features User’s Guide Call Park and Pickup Call park and pickup lets you put a call on hold (park) and then continue the call (pickup). The caller must still pay while the call is parked. When you park the call, you enter a number of your choice (up to eight digits), which you must enter again when you pick up the call. If you do not enter the correct number, you cannot pickup the call.
Chapter 22 Product Specifications Table 111 Voice Features SIP ALG Your device is a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass through NAT for devices behind it (such as a SIP-based VoIP software application on a computer). Other Voice Features SIP version 2 (Session Initiating Protocol RFC 3261) SDP (Session Description Protocol RFC 2327) RTP (RFC 1889) RTCP (RFC 1890) Voice codecs (coder/decoders) G.711, G.726, G.
P ART VII Appendices and Index WiMAX Security (231) Setting Up Your Computer’s IP Address (235) Pop-up Windows, JavaScripts and Java Permissions (259) IP Addresses and Subnetting (267) Importing Certificates (277) SIP Passthrough (301) Common Services (303) Legal Information (307) Customer Support (311) 229
230
APPENDIX A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a user’s identity and level of authorization.
Appendix A WiMAX Security • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your base station acts as a message relay between the MS/SS and the network RADIUS server.
Appendix A WiMAX Security Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA). In a WiMAX network, the process of security association has three stages. • Authorization request and reply The MS/SS presents its public certificate to the base station. The base station verifies the certificate and sends an authentication key (AK) to the MS/SS.
Appendix A WiMAX Security 234 User’s Guide
APPENDIX B Setting Up Your Computer’s IP Address A Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 121 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon. Figure 122 Windows XP: Control Panel 3 Right-click Local Area Connection and then select Properties.
Appendix B Setting Up Your Computer’s IP Address Figure 123 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 125 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 126 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 127 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 129 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 130 Windows Vista: Network and Sharing Center A 240 During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 132 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 133 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 134 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 135 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 136 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Figure 137 Mac OS X 10.4: Network Preferences > Ethernet Click Apply Now and close the window.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 139 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 140 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 141 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address Figure 142 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 143 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default Ubuntu 8 installation. A Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 146 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 147 Ubuntu 8: Network Settings > Connections 5 The Properties dialog box opens.
Appendix B Setting Up Your Computer’s IP Address Figure 148 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. A Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 153 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 154 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 155 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 156 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 157 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address 258 User’s Guide
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). A Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 160 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 161 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 163 Internet Options: Security 2 3 4 5 6 262 Click the Custom Level... button. Scroll down to Scripting.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 164 Security Settings - Java Scripting Java Permissions 1 2 3 4 5 From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
Appendix C Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 167 Mozilla Firefox: TOOLS > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 266 User’s Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 169 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Appendix D IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 116 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.
Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 171 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.100.127 with mask 255.255.255.
Appendix D IP Addresses and Subnetting Table 117 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.100.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 118 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix D IP Addresses and Subnetting Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix D IP Addresses and Subnetting Table 123 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.0 (/24) 256 254 9 255.255.255.128 (/25) 512 126 10 255.255.255.192 (/26) 1024 62 11 255.255.255.224 (/27) 2048 30 12 255.255.255.240 (/28) 4096 14 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.
Appendix D IP Addresses and Subnetting You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.
Appendix D IP Addresses and Subnetting Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets. In the following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks.
APPENDIX E Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 175 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix E Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 178 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix E Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 180 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 181 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 183 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 185 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 187 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 189 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 191 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 192 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 196 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 198 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 199 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 200 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 202 Firefox 2: Certificate Manager 4 In the Delete Web Site Certificates dialog box, click OK. Figure 203 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences. Figure 206 Opera 9: Tools Menu 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 208 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 210 Opera 9: Install authority certificate 6 Next, click OK. Figure 211 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 212 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 214 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. A 296 There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 215 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 216 Konqueror 3.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 218 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 219 Konqueror 3.
Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 221 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 222 Konqueror 3.
Appendix E Importing Certificates 300 User’s Guide
APPENDIX F SIP Passthrough Enabling/Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN. If you want to use STUN with a SIP client device (a SIP phone or IP phone for example) behind the WiMAX Modem, use the ip alg disable ALG_SIP command to turn off the SIP ALG. Signaling Session Timeout Most SIP clients have an “expire” mechanism indicating the lifetime of signaling sessions.
Appendix F SIP Passthrough 302 User’s Guide
APPENDIX G Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix G Common Services Table 124 Commonly Used Services (continued) 304 NAME PROTOCOL PORT(S) DESCRIPTION FTP TCP TCP 20 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protocol. HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce.
Appendix G Common Services Table 124 Commonly Used Services (continued) User’s Guide NAME PROTOCOL PORT(S) DESCRIPTION RTSP TCP/UDP 554 The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet. SFTP TCP 115 Simple File Transfer Protocol. SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another.
Appendix G Common Services 306 User’s Guide
APPENDIX H Legal Information Copyright Copyright © 2008 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix H Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Appendix H Legal Information Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix H Legal Information 310 User’s Guide
APPENDIX I Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http:// www.zyxel.com/web/contact_us.php). Please have the following information ready when you contact an office. Required Information • • • • Product model and serial number. Warranty Information.
Appendix I Customer Support • Address: 1005F, ShengGao International Tower, No.137 XianXia Rd., Shanghai • Web: http://www.zyxel.cn Costa Rica • • • • • • Support E-mail: soporte@zyxel.co.cr Sales E-mail: sales@zyxel.co.cr Telephone: +506-2017878 Fax: +506-2015098 Web: www.zyxel.co.cr Regular Mail: ZyXEL Costa Rica, Plaza Roble Escazú, Etapa El Patio, Tercer Piso, San José, Costa Rica Czech Republic • • • • • E-mail: info@cz.zyxel.com Telephone: +420-241-091-350 Fax: +420-241-091-359 Web: www.zyxel.
Appendix I Customer Support Germany • • • • • • Support E-mail: support@zyxel.de Sales E-mail: sales@zyxel.de Telephone: +49-2405-6909-69 Fax: +49-2405-6909-99 Web: www.zyxel.de Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen, Germany Hungary • • • • • • Support E-mail: support@zyxel.hu Sales E-mail: info@zyxel.hu Telephone: +36-1-3361649 Fax: +36-1-3259100 Web: www.zyxel.hu Regular Mail: ZyXEL Hungary, 48, Zoldlomb Str.
Appendix I Customer Support Malaysia • • • • • • Support E-mail: support@zyxel.com.my Sales E-mail: sales@zyxel.com.my Telephone: +603-8076-9933 Fax: +603-8076-9833 Web: http://www.zyxel.com.my Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia North America • • • • • • • Support E-mail: support@zyxel.com Support Telephone: +1-800-978-7222 Sales E-mail: sales@zyxel.
Appendix I Customer Support Singapore • • • • • • Support E-mail: support@zyxel.com.sg Sales E-mail: sales@zyxel.com.sg Telephone: +65-6899-6678 Fax: +65-6899-8887 Web: http://www.zyxel.com.sg Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy #03-28, Singapore 609930 Spain • • • • • • Support E-mail: support@zyxel.es Sales E-mail: sales@zyxel.es Telephone: +34-902-195-420 Fax: +34-913-005-345 Web: www.zyxel.
Appendix I Customer Support Turkey • • • • • Support E-mail: cso@zyxel.com.tr Telephone: +90 212 222 55 22 Fax: +90-212-220-2526 Web: http:www.zyxel.com.tr Address: Kaptanpasa Mahallesi Piyalepasa Bulvari Ortadogu Plaza N:14/13 K:6 Okmeydani/Sisli Istanbul/Turkey Ukraine • • • • • • Support E-mail: support@ua.zyxel.com Sales E-mail: sales@ua.zyxel.com Telephone: +380-44-247-69-78 Fax: +380-44-494-49-32 Web: www.ua.zyxel.com Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str.
Index Index A AAA 72–73 AbS 115 accounting server see AAA ACK message 121 activity 72 Advanced Encryption Standard see AES AES 233 ALG 99, 225, 228 alternative subnet mask notation 270 analysis-by-synthesis 115 antenna 223 Application Layer Gateway see ALG authentication 43, 72, 75, 231 inner 233 key server 72 types 233 authorization 231 request and reply 233 server 72 auto dial 227 auto-discovery UPnP 198 B base station see BS BS 71–72 links 72 BYE request 121 C CA 141, 155 and certificates 156 call Us
Index comfort noise 125 generation 225 contact information 311 copyright 307 CoS 124 counter mode see CCMP country code 227 coverage area 71 cryptography 231 customer support 311 E EAP 73 echo cancellation 125, 225 encryption 231–233 traffic 233 environmental specifications 223 Ethernet 223 encapsulation 94 Europe type call service mode 130 Extensible Authorization Protocol see EAP D F data 231–233 decryption 231 encryption 231 flow 233 rate 224 device name 196 DHCP 60, 102, 103, 225 client 102, 225 rela
Index IEEE 802.16 71, 231 IEEE 802.16e 71 IEEE 802.1Q VLAN 120 IGD 1.
Index services 125 physical specifications 223 pickup 227 PKMv2 43, 73, 75, 231, 233 plain text encryption 233 point-to-point calls 228 power 223 output 224 supply 223 Privacy Key Management see PKM private key 231 product registration 309 proxy server SIP 122 public certificate 233 public key 43, 75, 231 Public-Key Infrastructure (PKI) 156 public-private key pairs 141, 155 pulse code modulation 115 Q QoS 227 Quality of Service 227 see QoS quick dialing 228 R RADIUS 72, 231 Message Types 232 Messages 232
Index user agent 122 version 2 228 SNMP 172 manager 175 sound quality 115 specifications physical and environmental 223 speed dial 133 SS 71, 72 stateful inspection 164 storage humidity 223 storage temperature 223 STUN 115, 123 subnet 267 mask 268 subnetting 270 subscriber station see SS supplementary phone services 125 syntax conventions 4 system timeout 172 T tampering TCP/IP configuration 60 TDD 224 TEK 233 temperature 223 TFTP restrictions 172 three-way conference 131, 132 TLS 43, 75, 231 transport en
Index access 71 standard 71 wireless security 224, 231 wizard setup 41 322 User’s Guide
ZyXEL MAX-206M2 Описание ф мл ни дит нл н з 2 мин ты Д т в в м Характеристики Отзывы з л т з з любым д бным б м нии з в ии Д т в и гл л жб т чн я дд ж и л т вин и тзывы ции и ид и