P-2812HNU-51c Dual WAN VDSL2 IAD with 802.11n Wireless Default Login Details IP Address 192.168.1.1 User Name Admin account: admin User account: user Password Admin account: 1234 User account: user www.zyxel.com Firmware Version 1.02 Edition 1, 06/2010 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the P-2812HNU-51c using the web configurator. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. • Support Disc Refer to the included CD for support documents.
About This User's Guide • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product. • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The P-2812HNU-51c may be referred to as the “P-2812HNU-51c”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The P-2812HNU51c icon is not an exact representation of your device.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Safety Warnings 8 P-2812HNU-51c User’s Guide
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 21 Introducing the P-2812HNU-51c ............................................................................................... 23 Tutorials ..................................................................................................................................... 33 Introducing the Web Configurator ..........................
Contents Overview 10 P-2812HNU-51c User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 2.4 How to Allow Out-of-band Remote Management from the WAN ......................................... 60 2.4.1 Configuring Multiple WAN Connections ..................................................................... 60 2.4.2 Configuring Remote Management ............................................................................. 70 2.4.3 Testing the Connection ...............................................................................................
Table of Contents Chapter 6 LAN Setup.............................................................................................................................. 137 6.1 Overview ............................................................................................................................ 137 6.1.1 What You Can Do in this Chapter ............................................................................ 137 6.2 What You Need To Know ........................................................
Table of Contents 8.4 The Trigger Port Screen .................................................................................................... 187 8.4.1 Trigger Port Configuration ....................................................................................... 190 8.5 The DMZ Host Screen ....................................................................................................... 192 8.6 The ALG Screen ....................................................................................
Table of Contents 11.6.2 Mac OS 10.5 and 10.6 ........................................................................................... 248 11.7 P-2812HNU-51c Print Server Compatible USB Printers .................................................. 252 Chapter 12 IPSec VPN.............................................................................................................................. 253 12.1 Overview ............................................................................................
Table of Contents 14.4 The Trusted CA Screen ................................................................................................... 289 14.4.1 View Trusted CA Certificate ................................................................................... 291 14.4.2 Import Trusted CA Certificate ................................................................................. 292 Chapter 15 Static Route ...........................................................................................
Table of Contents 19.7 The QoS Monitor Screen ................................................................................................ 323 19.8 Technical Reference ........................................................................................................ 324 Chapter 20 Dynamic DNS Setup ............................................................................................................. 329 20.1 Overview ........................................................................
Table of Contents Chapter 24 Interface Group ..................................................................................................................... 353 24.1 Overview .......................................................................................................................... 353 24.1.1 What You Can Do in this Chapter .......................................................................... 353 24.2 The Interface Group Screen .....................................................
Table of Contents 29.4 The 802.1ag Screen ........................................................................................................ 381 29.5 The OAM Ping Test Screen ............................................................................................. 383 Chapter 30 Troubleshooting.................................................................................................................... 385 30.1 Power, Hardware Connections, and LEDs .........................................
Table of Contents 20 P-2812HNU-51c User’s Guide
P ART I User’s Guide 21
CHAPTER 1 Introducing the P-2812HNU-51c 1.1 Overview The P-2812HNU-51c is a VDSL2 Integrated Access Device (IAD) that combines a VDSL2+ router with Voice over IP (VoIP) communication capabilities. You may access the Internet in one of these ways: • You can have super-fast, secure Internet access over analog (POTS) telephone lines. The P-2812HNU-51c supports both Packet Transfer Mode (PTM) and Asynchronous Transfer Mode (ATM) and can be backward compatible with ADSL, ADSL2 and ADSL2+.
Chapter 1 Introducing the P-2812HNU-51c 1.2 Ways to Manage the P-2812HNU-51c Use any of the following methods to manage the P-2812HNU-51c. • Web Configurator. This is recommended for everyday management of the P2812HNU-51c using a (supported) web browser. • SNMP. The device can be monitored by an SNMP manager. See the SNMP chapter in this User’s Guide. • TR-069. This is an auto-configuration server used to remotely configure your device. 1.
Chapter 1 Introducing the P-2812HNU-51c network is blocked by default unless it is initiated from your network. This means that probes from the outside to your network are not allowed, but you can safely browse the Internet and download files. 1.4.1.1 DSL Your P-2812HNU-51c provides shared Internet access by connecting the DSL port to the DSL or MODEM jack on a splitter or your telephone jack.
Chapter 1 Introducing the P-2812HNU-51c router. This way, you can access the Internet via an Ethernet connection and still use the QoS, Firewall and VoIP functions on the P-2812HNU-51c. Figure 2 Internet Access Application: Ethernet WAN WAN LAN Bridging IPoE PPPoE Ethernet DSL 1.4.1.3 3G WAN The USB port allows you to wirelessly connect to a 3G netowk to get Internet access by attaching a 3G wireless card.
Chapter 1 Introducing the P-2812HNU-51c 1.4.2 VoIP Internet Calls You can register up to two SIP (Session Initiation Protocol) accounts and use the P-2812HNU-51c to make and receive VoIP telephone calls: Figure 4 P-2812HNU-51c’s VoIP Application A PSTN • Calls via a VoIP service provider (A) - The P-2812HNU-51c sends your call to a VoIP service provider’s SIP server which forwards your calls to either VoIP or PSTN phones. 1.4.3 USB File Sharing Use the built-in USB 2.
Chapter 1 Introducing the P-2812HNU-51c 1.4.4 Wireless Connection By default, the wireless LAN (WLAN) is enabled on the P-2812HNU-51c. IEEE 802.11a/b/g/n compliant clients can wirelessly connect to the P-2812HNU-51c to access network resources. You can set up a wireless network with WPS (WiFi Protected Setup) or manually add a client to your wireless network. Figure 6 Wireless Connection Application WLAN WAN LAN 1.4.4.
Chapter 1 Introducing the P-2812HNU-51c Note: You must activate WPS in the P-2812HNU-51c and in another wireless device within two minutes of each other. See Section 7.11.4 on page 175 for more information. 1.5 The RESET Button If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the device to reload the factory-default configuration file.
Chapter 1 Introducing the P-2812HNU-51c 1.6 LEDs (Lights) The following graphic displays the labels of the LEDs.
Chapter 1 Introducing the P-2812HNU-51c None of the LEDs are on if the P-2812HNU-51c is not receiving power. Table 1 LED Descriptions LED COLO R STATUS DESCRIPTION PWR/SYS Green On The P-2812HNU-51c is receiving power and ready for use. Blinking The P-2812HNU-51c is self-testing. On The P-2812HNU-51c detected an error while self-testing, or there is a device malfunction. Off The P-2812HNU-51c is not receiving power. On A SIP account is registered for the phone port.
Chapter 1 Introducing the P-2812HNU-51c Table 1 LED Descriptions LED WLAN/ WPS COLO R STATUS DESCRIPTION Green On The wireless network is activated and is operating in IEEE 802.11b/g mode. Blinking The P-2812HNU-51c is communicating with other wireless clients. Orange Blinking Off DSL Green Green The wireless network is not activated. On The ADSL line is up. Blinking The P-2812HNU-51c is initializing the ADSL line. Orange On INTERNET The P-2812HNU-51c is setting up a WPS connection.
CHAPTER 2 Tutorials 2.1 Overview This chapter describes: • How to Set up a Wireless Network on page 33. • How to Use ATM QoS with Multiple PVCs and Interface Groups on page 43. • How to Allow Out-of-band Remote Management from the WAN on page 60. Note: The tutorials featured in this chapter require a basic understanding of connecting to and using the Web Configurator on your P-2812HNU-51c. For details, see the included Quick Start Guide.
Chapter 2 Tutorials 2.2.2 Configuring the AP Follow the steps below to configure the wireless settings on your AP. 1 Open the Network > Wireless LAN screen in the AP’s web configurator. Figure 8 AP: Wireless LAN 34 2 Make sure the Active Wireless LAN check box is selected. 3 Enter “SSID_Example3” as the SSID and select Auto to have the P-2812HNU-51c automatically determine a channel which is not used by another AP.
Chapter 2 Tutorials 5 Click the Advanced Setup tab and select 802.11b/g/n Mixed in the 802.11 Mode field. Click Apply. Figure 9 AP: Wireless LAN > Advanced Setup 6 Open the Status screen.Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status.
Chapter 2 Tutorials 7 Click the WLAN Station List hyperlink in the AP’s Status screen. You can see if any wireless client has connected to the AP. Figure 11 AP: Status: WLAN Station List 2.2.3 Configuring the Wireless Client This section describes how to connect the wireless client to a network. 2.2.3.1 Connecting to a Wireless LAN The following sections show you how to join a wireless network using the ZyXEL utility, as in the following diagram.
Chapter 2 Tutorials This example illustrates how to manually connect your wireless client to an access point (AP) which is configured for WPA-PSK security and connected to the Internet. Before you connect to the access point, you must know its Service Set IDentity (SSID) and WPA-PSK pre-shared key. In this example, the SSID is “SSID_Example3” and the pre-shared key is “ThisismyWPA-PSKpre-sharedkey”.
Chapter 2 Tutorials 3 When you try to connect to an AP with security configured, a window will pop up prompting you to specify the security settings. Enter the pre-shared key and leave the encryption type at the default setting. Use the Next button to move on to the next screen. You can use the Back button at any time to return to the previous screen, or the Exit button to return to the Site Survey screen. Figure 13 ZyXEL Utility: Security Settings 4 The Confirm Save window appears.
Chapter 2 Tutorials 5 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection. Check the network information in the Link Info screen to verify that you have successfully connected to the selected network.
Chapter 2 Tutorials 1 Open the ZyXEL utility and click the Profile tab to open the screen shown next. Click Add to configure a new profile. Figure 16 ZyXEL Utility: Profile 2 The Add New Profile screen appears. The wireless client automatically searches for available wireless networks, which are displayed in the Scan Info box. Click on Scan if you want to search again. You can also configure your profile for a wireless network that is not in the list.
Chapter 2 Tutorials 4 Choose the same encryption method as the AP to which you want to connect (In this example, WPA-PSK). Figure 18 ZyXEL Utility: Profile Security 5 This screen varies depending on the encryption method you selected in the previous screen. Enter the pre-shared key and leave the encryption type at the default setting. Figure 19 ZyXEL Utility: Profile Encryption 6 In the next screen, leave both boxes checked. Figure 20 Profile: Wireless Protocol Settings.
Chapter 2 Tutorials 7 Verify the profile settings in the read-only screen. Click Save to save and go to the next screen. Figure 21 Profile: Confirm Save 8 Click Activate Now to use the new profile immediately. Otherwise, click the Activate Later button. If you clicked Activate Later, you can select the profile from the list in the Profile screen and click Connect to activate it. Note: Only one profile can be activated and used at any given time.
Chapter 2 Tutorials 2.3 How to Use ATM QoS with Multiple PVCs and Interface Groups Note: Voice traffic will not be affected by the user-defined QoS settings on the P2812HNU-51c. It always gets the highest priority. The P-2812HNU-51c allows you to have more than one PVC using the ATM layer-2 interface. You can apply different ATM QoS settings to traffic through different PVCs.
Chapter 2 Tutorials 2 Create interface groups in the Advanced Setup > Interface Group screen to map logical LAN groups to the PVCs you created. See Figure 2.3.2 on page 53. 3 Configure IP addresses for devices in each interface group using the Network > LAN screen. See Figure 2.3.3 on page 57. 2.3.1 Configuring PVCs Follows the steps below to set up two PVCs on the P-2812HNU-51c.
Chapter 2 Tutorials 3 Enter the VPI and VCI values (0 and 33 in this example) for PVC 1. Select CBR in the Service Category field and set the Peak Cell Rate as 943 (divide the bandwidth 400000 bps by 424). Click Apply/Save to save the changes and go back to the Layer 2 Interface screen. 4 Click Add to configure another PVC. 5 Enter the VPI and VCI values (0 and 34 in this example) for PVC 2. Select Non Realtime VBR in the Service Category field.
Chapter 2 Tutorials 6 46 Click Apply/Save to save the changes and go back to the Layer 2 Interface screen.
Chapter 2 Tutorials 2.3.1.1 Internet Connection Settings for PVC 1 1 Click Network > WAN > Internet Connection to configure WAN connection settings for PVC 1. Click Add. 2 Select PVC 1 (atm1/0_0_33) as the layer-2 interface. Click Next. 3 Select PPP over Ethernet and click Next.
Chapter 2 Tutorials 48 4 Enter the user name (user@isp.net for example), password (qwert12345 for example) and service name (isp.net for example) for the PPP connection. Click Next. 5 Remove the existing interfaces in the Selected Default Gateway Interfaces list. Select and move a WAN interface (ppp1 in this example) to the Selected Default Gateway Interfaces list to use that interface as the default gateway. Click Next.
Chapter 2 Tutorials 6 Select the first option. Remove the existing interfaces in the Selected DNS Server Interfaces list. Select and move a WAN interface (ppp1 in this example) to the Selected DNS Server Interfaces list to use that interface as the system DNS server. Click Next. 7 The summary screen displays. Click Apply/Save to save your changes and go back to the Internet Connection screen.
Chapter 2 Tutorials 2.3.1.2 Internet Connection Settings for PVC 2 50 1 Click Add in the WAN > Internet Connection screen to configure WAN connection settings for PVC 2. 2 Select PVC 2 (atm2/0_0_34) as the layer-2 interface. Click Next. 3 Select IP over Ethernet and click Next.
Chapter 2 Tutorials 4 Select Obtain an IP address automatically and click Next. 5 Select Enable NAT and Full Cone NAT, then click Next.
Chapter 2 Tutorials 52 6 Select and move the WAN interface (atm2 in this example) to the Selected Default Gateway Interfaces list to use that interface as the default gateway. Click Next. 7 Select the first option. Select and move the WAN interface (atm2 in this example) to the Selected DNS Server Interfaces list to use that interface as the system DNS server. Click Next.
Chapter 2 Tutorials 8 The summary screen displays. Click Apply/Save to save your changes and go back to the Internet Connection screen. 9 The Internet Connection screen should look like the following. 2.3.2 Setting Interface Groups This part shows examples of creating multiple networks groups with the WAN services that you have configured in the previous section.
Chapter 2 Tutorials Follow the steps below to map traffic from LAN 1 to PVC 1 and traffic from LAN 2 and LAN 3 to PVC 2. Table 4 DSL Connection Groups GROUP LAN IP ADDRESS LAN INTERFACE WAN INTERFACE GR1 192.168.2.x LAN1 ppp1 (0/33) GR2 192.168.3.x LAN2, LAN3 atm2 (0/34) Note: Before configuring interface groups, make sure you are connected to LAN 4 which will not be in a group other than the default group.
Chapter 2 Tutorials 2 Enter GR1 as the Group Name. In this group, we will associate ppp1 (PVC 1) as the WAN interface with LAN1 as the LAN interface. Select pppoe_0_0_33/ppp1 from the WAN Interface list. Select LAN1 from the Available LAN Interfaces list and click <- to add it to the Grouped LAN Interfaces. Click Apply to finish the settings and go back to the Interface Group screen. 3 GR1 has been added successfully to the interface group list. Click Add to create another interface group: GR2.
Chapter 2 Tutorials 4 56 Enter GR2 as the Group Name. In this group, we will associate atm2 (PVC 2) as the WAN interface with LAN2 and LAN3 as the LAN interfaces. Select ipoe_0_0_34/atm2 from the WAN Interface list. Select LAN2 and LAN3 from the Available LAN Interfaces list and click <- to add them to the Grouped LAN Interfaces. Click Apply to finish the settings and go back to the Interface Group screen.
Chapter 2 Tutorials 5 GR2 has been added successfully to the interface group list. The screen should look like the following. 2.3.3 Configuring Interface Group IP Follow the steps below to configure the P-2812HNU-51c’s LAN IP address and DHCP settings for each group.
Chapter 2 Tutorials 1 58 Click Network > LAN. Select GR1 from the GroupName drop-down list. The IP Address (192.168.2.1) and IP Subnet Mask (255.255.255.0) are obtained automatically. Select Active DHCP and DHCP Server to have the ZyXEL Device act as the DHCP server for the network. Click Apply to save your changes.
Chapter 2 Tutorials 2 Select GR2 from the GroupName drop-down list. The IP Address (192.168.3.1) and IP Subnet Mask (255.255.255.0) are obtained automatically. Select Active DHCP and DHCP Server to have the ZyXEL Device act as the DHCP server for the network. Click Apply when you finish the settings. 2.3.4 Testing the DSL Connection Groups To test if the connection groups are successfully configured, you can do the following: connect your computer to LAN1 of the P-2812HNU-51c.
Chapter 2 Tutorials automatically. If you can access Internet by using this DSL connection, GR2 is successfully configured. 2.4 How to Allow Out-of-band Remote Management from the WAN This tutorial shows you how to set up a dedicated WAN connection for ISP management of the P-2812HNU-51c and prevent the clients on the LAN from configuring the P-2812HNU-51c. You set up two DSL connections with different VLAN IDs and priorities to separate clients traffic from management traffic.
Chapter 2 Tutorials 2 By default, there is a PTM layer-2 interface in VLAN MUX mode configured already on the P-2812HNU-51c. DSL Connection for Internet Access 1 Go to the WAN > Internet Connection screen. Click Add. 2 Select ptm0/(0_0_1) as the layer-2 interface. Click Next.
Chapter 2 Tutorials 3 62 Select PPP over Ethernet, enter a descriptive service name (Internet in this example), and set the priority level to 2 and VLAN ID to 200. Click Next.
Chapter 2 Tutorials 4 Enter the user name (user@isp.net for example), password (qwert12345 for example) and service name (isp.net for example) for the PPP connection. Click Next. 5 Remove the existing interfaces in the Selected Default Gateway Interfaces list. Select and move a WAN interface (ppp1.200 in this example) to the Selected Default Gateway Interfaces list to use that interface as the default gateway. Click Next.
Chapter 2 Tutorials 64 6 Select the first option. Remove the existing interfaces in the Selected DNS Server Interfaces list. Select and move a WAN interface (ppp1.200 in this example) to the Selected DNS Server Interfaces list to use that interface as the system DNS server. Click Next. 7 The summary screen displays. The VLAN ID is appended to the service name you specified automatically. Click Apply/Save to save your changes and go back to the Internet Connection screen.
Chapter 2 Tutorials DSL Connection for Remote Management 1 Go to the WAN > Internet Connection screen. Click Add. 2 Select ptm0/(0_0_1) as the layer-2 interface. Click Next.
Chapter 2 Tutorials 66 3 Select IP over Ethernet, enter a descriptive service name (RemoteMgmt in this example), and set the priority level to 7 and VLAN ID to 300. Click Next. 4 Select Obtain an IP address automatically and click Next.
Chapter 2 Tutorials 5 Make sure Enable NAT is not selected and click Next. 6 Keep the WAN interface (ptm0.300 in this example) in the Available Routed WAN Interfaces list to not have the clients use this interface as the default gateway. Click Next.
Chapter 2 Tutorials 68 7 Select the first option. Keep the WAN interface (ptm0.300 in this example) in the Available WAN Interfaces list to not have the clients use this interface as the system DNS server. Click Next. 8 The summary screen displays. Click Apply/Save to save your changes and go back to the Internet Connection screen. The VLAN ID is appended to the service name you specified automatically.
Chapter 2 Tutorials 9 The Internet Connection screen should look like the following. DSL Connections Status 1 Go to the Status screen. Check and write down the WAN IP addresses assigned by your ISP for the WAN connections in PTM mode you configured (2 and 3 in this example). Your DSL interface status should also be Up and display the transmission rates. 2 Click the WAN Service Statistics link under More Status in the Status screen.
Chapter 2 Tutorials 3 The WAN Service Ststistics screen displays. Check if any packets are transmitted or received through the two WAN connections you just configured. 2.4.2 Configuring Remote Management Follow the steps below to not allow access to the P-2812HNU-51c from the LAN. 70 1 Click Advanced > Remote MGNT > Service Control. 2 Select the Enable option, and deselect all service options in the LAN column. Click Apply.
Chapter 2 Tutorials 2.4.3 Testing the Connection After you finish all the settings in this tutorial, you would not be able to access the web configurator from the LAN anymore. Check if you can use the WAN IP address for the RemoteMgmt WAN connection to access the P-2812HNU-51c. You should also be able to access the Internet using the computer which is connected to the P-2812HNU-51c’s LAN port.
Chapter 2 Tutorials 72 P-2812HNU-51c User’s Guide
CHAPTER 3 Introducing the Web Configurator 3.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy device setup and management via Internet browser. Use Internet Explorer 6.0 and later versions or Mozilla Firefox 3 and later versions or Safari 2.0 and later versions. The recommended screen resolution is 1024 by 768 pixels. In order to use the web configurator you need to allow: • Web browser pop-up windows from your device.
Chapter 3 Introducing the Web Configurator 4 A password screen displays. Enter the default admin user name admin and default admin password 1234. Otherwise, enter the default user name user and user password user. You cannot configure the VoIP and TR-069 settings with the user account. The password displays in non-readable characters. If you have changed the password, enter your password and click OK. Click Cancel to revert to the default password in the password field. Figure 23 Password Screen 3.
Chapter 3 Introducing the Web Configurator As illustrated above, the main screen is divided into these parts: • A - title bar • B - navigation panel • C - main window • D - status bar 3.2.1 Navigation Panel Use the menu items on the navigation panel to open screens to configure P2812HNU-51c features. The following tables describe each menu item. Table 6 Navigation Panel Summary LINK TAB Status FUNCTION This screen shows the P-2812HNU-51c’s general device and network status information.
Chapter 3 Introducing the Web Configurator Table 6 Navigation Panel Summary LINK TAB FUNCTION Trigger Port Use this screen to change your P-2812HNU-51c’s port triggering settings. DMZ Host Use this screen to configure a default server which receives packets from ports that are not specified in the Port Forwarding screen. ALG Use this screen to allow SIP sessions to pass through the P2812HNU-51c. SIP Account Use this screen to configure your P-2812HNU-51c’s Voice over IP settings.
Chapter 3 Introducing the Web Configurator Table 6 Navigation Panel Summary LINK TAB RIP QoS Use this screen to configure RIP (Routing Information Protocol) settings. General Use this screen to enable QoS and set bandwidth. Queue Setup Use this screen to configure QoS queues. Class Setup Use this screen to define a classifier. Policer Setup Use these screens to configure QoS policers. Monitor Use this screen to view QoS packets statistics.
Chapter 3 Introducing the Web Configurator Table 6 Navigation Panel Summary LINK TAB FUNCTION Diagnostic General Use this screen to test the connections to other devices. 802.1ag Use this screen to configure CFM (Connectivity Fault Management) MD (maintenance domain) and MA (maintenance association), perform connectivity tests and view test reports. OAM Ping Test These screen displays information to help you identify problems with the DSL connection. 3.2.
P ART II Technical Reference 79
CHAPTER 4 Status Screens 4.1 Overview Use the Status screens to look at the current status of the device, system resources and interfaces (LAN, WAN and WLAN). The Status screen also provides detailed information from DHCP and statistics from traffic.
Chapter 4 Status Screens 4.2 Status Screen Click Status to open this screen. Figure 25 Status Screen Each field is described in the following table. Table 7 Status Screen LABEL DESCRIPTION Refresh Interval Enter how often you want the P-2812HNU-51c to update this screen. Apply 82 Click this to update this screen immediately.
Chapter 4 Status Screens Table 7 Status Screen LABEL DESCRIPTION Device Information User Name This field displays the P-2812HNU-51c system name. It is used for identification. Click this to go to the screen where you can change it. Model Number This is the model name of your device. MAC Address This is the MAC (Media Access Control) or Ethernet address unique to your P-2812HNU-51c. Firmware Version This field displays the current version of the firmware inside the device.
Chapter 4 Status Screens Table 7 Status Screen LABEL DHCP DESCRIPTION This field displays what DHCP services the P-2812HNU-51c is providing to the LAN. Choices are: Server - The P-2812HNU-51c is a DHCP server in the LAN. It assigns IP addresses to other computers in the LAN. Relay - The P-2812HNU-51c acts as a surrogate DHCP server and relays DHCP requests and responses between the remote server and the clients. None - The P-2812HNU-51c is not providing any DHCP services to the LAN.
Chapter 4 Status Screens Table 7 Status Screen LABEL Memory Usage DESCRIPTION This field displays what percentage of the P-2812HNU-51c’s memory is currently used. Usually, this percentage should not increase much. If memory usage does get close to 100%, the P-2812HNU-51c is probably becoming unstable, and you should restart the device. See Section 28.4 on page 376, or turn off the device (unplug the power) for a few seconds.
Chapter 4 Status Screens Table 7 Status Screen LABEL DESCRIPTION VoIP Status Click this link to view status of your VoIP usage. See Section 4.3.1 on page 94. WLAN Station List Click this link to display the MAC address(es) of the wireless stations that are currently associating with the P-2812HNU-51c. See Section 4.3.1 on page 94. LAN Statistics Click this link to view packet specific statistics on the LAN and WLAN interfaces. See Section 4.3.2 on page 95.
Chapter 4 Status Screens 4.2.1 3G Status: NeedPIN Click the NeedPIN link under Interface Status of the Status screen to access this screen. Use this screen to enter the right PIN code for your 3G card. Figure 26 Status > Need PIN The following table describes the labels in this screen. Table 8 Status > Need PIN LABEL DESCRIPTION Enter PIN code again Enter the correct PIN code (four to eight digits) for the inserted 3G card.
Chapter 4 Status Screens 4.2.2 3G Status: NeedPUK Click the NeedPUK link under Interface Status of the Status screen to access this screen. Use this screen to enter the PUK code to enable the 3G SIM card again. Figure 27 Status > Need PUK The following table describes the labels in this screen. Table 9 Status > Need PUK LABEL DESCRIPTION PUK code If you enter the PIN code incorrectly three times, the SIM card will be blocked by your ISP and you cannot use the account to access the Internet.
Chapter 4 Status Screens 4.2.3 WAN Service Statistics Click Status > WLAN Service Statistics to access this screen. Use this screen to view the WAN statistics. Figure 28 Status > WAN Service Statistics The following table describes the labels in this screen. Table 10 Status > WAN Service Statistics LABEL DESCRIPTION Interface This shows the name of the WAN interface used by this connection.
Chapter 4 Status Screens Table 10 Status > WAN Service Statistics (continued) LABEL DESCRIPTION Bytes This indicates the number of bytes received on this interface. Pkts This indicates the number of transmitted packets on this interface. Errs This indicates the number of frames with errors received on this interface. Drops This indicates the number of received packets dropped on this interface. Transmitted Bytes This indicates the number of bytes transmitted on this interface.
Chapter 4 Status Screens Table 11 Status > Route Info (continued) LABEL DESCRIPTION Flag This indicates the route status. Up: The route is up. !(Reject): The route is blocked and will force a route lookup to fail. Gateway: The route uses a gateway to forward traffic. Host: The target of the route is a host. Reinstate: The route is reinstated for dynamic routing.
Chapter 4 Status Screens 4.3 VoIP Status Click Status > VoIP Status to access this screen. Figure 30 VoIP Status Each field is described in the following table. Table 12 VoIP Status LABEL DESCRIPTION SIP Status Account This column displays each SIP account in the P-2812HNU-51c. Registration This field displays the current registration status of the SIP account. You can change this in the Status screen. Registered - The SIP account is registered with a SIP server.
Chapter 4 Status Screens Table 12 VoIP Status LABEL DESCRIPTION Last Incoming Number This field displays the last number that called the SIP account. The field is blank if no number has ever dialed the SIP account. Last Outgoing Number This field displays the last number the SIP account called. The field is blank if the SIP account has never dialed a number. Call Status Account This column displays each SIP account in the P-2812HNU-51c.
Chapter 4 Status Screens 4.3.1 WLAN Station List Click Status > WLAN Station List to access this screen. Use this screen to view the wireless stations that are currently associated to the P-2812HNU-51c. Figure 31 Status > WLAN Station List The following table describes the labels in this screen. Table 13 Status > WLAN Station List 94 LABEL DESCRIPTION MAC This field shows the MAC (Media Access Control) address of an associated wireless station.
Chapter 4 Status Screens 4.3.2 LAN Statistics Click Status > LAN Statistics to access this screen. Use this screen to view the LAN statistics. Figure 32 Status > LAN Statistics The following table describes the labels in this screen. Table 14 Status > LAN Statistics LABEL DESCRIPTION Interface This shows the LAN or WLAN interface. Received Bytes This indicates the number of bytes received on this interface. Pkts This indicates the number of transmitted packets on this interface.
Chapter 4 Status Screens Table 14 Status > LAN Statistics (continued) LABEL DESCRIPTION Set Interval Click this button to apply the new poll interval you entered in the Refresh Interval field. Stop Click Stop to stop refreshing statistics. 4.3.3 Client List DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the P-2812HNU-51c as a DHCP server or disable it.
CHAPTER 5 WAN Setup 5.1 Overview This chapter discusses the P-2812HNU-51c’s WAN screens. Use these screens to configure your P-2812HNU-51c for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks, such as a LAN (Local Area Network), and other networks, so that a computer in one location can communicate with computers in other locations. Figure 34 LAN and WAN LAN WAN Internet See Section 5.
Chapter 5 WAN Setup • The Internet Connection screen lets you view and configure the WAN settings on the P-2812HNU-51c for Internet access (Section 5.5 on page 105).
Chapter 5 WAN Setup 5.2 What You Need to Know Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider). If your ISP offers a dial-up Internet connection using PPPoE (PPP over Ethernet) or PPPoA, they should also provide a username and password (and service name) for user authentication.
Chapter 5 WAN Setup • Port Restricted Cone • Symmetric The following table summarizes how these NAT types handle outgoing and incoming packets. Read the following sections for more details and examples. Table 17 NAT Types FULL CONE Incoming Any external Packets host can send packets to the mapped external IP address and port. RESTRICTED CONE Only external hosts with an IP address to which the internal host has already sent a packet can send packets to the mapped external IP address and port.
Chapter 5 WAN Setup 5.3 Before You Begin You need to know your Internet access settings such as encapsulation and WAN IP address. Get this information from your ISP. 5.4 The Layer 2 Interface Screen The P-2812HNU-51c must have a layer-2 interface to allow users to use the DSL port or Ethernet WAN port to access the Internet. The screen varies depending on the interface type you select. Note: The ATM, PTM and Ethernet layer-2 interfaces cannot work at the same time.
Chapter 5 WAN Setup The following table describes the fields in this screen. Table 18 Layer 2 Interface LABEL DESCRIPTION Interface Select an interface for which you want to configure here. PTM: The P-2812HNU-51c uses the VDSL technology for data transmission over the DSL port. ATM: The P-2812HNU-51c uses the ADSL technology for data transmission over the DSL port. Ethernet: The P-2812HNU-51c transmits data over the Ethernet WAN port.
Chapter 5 WAN Setup 51c. You can have multiple ATM layer-2 interfaces using different VPI and/or VCI values. The screen varies depending on the interface type you select.
Chapter 5 WAN Setup The following table describes the fields in this screen. Table 19 Layer 2 Interface Configuration LABEL DESCRIPTION ATM PVC Configuration VPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit. This section is available only when you configure an ATM layer-2 interface. VPI The valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
Chapter 5 WAN Setup Table 19 Layer 2 Interface Configuration (continued) LABEL DESCRIPTION Peak Cell Rate Divide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here. This field is not available when you select UBR Without PCR. Sustainable Cell Rate The Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be transmitted. Type the SCR, which must be less than the PCR.
Chapter 5 WAN Setup To use NAT, firewall or IGMP proxy in the P-2812HNU-51c, you need to configure a WAN connection with PPPoE or IPoE. Note: When a layer-2 interface is in VLAN MUX Mode or MSC Mode, you can configure up to eight WAN services for each interface. Figure 39 Internet Connection The following table describes the labels in this screen. Table 20 Internet Connection LABEL DESCRIPTION Interface This shows the name of the interface used by this connection.
Chapter 5 WAN Setup Table 20 Internet Connection (continued) LABEL DESCRIPTION Rate This shows the maximum data rate (in Kbps) allowed for traffic sent through this connection. This displays N/A when there is no limit on transmission rate. Vlan8021p This indicates the 802.1P priority level assigned to traffic sent through this connection. This displays N/A when there is no priority level assigned. VlanMuxId This indicates the VLAN ID number assigned to traffic sent through this connection.
Chapter 5 WAN Setup 5.5.1.1 WAN Interface This screen displays when you add a new WAN connection. Figure 40 WAN Configuration: WAN Interface The following table describes the labels in this screen. Table 21 WAN Configuration: WAN Interface LABEL DESCRIPTION Select a layer 2 interface for this service Select ptm0 to use the DSL port as the WAN port and use the VDSL technology for data transmission.
Chapter 5 WAN Setup 5.5.1.2 Service Type If you set the DSL link type to PPPoA or IPoA for the ATM interface and configure a WAN connection using the ATM interface, you only need to configure the Enter Service Description field in this screen. Figure 41 WAN Configuration: Service Type Figure 42 WAN Configuration: Service Type: PPPoA or IPoA The following table describes the labels in this screen.
Chapter 5 WAN Setup Table 22 WAN Configuration: Service Type LABEL DESCRIPTION Rate Limit Enter the maximum transmission rate in Kbps for traffic sent through the WAN connection. Otherwise, leave this field blank to disable the rate limit. This field is not available for an ATM connection. Tag VLAN ID for egress packets Select this option to add the VLAN tag (specified below) to the outgoing traffic through this connection. Enter 802.1P Priority IEEE 802.
Chapter 5 WAN Setup PPPoE or PPPoA This screen displays when you select PPP over Ethernet (PPPoE) in the WAN Service Configuration screen or set the DSL link type to PPPoA for the ATM interface and configure a WAN connection using the ATM interface. Figure 43 WAN Configuration: PPPoE The following table describes the labels in this screen. Table 23 WAN Configuration: PPPoE or PPPoA LABEL DESCRIPTION PPP User Name Enter the user name exactly as your ISP assigned.
Chapter 5 WAN Setup Table 23 WAN Configuration: PPPoE or PPPoA LABEL DESCRIPTION PPPoE Service Name Type the name of your PPPoE service here. Authentication Method The P-2812HNU-51c supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms. This field is not available for a PPPoA connection. Use the drop-down list box to select an authentication protocol for outgoing calls.
Chapter 5 WAN Setup Table 23 WAN Configuration: PPPoE or PPPoA LABEL DESCRIPTION Bridge PPPoE Frames Between WAN and Local Ports Select this option to forward PPPoE packets from the WAN port to the LAN ports and from the LAN ports to the WAN port. In addition to the P-2812HNU-51c's built-in PPPoE client, you can select this to allow up to ten hosts on the LAN to use PPPoE client software on their computers to connect to the ISP via the P-2812HNU51c.
Chapter 5 WAN Setup IPoE This screen displays when you select IP over Ethernet in the WAN Service Configuration screen.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 24 WAN Configuration: IPoE LABEL DESCRIPTION Obtain an IP address automatically A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Select this if you have a dynamic IP address.
Chapter 5 WAN Setup Table 24 WAN Configuration: IPoE LABEL DESCRIPTION Obtain an IPv6 address automatically Select this option if you want to have the P-2812HNU-51c use the IPv6 prefix from the connected router’s Router Advertisement (RA) to generate an IPv6 address. Obtain an IPv6 address from DHCPv6 server Use the following Static IPv6 address Select this option if you want to get an IPv6 address from a DHCPv6 server.
Chapter 5 WAN Setup Table 25 WAN Configuration: IPoA LABEL DESCRIPTION Back Click this button to return to the previous screen. Next Click this button to continue. 5.5.1.4 NAT, IGMP Multicast and Firewall Activation The screen is available only when you select IP over Ethernet in the WAN Service Configuration screen or set the DSL link type to IPoA for the ATM interface and configure a WAN connection using the ATM interface.
Chapter 5 WAN Setup 5.5.1.5 Default Gateway The screen is not available when you select Bridging in the WAN Service Configuration screen. Figure 47 WAN Configuration: Default Gateway: PPPoE, PPPoA, IPoE or IPoA The following table describes the labels in this screen. Table 27 WAN Configuration: Default Gateway: PPPoE, PPPoA, IPoE or IPoA LABEL DESCRIPTION Selected Default Gateway Interfaces Select a WAN interface through which you want to forward the traffic.
Chapter 5 WAN Setup 5.5.1.6 DNS Server The screen is not available when you select Bridging in the WAN Service Configuration screen. Note: If you configure only one IPoA or IPoE connection using the ATM interface on the P-2812HNU-51c, you must enter the static DNS server address.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 28 WAN Configuration: DNS Server: PPPoE, PPPoA, IPoE or IPoA LABEL DESCRIPTION Select DNS Server Interface from available WAN interfaces Select this to have the P-2812HNU-51c get the DNS server addresses from the ISP automatically. Selected DNS Server Interfaces Select a WAN interface through which you want to obtain the DNS related information.
Chapter 5 WAN Setup 5.5.1.7 Configuration Summary This read-only screen shows the current WAN connection settings. Figure 49 WAN Configuration: Configuration Summary The following table describes the labels in this screen. Table 29 WAN Configuration: Configuration Summary LABEL DESCRIPTION Port / VPI / VCI This is the DSL port number, VPI and VCI for an ATM connection. This displays N/A for an Ethernet WAN conenction or not available for a PTM connection.
Chapter 5 WAN Setup Table 29 WAN Configuration: Configuration Summary LABEL DESCRIPTION Quality Of Service This shows whether QoS is active or not for this connection. IGMP Multicast This shows whether IGMP multicasting is active or not for this connection. MLD Multicast This shows whether MLD multicasting is active or not for this connection. IPv6 This shows whether IPv6 is active or not for this connection. Back Click this button to return to the previous screen.
Chapter 5 WAN Setup If the signal strength of a 3G network is too low, the 3G card may switch to an available 2.5G or 2.75G network. Refer to Section 5.7 on page 125 for a comparison between 2G, 2.5G, 2.75G and 3G wireless technologies. Figure 50 3G Backup The following table describes the labels in this screen. Table 30 3G Backup LABEL DESCRIPTION Enable 3G Backup Select this option to have the P-2812HNU-51c use the 3G connection as your WAN or a backup when the wired WAN connection fails.
Chapter 5 WAN Setup Table 30 3G Backup (continued) LABEL DESCRIPTION 3G Status This field displays: • • • • • • • • NoDevice when no 3G card is inserted, Disabled when the 3G WAN is not activated, Up when the 3G WAN connection is up, Down when the 3G connection is down, NoResponse when there is no response from the inserted 3G card, NeedPIN if the PIN code you entered in the PIN field is not the right one for the 3G card you inserted, NeedPUK if you enter the PIN (Personal Identification Number) code i
Chapter 5 WAN Setup Table 30 3G Backup (continued) LABEL DESCRIPTION Obtain an IP Address Automatically Select this option If your ISP did not assign you a fixed IP address. Use the following static IP address Select this option If the ISP assigned a fixed IP address. IP Address Enter your WAN IP address in this field if you selected Use the following static IP address. Obtain DNS info dynamically Select this to have the P-2812HNU-51c get the DNS server addresses from the ISP automatically.
Chapter 5 WAN Setup standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example RADIUS). One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection.
Chapter 5 WAN Setup LLC-based Multiplexing In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on the number of simultaneous VCs.
Chapter 5 WAN Setup ATM Traffic Classes These are the basic ATM traffic classes defined by the ATM Forum Traffic Management 4.0 Specification. Constant Bit Rate (CBR) Constant Bit Rate (CBR) provides fixed bandwidth that is always available even if no data is being sent. CBR traffic is generally time-sensitive (doesn't tolerate delay). CBR is used for connections that continuously require a specific amount of bandwidth. A PCR is specified and if traffic exceeds this rate, cells may be dropped.
Chapter 5 WAN Setup Full Cone NAT In full cone NAT, the NAT router maps all outgoing packets from an internal IP address and port to a single IP address and port on the external network. The NAT router also maps packets coming to that external IP address and port to the internal IP address and port. In the following example, the P-2812HNU-51c maps the source address of all packets sent from the internal IP address 1 and port A to IP address 2 and port B on the external network.
Chapter 5 WAN Setup send them to the server at IP address 1, port A. Packets have not been sent from 1, A to 3 or 5, so 3 and 5 cannot send packets to 1, A. Figure 53 Restricted Cone NAT Example 3 4, D 1, A 2, B 4, E 5 Port Restricted Cone NAT Port restricted cone NAT maps all outgoing packets from an internal IP address and port to a single IP address and port on the external network.
Chapter 5 WAN Setup Packets have not been sent from 1, A to 4, E or 5, so they cannot send packets to 1, A. Figure 54 Port Restricted Cone NAT Example 3, C 4, D 1, A 2, B 4, E 5 Symmetric NAT The full, restricted and port restricted cone NAT types use the same mapping for an outgoing packet’s source address regardless of the destination IP address and port.
Chapter 5 WAN Setup the example, only 3, C is allowed to send packets to 2, B and only 4, D is allowed to send packets to 2, M. Figure 55 Symmetric NAT 3, C 2, B 4, D 1, A 2, M 4, E 5, B Introduction to VLANs A Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks. Devices on a logical network belong to one group. A device can belong to more than one group.
Chapter 5 WAN Setup contains two bytes of TPID (Tag Protocol Identifier), residing within the type/ length field of the Ethernet frame) and two bytes of TCI (Tag Control Information), starts after the source address field of the Ethernet frame). The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches. If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port.
Chapter 5 WAN Setup 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The P-2812HNU-51c can get the DNS server addresses in the following ways. 134 1 The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, manually enter them in the DNS server fields.
Chapter 5 WAN Setup 3G Comparison Table See the following table for a comparison between 2G, 2.5G, 2.75G and 3G wireless technologies. Table 31 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies MOBILE PHONE AND DATA STANDARDS NAME TYPE GSM-BASED CDMA-BASED 2G Circuitswitched GSM (Global System for Mobile Communications), Personal Handy-phone System (PHS), etc. Interim Standard 95 (IS-95), the first CDMA-based digital cellular standard pioneered by Qualcomm. The brand name for IS-95 is cdmaOne.
Chapter 5 WAN Setup 136 P-2812HNU-51c User’s Guide
CHAPTER 6 LAN Setup 6.1 Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually located in one immediate area such as a building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses. LAN • See Section 6.5 on page 143 for more information on LANs. • See Appendix E on page 467 for more information on IP addresses and subnetting. 6.1.
Chapter 6 LAN Setup 6.2 What You Need To Know IP Address Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number. This is known as an Internet Protocol address. Subnet Mask The subnet mask specifies the network number portion of an IP address. Your P2812HNU-51c will compute the subnet mask automatically based on the IP address that you entered.
Chapter 6 LAN Setup DNS DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The DNS server addresses you enter when you set up DHCP are passed to the client machines along with the assigned IP address and subnet mask. 6.3 The LAN IP Screen Click Network > LAN to open the IP screen. See Section 6.5 on page 143 for background information.
Chapter 6 LAN Setup The following table describes the fields in this screen. Table 32 LAN > IP LABEL DESCRIPTION LAN TCP/IP Group Name Select the interface group for which you want to configure the LAN TCP/IP settings. See Chapter 13 on page 117 for how to create a new interface group. IP Address Enter the LAN IPv4 address you want to assign to your P-2812HNU51c in dotted decimal notation, for example, 192.168.1.1 (factory default).
Chapter 6 LAN Setup Table 32 LAN > IP LABEL Second DNS Server DESCRIPTION Enter the second DNS server IP address the P-2812HNU-51c passes to the DHCP clients. IGMP Snooping Enable IGMP Snooping Standard Mode Select this option to activate IGMP snooping. This allows the P2812HNU-51c to passively learn multicast group. Select this to have the P-2812HNU-51c forward multicast packets to a port that joins the multicast group and broadcast unknown multicast packets from the WAN to all LAN ports.
Chapter 6 LAN Setup 6.4 The LAN IPv6 Screen Click Network > LAN > IPv6 to open the IPv6 screen. See Section 5.7 on page 125 for background information about IPv6. Use this screen to configure the IPv6 settings for your P-2812HNU-51c’s LAN interface. Figure 57 LAN > IPv6 The following table describes the fields in this screen. Table 33 LAN > IPv6 LABEL DESCRIPTION IPv6 Site Prefix Configuration Type Similar to an IPv4 subnet mask, IPv6 uses an address prefix to represent the network address.
Chapter 6 LAN Setup Table 33 LAN > IPv6 LABEL DESCRIPTION Router Advertisement Setup Router advertisement is a response to a router solicitation or a periodical multicast advertisement from a router to advertise its presence and other parameters, such as IPv6 prefix and DNS information. Router solicitation is a request from a host to locate a router that can act as the default router and forward packets.
Chapter 6 LAN Setup LANs, WANs and the ZyXEL Device The actual physical connection determines whether the P-2812HNU-51c ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 58 LAN and WAN IP Addresses LAN WAN DHCP Setup DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server.
Chapter 6 LAN Setup addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT) feature of the P-2812HNU-51c.
Chapter 6 LAN Setup Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
Chapter 6 LAN Setup The following figure shows a LAN divided into subnets A and B. Figure 59 Physical Network & Partitioned Logical Networks A: 192.168.1.1 - 192.168.1.24 Ethernet Interface B: 192.168.2.1 - 192.168.2.
Chapter 6 LAN Setup 148 P-2812HNU-51c User’s Guide
CHAPTER 7 Wireless LAN 7.1 Overview This chapter describes how to perform tasks related to setting up and optimizing your wireless network, including the following. • Turning the wireless connection on or off. • Configuring a name, wireless channel and security for the network. • Using WiFi Protected Setup (WPS) to configure your wireless network. • Using a MAC (Media Access Control) address filter to restrict access to the wireless network.
Chapter 7 Wireless LAN • The WDS screen lets you set up a Wireless Distribution System, in which the P2812HNU-51c acts as a bridge with other ZyXEL access points (Section 7.8 on page 166). • The Scheduling screen lets you set the times your wireless LAN is turned off (Section 7.9 on page 167). • The Advanced Setup screen lets you change the wireless mode, and make other advanced wireless configuration changes (Section 7.10 on page 170).
Chapter 7 Wireless LAN Network Names Each network must have a name, referred to as the SSID - “Service Set IDentifier”. The “service set” is the network, so the “service set identifier” is the network’s name. This helps you identify your wireless network when wireless networks’ coverage areas overlap and you have a variety of networks to choose from. Radio Channels In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use.
Chapter 7 Wireless LAN Because of the damage that can be done by a malicious attacker, it’s not just people who have sensitive information on their network who should use security. Everybody who uses any wireless network should ensure that effective security is in place. A good way to come up with effective security keys, passwords and so on is to use obscure information that you personally will easily remember, and to enter it in a way that appears random and does not include real words.
Chapter 7 Wireless LAN 7.4 The General Screen Note: If you are configuring the P-2812HNU-51c from a computer connected to the wireless LAN and you change the P-2812HNU-51c’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the P2812HNU-51c’s new settings. Click Network > Wireless LAN to open the General screen.
Chapter 7 Wireless LAN Table 34 Network > Wireless LAN > General LABEL DESCRIPTION Bandwidth Select whether the P-2812HNU-51c uses a wireless channel width of 20MHz or 40MHz. A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300 Mbps. 40MHz (channel bonding or dual channel) bonds two adjacent radio channels to increase throughput. The wireless clients must also support 40 MHz.
Chapter 7 Wireless LAN Table 34 Network > Wireless LAN > General LABEL DESCRIPTION Apply Click this to save your changes back to the P-2812HNU-51c. Reset Click this to reload the previous configuration for this screen. 7.4.1 No Security Select No Security to allow wireless devices to communicate with the access points without any data encryption or authentication.
Chapter 7 Wireless LAN 7.4.2 WEP Encryption In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen. Select WEP from the Security Mode list. Figure 62 Wireless LAN > General: Static WEP Encryption The following table describes the wireless LAN security labels in this screen. Table 36 Network > Wireless LAN > General: Static WEP Encryption 156 LABEL DESCRIPTION Security Mode Choose WEP from the drop-down list box.
Chapter 7 Wireless LAN Table 36 Network > Wireless LAN > General: Static WEP Encryption LABEL DESCRIPTION WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. Select 64-bit or 128-bit to enable data encryption. Key 1 to Key 4 The WEP key is used to secure your data from eavesdropping by unauthorized wireless users.
Chapter 7 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 37 Wireless LAN > General: WPA(2)-PSK LABEL DESCRIPTION Auto Generate Key This field is only available for WPA-PSK. Security Mode Choose WPA-PSK or WPA2-PSK from the drop-down list box. Active Compatible This field is only available for WPA2-PSK. Select this if you want the P2812HNU-51c to support WPA-PSK and WPA2-PSK simultaneously.
Chapter 7 Wireless LAN Note: If you select WPA or WPA2 in the Wireless LAN > General screen, the WDS and WPS features are not available on the P-2812HNU-51c. Figure 64 Wireless LAN > General: WPA(2) The following table describes the wireless LAN security labels in this screen. Table 38 Wireless LAN > General: WPA(2) LABEL DESCRIPTION Security Mode Choose WPA or WPA2 from the drop-down list box. Active Compatible This field is only available for WPA2.
Chapter 7 Wireless LAN Table 38 Wireless LAN > General: WPA(2) LABEL DESCRIPTION WPA2 Preauthenticatio n This field is available only when you select WPA2. Network Re-auth Interval This field is available only when you select WPA2. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. Select Enabled to turn on preauthentication in WAP2. Otherwise, select Disabled.
Chapter 7 Wireless LAN Use this screen to change your P-2812HNU-51c’s MAC filter settings. Click the Edit button in the Wireless LAN > General screen. The following screen displays. Figure 65 Wireless LAN > MAC Filter The following table describes the labels in this screen. Table 39 Wireless LAN > MAC Filter LABEL MAC Restrict Mode DESCRIPTION Define the filter action for the list of MAC addresses in the table below. Select Disabled to turn off MAC address filtering.
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 40 Wireless LAN > MAC Filter > Add LABEL DESCRIPTION MAC Address Enter the MAC addresses of the wireless devices that are allowed or denied access to the P-2812HNU-51c in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc. Back Click this to return to the previous screen without saving changes.
Chapter 7 Wireless LAN Table 41 Network > Wireless LAN > More AP LABEL DESCRIPTION Apply Click Apply to save your changes back to the P-2812HNU-51c. Reset Click Reset to reload the previous configuration for this screen. 7.5.1 More AP Edit Use this screen to edit an SSID profile. Click the Edit icon next to an SSID in the More AP screen. The following screen displays. Figure 68 Network > Wireless LAN > More AP: Edit See Section 7.4 on page 153 for more details about the fields in this screen. 7.
Chapter 7 Wireless LAN Click Network > Wireless LAN >WPS. The following screen displays. Figure 69 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 42 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select the check box to activate WPS on the P-2812HNU-51c. PIN Number This shows the PIN (Personal Identification Number) of the P-2812HNU51c. Enter this PIN in the configuration utility of the device you want to connect to using WPS.
Chapter 7 Wireless LAN 7.7 The WPS Station Screen Use this screen to set up a WPS wireless network using either Push Button Configuration (PBC) or PIN Configuration. Note: If you select No Security in the Wireless LAN > General screen and click Push Button in the WPS Station screen, the P-2812HNU-51c automatically changes to use WPA-PSK/WPA2-PSK mixed mode and generates a preshared key. Click Network > Wireless LAN > WPS Station. The following screen displays.
Chapter 7 Wireless LAN 7.8 The WDS Screen A Wireless Distribution System (WDS) is a wireless connection between two or more APs. Use this screen to set up your WDS links between the P-2812HNU51cs. You need to know the MAC address of the peer device. Once the security settings of peer sides match one another, the connection between the devices is made. Note: You cannot use WDS when WPS is enabled or wireless security is set to “WPA" or "WPA2".
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 44 Network > Wireless LAN > WDS LABEL DESCRIPTION WDS Operating Mode Select the operating mode for your P-2812HNU-51c. • • Access Point + Bridge - The P-2812HNU-51c functions as a bridge and access point simultaneously. Wireless Bridge - The P-2812HNU-51c acts as a wireless network bridge and establishes wireless links with other APs. In this mode, clients cannot connect to the P-2812HNU-51c wirelessly.
Chapter 7 Wireless LAN Note: Using the Wireless LAN > General screen or the WPS button to turn off or on the wireless LAN has priority over wireless power-off scheduling. Figure 72 Network > Wireless LAN > Scheduling The following table describes the labels in this screen. Table 45 Network > Wireless LAN > Scheduling LABEL DESCRIPTION Wireless LAN Power Off Scheduling 168 # This field displays the index number of a rule. Active Select the check box to enable a rule.
Chapter 7 Wireless LAN 7.9.1 Adding a WLAN Power-off Scheduling Rule Use this screen to set the times your wireless LAN is turned off. To open this screen, click the Add button in the Wireless LAN > Scheduling screen. Figure 73 Network > Wireless LAN > Scheduling > Add The following table describes the labels in this screen. Table 46 Network > Wireless LAN > Scheduling > Add LABEL DESCRIPTION Rule Name Enter a descriptive name for identification purposes.
Chapter 7 Wireless LAN 7.10 The Advanced Setup Screen To configure advanced wireless settings, click Network > Wireless LAN > Advanced Setup. The screen appears as shown. Figure 74 Wireless LAN > Advanced Setup The following table describes the labels in this screen. Table 47 Wireless LAN > Advanced Setup LABEL DESCRIPTION RTS/CTS Threshold Enter a value between 0 and 2432. Fragmentation Threshold This is the maximum data fragment size that can be sent. Enter a value between 256 and 2432.
Chapter 7 Wireless LAN Table 47 Wireless LAN > Advanced Setup LABEL DESCRIPTION 802.11 Mode Select 802.11b Only to only allow IEEE 802.11b compliant WLAN devices to associate with the P-2812HNU-51c. Select 802.11g Only to allow IEEE 802.11g compliant WLAN devices to associate with the P-2812HNU-51c. IEEE 802.11b compliant WLAN devices can associate with the P-2812HNU-51c only when they use the short preamble type. Select 802.11n Only to only allow IEEE 802.
Chapter 7 Wireless LAN 7.11.1 Wireless Network Overview The following figure provides an example of a wireless network. Figure 75 Example of a Wireless Network AP A B The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your P-2812HNU-51c is the AP. Every wireless network must follow these basic guidelines.
Chapter 7 Wireless LAN 7.11.2 Additional Wireless Terms The following table describes some wireless network terms and acronyms used in the P-2812HNU-51c’s Web Configurator. Table 48 Additional Wireless Terms TERM DESCRIPTION RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not aware of each other’s presence. This may cause them to send information to the AP at the same time and result in information colliding and not getting through.
Chapter 7 Wireless LAN characters2; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each device in the wireless network, see the device’s User’s Guide or other documentation. You can use the MAC address filter to tell the P-2812HNU-51c which devices are allowed or not allowed to use the wireless network. If a device is allowed to use the wireless network, it still has to have the correct information (SSID, channel, and security).
Chapter 7 Wireless LAN The types of encryption you can choose depend on the type of authentication. (See Section 7.11.3.3 on page 174 for information about this.) Table 49 Types of Encryption for Each Type of Authentication NO AUTHENTICATION RADIUS SERVER Weakest No Security Static WEP WPA-PSK WPA Stronges t WPA2-PSK WPA2 For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2.
Chapter 7 Wireless LAN between two devices. Both devices must support WPS (check each device’s documentation to make sure). Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated.
Chapter 7 Wireless LAN Use the PIN method instead of the push-button configuration (PBC) method if you want to ensure that the connection is established between the devices you specify, not just the first two devices to activate WPS in range of each other. However, you need to log into the configuration interfaces of both devices to use the PIN method.
Chapter 7 Wireless LAN The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 76 Example WPS Process: PIN Method ENROLLEE REGISTRAR WPS This device’s WPS PIN: 123456 WPS Enter WPS PIN from other device: WPS START WPS START WITHIN 2 MINUTES SECURE EAP TUNNEL SSID WPA(2)-PSK COMMUNICATION 7.11.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role.
Chapter 7 Wireless LAN The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 77 How WPS works ACTIVATE WPS ACTIVATE WPS WITHIN 2 MINUTES WPS HANDSHAKE REGISTRAR ENROLLEE SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes). The next time you use WPS, a different device can be the registrar if necessary.
Chapter 7 Wireless LAN 7.11.4.4 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee. The registrar randomly generates the security information to set up the network, since it is unconfigured and has no existing information.
Chapter 7 Wireless LAN point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 80 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 E N TIO EC N ON GC N I T XIS AP1 REGISTRAR CLIENT 2 SE CU RIT Y ENROLLEE INF O AP2 7.11.4.5 Limitations of WPS WPS has some limitations of which you should be aware. • WPS works in Infrastructure networks only (where an AP and a wireless client communicate).
Chapter 7 Wireless LAN • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a possible way for a hacker to gain access to a network. You can easily check to see if this has happened.
CHAPTER 8 Network Address Translation (NAT) 8.1 Overview This chapter discusses how to configure NAT on the P-2812HNU-51c. Network Address Translation (NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network. 8.1.
Chapter 8 Network Address Translation (NAT) Port Forwarding A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though NAT makes your whole inside network appear as a single computer to the outside world. 8.3 The Port Forwarding Screen This summary screen provides a summary of all port forwarding rules and their configuration.
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 50 NAT Port Forwarding LABEL DESCRIPTION Service Name Select a pre-defined service from the drop-down list box. The predefined service port number(s) and protocol will display in the External port, Internal port and Protocol fields. Otherwise, select User Define to open the Rule Setup screen where you can manually enter the port number(s) and select the IP protocol.
Chapter 8 Network Address Translation (NAT) Table 50 NAT Port Forwarding (continued) LABEL DESCRIPTION Internal Start Port This is the first internal port number that identifies a service. Internal End Port This is the last internal port number that identifies a service. Server IP Address This field displays the inside IP address of the server. Modify Click the Edit icon to go to the screen where you can edit the port forwarding rule.
Chapter 8 Network Address Translation (NAT) Table 51 Port Forwarding Edit (continued) LABEL DESCRIPTION WAN Interface Select a WAN interface for which you want to configure port forwarding rules. External Start Port Enter the original destination port for the packets. To forward only one port, enter the port number again in the External End Port field. To forward a series of ports, enter the start port number here and the end port number in the External End Port field.
Chapter 8 Network Address Translation (NAT) port), the P-2812HNU-51c forwards the traffic to the LAN IP address of the computer that sent the request. After that computer’s connection for that service closes, another computer on the LAN can use the service in the same manner. This way you do not need to configure a new IP address each time you want a different LAN computer to use the application.
Chapter 8 Network Address Translation (NAT) Click NAT > Trigger Port to open the following screen. Use this screen to view and configure your P-2812HNU-51c’s trigger port settings. Figure 84 Trigger Port The following table describes the labels in this screen. Table 52 NAT Trigger Port LABEL DESCRIPTION Service Name Select a pre-defined service from the drop-down list box. The predefined service port number(s) and protocol will display in the Trigger port, Open port and Protocol fields.
Chapter 8 Network Address Translation (NAT) Table 52 NAT Trigger Port (continued) LABEL DESCRIPTION Trigger Start Port This is the first trigger port number that identifies a service. Trigger End Port This is the last trigger port number that identifies a service. Trigger Proto. This is the trigger transport layer protocol. 1 means TCP, 2 means UDP and 3 means TCP/UDP. Open Start Port This is the first open port number that identifies a service.
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 53 NAT > Port Triggering > Add LABEL DESCRIPTION Active Clear the check box to disable the rule. Select the check box to enable it. This field is not editable if you are configuring a User Define rule. Service Name Enter a name to identify this rule. This field is read-only if you click the Edit icon in the Trigger Port screen.
Chapter 8 Network Address Translation (NAT) 8.5 The DMZ Host Screen In addition to the servers for specified services, NAT supports a default server IP address. A default server receives packets from ports that are not specified in the NAT Port Forwarding Setup screen. Figure 86 NAT > DMZ Host The following table describes the fields in this screen.
Chapter 8 Network Address Translation (NAT) Use this screen to enable or disable the SIP (VoIP) ALG in the P-2812HNU-51c. To access this screen, click NAT > ALG. Figure 87 NAT > ALG Each field is described in the following table. Table 55 NAT > ALG LABEL DESCRIPTION Active SIP ALG Select this check box to allow SIP sessions to pass through the P2812HNU-51c. SIP is a signaling protocol used in VoIP (Voice over IP), the sending of voice signals over Internet Protocol.
Chapter 8 Network Address Translation (NAT) Table 56 Services and Port Numbers SERVICES PORT NUMBER SNMP trap 162 PPTP (Point-to-Point Tunneling Protocol) 1723 Port Forwarding Example Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address.
CHAPTER 9 Voice 9.1 Overview Use this chapter to: • Connect an analog phone to the P-2812HNU-51c. • Make phone calls over the Internet, as well as the regular phone network. • Configure settings such as speed dial. • Configure network settings to optimize the voice quality of your phone calls. 9.1.
Chapter 9 Voice You don’t necessarily need to use all these screens to set up your account. In fact, if your service provider did not supply information on a particular field in a screen, it is usually best to leave it at its default setting. 9.1.2 What You Need to Know About VoIP VoIP VoIP stands for Voice over IP. IP is the Internet Protocol, which is the messagecarrying standard the Internet runs on.
Chapter 9 Voice 9.2 Before You Begin • Before you can use these screens, you need to have a VoIP account already set up. If you don’t have one yet, you can sign up with a VoIP service provider over the Internet. • You should have the information your VoIP service provider gave you ready, before you start to configure the P-2812HNU-51c. 9.
Chapter 9 Voice 198 P-2812HNU-51c User’s Guide
Chapter 9 Voice Each field is described in the following table. Table 57 VoIP > SIP > SIP Account LABEL DESCRIPTION Service Provider Selection Select the SIP service provider profile you want to use for the SIP account you configure in this screen. If you change this field, the screen automatically refreshes. SIP Account Selection Select the SIP account you want to see in this screen. If you change this field, the screen automatically refreshes.
Chapter 9 Voice Table 57 VoIP > SIP > SIP Account (continued) LABEL DESCRIPTION Primary Compression Type Select the type of voice coder/decoder (codec) that you want the P2812HNU-51c to use. Secondary Compression Type Third Compression Type G.711 provides high voice quality but requires more bandwidth (64 kbps). G.711 is the default codec used by phone companies and digital handsets. • • G.711a is typically used in Europe. G.711u is typically used in North America and Japan. G.
Chapter 9 Voice Table 57 VoIP > SIP > SIP Account (continued) LABEL DESCRIPTION Call Waiting Reject Timer Specify a time of seconds that the P-2812HNU-51c waits before rejecting the second call if you do not answer it. Enable Unconditional Forward Select this if you want the P-2812HNU-51c to forward all incoming calls to the specified phone number. Enable Busy Forward Select this if you want the P-2812HNU-51c to forward incoming calls to the specified phone number if the phone port is busy.
Chapter 9 Voice Table 57 VoIP > SIP > SIP Account (continued) LABEL DESCRIPTION Warm Line Select this to have the P-2812HNU-51c dial the specified warm line number after you pick up the telephone and do not press any keys on the keypad for a period of time. Hot Line Select this to have the P-2812HNU-51c dial the specified hot line number immediately when you pick up the telephone. Hot Line / Warm Line number Enter the number of the hot line or warm line that you want the P2812HNU-51c to dial.
Chapter 9 Voice 9.4 The SIP Service Provider Screen Click VoIP > SIP > SIP Service Provider to open the SIP Service Provider screen. Use this screen to configure the SIP server information, QoS for VoIP calls, the numbers for certain phone functions, and dialing plan.
Chapter 9 Voice 204 P-2812HNU-51c User’s Guide
Chapter 9 Voice Each field is described in the following table. Table 58 VoIP > SIP > SIP Service Provider LABEL DESCRIPTION Service Provider Selection Select the SIP service provider profile you want to see in this screen. If you change this field, the screen automatically refreshes. Delete Select ADD_NEW to create a new SIP service provider profile on the P2812HNU-51c. Click this button to remove the SIP service provider profile selected in the Service Provider Selection field.
Chapter 9 Voice Table 58 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION RFC 3262 RFC 3262 defines a mechanism to provide reliable transmission of SIP provisional response messages, which convey information on the processing progress of the request. This uses the option tag 100rel and the Provisional Response ACKnowledgement (PRACK) method. Select this to have the P-2812HNU-51c include a SIP Require/ Supported header field with the option tag 100rel in all INVITE requests.
Chapter 9 Voice Table 58 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION SRTP Support When you make a VoIP call using SIP, the Real-time Transport Protocol (RTP) is used to handle voice data transfer. The Secure Real-time Transport Protocol (SRTP) is a security profile of RTP. It is designed to provide encryption and authentication for the RTP data in both unicast and multicast applications. SRTP uses the Advanced Encryption Standard (AES) cipher for data encryption.
Chapter 9 Voice Table 58 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION T.38 Fax Relay Select this if the P-2812HNU-51c should send fax messages as UDP or TCP/IP packets through IP networks. This provides better quality, but it may have inter-operability problems. The peer devices must also use T.38. QoS Tag SIP DSCP Mark Setting Enter the DSCP (DiffServ Code Point) number for SIP voice transmissions.
Chapter 9 Voice Table 58 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION Unconditional Call Forward Enable Specify the key combinations that you can enter to forward all incoming calls to the phone number you specified in the SIP > SIP Account screen. Unconditional Call Forward Disable Specify the key combinations that you can enter to turn the unconditional call forward function off.
Chapter 9 Voice Table 58 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION Immediate Dial Enable Immediate Dial Enable Select this if you want to use the pound key (#) to tell the P-2812HNU51c to make the phone call immediately, instead of waiting the number of seconds you selected in the Dialing Interval Selection field. If you select this, dial the phone number, and then press the pound key. The P-2812HNU-51c makes the call immediately, instead of waiting.
Chapter 9 Voice • indicates the number after the colon replaces the number before the colon in an angle bracket <>. For example, (<:1212> xxxxxxx) means the P-2812HNU-51c automatically prefixes the translated-number “1212” to the number you dialed before making the call. This can be used for local calls in the US. (<9:> xxx xxxxxxx) means the P-2812HNU-51c automatically removes the specified prefix “9” from the number you dialed before making the call.
Chapter 9 Voice Each field is described in the following table. Table 59 VoIP > Phone > Region LABEL DESCRIPTION Region Settings Select the place in which the P-2812HNU-51c is located. Call Service Mode Select the mode for supplementary phone services (call hold, call waiting, call transfer and three-way conference calls) that your VoIP service provider supports.
Chapter 9 Voice (the speed dial number, #01 for example) on your phone's keypad to call the phone number. Figure 92 VoIP > Phone Book > Speed Dial Each field is described in the following table. Table 60 VoIP > Phone Book > Speed Dial LABEL DESCRIPTION Speed Dial Use this section to create or edit speed-dial entries. # Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the P-2812HNU-51c to call when you dial the speed-dial number.
Chapter 9 Voice Table 60 VoIP > Phone Book > Speed Dial LABEL DESCRIPTION Modify Use this field to edit or erase the speed-dial entry. Click the Edit icon to copy the information for this speed-dial entry into the Speed Dial section, where you can change it. Click the Remove icon to erase this speed-dial entry. Clear Click this to erase all the speed-dial entries. 9.7 Call History Summary Screen The P-2812HNU-51c logs calls from or to your SIP numbers.
Chapter 9 Voice Table 61 VoIP > Call History > Call History Summary LABEL DESCRIPTION Missing Calls This displays how many incoming calls were not answered that day. Total Duration This displays how long all calls lasted that day. 9.8 Outgoing Calls Screen Use this screen to see detailed information for each outgoing call you made. Click VoIP > Call History > Outgoing Calls. The following screen displays. Figure 94 VoIP > Call History > Outgoing Calls Each field is described in the following table.
Chapter 9 Voice 9.9 Incoming Calls Screen Use this screen to see detailed information for each incoming call from someone calling you. Click VoIP > Call History > Incoming Calls. The following screen displays. Figure 95 VoIP > Call History > Incoming Calls Each field is described in the following table. Table 63 VoIP > Call History > Incoming Calls LABEL DESCRIPTION Refresh Click this button to renew the received call list.
Chapter 9 Voice VoIP VoIP is the sending of voice signals over Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail. Internet Telephony Service Provider (ITSP) companies provide VoIP service.
Chapter 9 Voice SIP Registration Each P-2812HNU-51c is an individual SIP User Agent (UA). To provide voice service, it has a public IP address for SIP and RTP protocols to communicate with other servers. A SIP user agent has to register with the SIP registrar and must provide information about the users it represents, as well as its current IP address (for the routing of incoming SIP requests).
Chapter 9 Voice protocol. In the following figure, either A or B can act as a SIP user agent client to initiate a call. A and B can also both act as a SIP user agent to receive the call. Figure 96 SIP User Agent SIP Proxy Server A SIP proxy server receives requests from clients and forwards them to another server. In the following example, you want to use client device A to call someone who is using client device C.
Chapter 9 Voice to the IP address that it received back from the redirect server. Redirect servers do not initiate SIP requests. In the following example, you want to use client device A to call someone who is using client device C. 1 Client device A sends a call invitation for C to the SIP redirect server (B). 2 The SIP redirect server sends the invitation back to A with C’s IP address (or domain name). 3 Client device A then sends the call invitation to client device C.
Chapter 9 Voice Pulse Code Modulation Pulse Code Modulation (PCM) measures analog signal amplitudes at regular time intervals and converts them into bits. SIP Call Progression The following figure displays the basic steps in the setup and tear down of a SIP call. A calls B. Table 64 SIP Call Progression A B 1. INVITE 2. Ringing 3. OK 4. ACK 5.Dialogue (voice traffic) 6. BYE 7. OK 1 A sends a SIP INVITE request to B. This message is an invitation for B to participate in a SIP telephone call.
Chapter 9 Voice The response to the request goes to all the proxy servers through which the request passed, in reverse sequence. Once the session is set up, session traffic is sent between the UAs directly, bypassing all the proxy servers in between. The following figure shows the SIP and session traffic flow between the user agents (UA 1 and UA 2) and the proxy servers (this example shows two proxy servers, PROXY 1 and PROXY 2).
Chapter 9 Voice 1 User Agent 1 sends a SIP INVITE request to Proxy 1. This message is an invitation to User Agent 2 to participate in a SIP telephone call. Proxy 1 sends a response indicating that it is trying to complete the request. 2 Proxy 1 sends a SIP INVITE request to Proxy 2. Proxy 2 sends a response indicating that it is trying to complete the request. 3 Proxy 2 sends a SIP INVITE request to User Agent 2. 4 User Agent 2 sends a response back to Proxy 2 indicating that the phone is ringing.
Chapter 9 Voice Voice Activity Detection/Silence Suppression Voice Activity Detection (VAD) detects whether or not speech is present. This lets the P-2812HNU-51c reduce the bandwidth that a call uses by not transmitting “silent packets” when you are not speaking. Comfort Noise Generation When using VAD, the P-2812HNU-51c generates comfort noise when the other party is not speaking.
Chapter 9 Voice 1 Pick up the phone and press “****” on your phone’s keypad and wait for the message that says you are in the configuration menu. 2 Press a number from 1101~1105 on your phone followed by the “#” key. 3 Play your desired music or voice recording into the receiver’s mouthpiece. Press the “#” key. 4 You can continue to add, listen to, or delete tones, or you can hang up the receiver when you are done.
Chapter 9 Voice Type of Service (ToS) Network traffic can be classified by setting the ToS (Type of Service) values at the data source (for example, at the P-2812HNU-51c) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific per-hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow.
Chapter 9 Voice 9.10.2 Phone Services Overview Supplementary services such as call hold, call waiting, and call transfer. are generally available from your VoIP service provider.
Chapter 9 Voice After pressing the flash key, if you do not issue the sub-command before the default sub-command timeout (2 seconds) expires or issue an invalid subcommand, the current operation will be aborted. Table 67 European Flash Key Commands SUBCOMMAND COMMAND DESCRIPTION Flash Put a current call on hold to place a second call. Switch back to the call (if there is no second call). Flash 0 Drop the call presently on hold or reject an incoming call which is waiting for answer.
Chapter 9 Voice • Disconnect the first call and answer the second call. Either press the flash key and press “1”, or just hang up the phone and then answer the phone after it rings. • Put the first call on hold and answer the second call. Press the flash key and then “2”. European Call Transfer Do the following to transfer an incoming call (that you have answered) to another phone. 1 Press the flash key to put the caller on hold.
Chapter 9 Voice After pressing the flash key, if you do not issue the sub-command before the default sub-command timeout (2 seconds) expires or issue an invalid subcommand, the current operation will be aborted. Table 68 USA Flash Key Commands SUBCOMMAND COMMAND Flash DESCRIPTION Put a current call on hold to place a second call. After the second call is successful, press the flash key again to have a three-way conference call. Put a current call on hold to answer an incoming call.
Chapter 9 Voice 1 When you are on the phone talking to someone (party A), press the flash key to put the caller on hold and get a dial tone. 2 Dial a phone number directly to make another call (to party B). 3 When party B answers the second call, press the flash key to create a three-way conversation. 4 Hang up the phone to drop the connection.
Chapter 9 Voice 232 P-2812HNU-51c User’s Guide
CHAPTER 10 File Sharing 10.1 Overview Share files on a USB memory stick or hard drive connected to your P-2812HNU51c with users on your network. The following figure is an overview of the P-2812HNU-51c’s file server feature. Computers A and B can access files on a USB device (C) which is connected to the P-2812HNU-51c. Figure 101 File Sharing Overview B C A • See Section 10.1.2 on page 234 for an explanation of file-sharing terms. • See Section 10.2.1 on page 237 for file-sharing examples. 10.1.
Chapter 10 File Sharing 10.1.2 What You Need to Know Workgroup name This is the name given to a set of computers that are connected on a network and share resources such as a printer or files. Windows automatically assigns the workgroup name when you set up a network. Shares When settings are set to default, each USB device connected to the P-2812HNU51c is given a folder, called a “share”.
Chapter 10 File Sharing Samba SMB is a client-server protocol used by Microsoft Windows systems for sharing files, printers, and so on. Samba is a free SMB server that runs on most Unix and Unix-like systems. It provides an implementation of an SMB client and server for use with non-Microsoft operating systems. File Transfer Protocol This is a method of transferring data from one computer to another over a network such as the Internet. 10.1.
Chapter 10 File Sharing 10.2 The File Sharing Screen Use this screen to set up file sharing via the P-2812HNU-51c. To access this screen, click USB Services > File Sharing. Figure 102 USB Services > File Sharing Each field is described in the following table. Table 70 USB Services > File Sharing LABEL DESCRIPTION Enable File Sharing Services Select this to enable file sharing through the P-2812HNU-51c. Server Configuration Host Name This displays the P-2812HNU-51c system name.
Chapter 10 File Sharing 10.2.1 Example of Accessing Your Shared Files From a Computer You can use Windows Explorer to access the file storage devices connected to the P-2812HNU-51c. Note: The example in this User’s Guide shows you how to use Microsoft’s Windows XP to browse your shared files. Refer to your operating system’s documentation for how to browse your file structure. 1 Open Windows Explorer to share files in the attached USB device using Windows Explorer browser.
Chapter 10 File Sharing 238 P-2812HNU-51c User’s Guide
CHAPTER 11 Sharing a USB Printer This chapter describes how you can share a USB printer via your P-2812HNU-51c. 11.1 Overview The P-2812HNU-51c allows you to share a USB printer on your LAN. You can do this by connecting a USB printer to one of the USB ports on the P-2812HNU-51c and then allowing the computers connected to your network to communicate with the print server (P-2812HNU-51c) using the Internet Printing Protocol. Figure 104 Sharing a USB Printer 11.1.
Chapter 11 Sharing a USB Printer 11.2 What You Need to Know Print Server This is a computer or other device which manages one or more printers, and which sends print jobs to each printer from the computer itself or other devices. Operating System An operating system (OS) is the interface which helps you manage a computer. Common examples are Microsoft Windows, Mac OS or Linux. Port A port maps a network service such as http to a process running on your computer, such as a process run by your web browser.
Chapter 11 Sharing a USB Printer Note: Your printer’s installation instructions may ask that you connect the printer to your computer. Connect your printer to the P-2812HNU-51c instead. 11.4 The Print Server Screen The print server screen is used to enable the print server function on the P2812HNU-51c and confirm that the P-2812HNU-51c and the USB printer are able to communicate successfully. Click USB Services > Print Server to display the Print Server screen.
Chapter 11 Sharing a USB Printer 11.5 Add a New Printer Using Windows This example shows how to connect a printer behind the P-2812HNU-51c to your computer using the Windows XP Professional operating system. Some menu items may look different on your operating system. 1 Click Start > Control Panel > Printers and Faxes to open the Printers and Faxes screen. Click Add a Printer. Figure 106 Printers Folder 2 The Add Printer Wizard screen displays. Click Next.
Chapter 11 Sharing a USB Printer 3 Select A network printer, or a printer attached to another computer and click Next. Figure 108 Add Printer Wizard: Local or Network Printer 4 Select Connect to a printer on the Internet or on a home or office network: and enter “http://192.168.1.1:631/printers/USB_PRINTER” as the URL to access the print server (P-2812HNU-51c). Click Next. Note: If you change the P-2812HNU-51c’s LAN IP address, use the new IP address in the URL to access the print server.
Chapter 11 Sharing a USB Printer 7 If your printer is not displayed in the list of Printers, you can insert the printer driver installation CD/disk or download the driver file to your computer, click Have Disk… and install the new printer driver. 8 Click Next to continue. Figure 110 Add Printer Wizard: Printer Model 9 Select Yes and then click the Next button if you want to use this printer as the default printer on your computer. Otherwise select No and then click Next to continue.
Chapter 11 Sharing a USB Printer 10 The following screen shows your current printer settings. Select Finish to complete adding a new printer. Figure 112 Add Printer Wizard Complete 11.6 Add a New Printer Using Macintosh OS X Complete the following steps to set up a print server driver on your Macintosh computer. 11.6.1 Mac OS 10.3 and 10.4 This example shows how to connect a printer behind the P-2812HNU-51c to your computer using Mac OS X v10.4.11.
Chapter 11 Sharing a USB Printer 12 Open the Applications folder. Figure 114 Macintosh HD Folder 13 Open the Utilities folder.
Chapter 11 Sharing a USB Printer 14 Double-click the Printer Setup Utility icon. Figure 116 Utilities Folder 15 Click the Add icon at the top of the screen. Figure 117 Printer List: Add 16 Click the IP Printer tab to set up your printer. • Press the alt key and click More Printers in the Printer Browser screen. • Select Advanced from the top drop-down list. • Select Internet Printing Protocol using HTTP from the Device dropdown list. • Enter a descriptive name for the printer in the Device Name field.
Chapter 11 Sharing a USB Printer • Select your printer manufacturer from the Printer Model drop-down list and then select a printer model. Click Add to save and close the Printer Browser configuration screen. Figure 118 Printer Browser 17 The new network printer displays in the Printer List. The default printer Name displays in bold type. Figure 119 Printer List 18 Your print server driver setup is complete. You can now use the P-2812HNU-51c’s print server to print from a Mac computer. 11.6.
Chapter 11 Sharing a USB Printer 1 Click the Finder icon on the Dock or double-click your Mac hard disk icon (Mac OS X in this example) on your desktop to open the Mac HD window. Figure 120 Mac OS X HD 2 Open the Applications folder. Figure 121 Macintosh HD Folder 3 Double-click the System Preferences icon.
Chapter 11 Sharing a USB Printer 4 Click the Print & Fax icon. Figure 123 System Preferences 5 Select the Printing tab and click the + icon to add a new printer. Figure 124 Print & Fax 6 Click the Advanced button on the Add Printer toolbar to set up your printer. If the Advanced button doesn’t appear, Ctrl-click the toolbar, select Customize Toolbar... and then drag the Advanced button onto the toolbar. • Select Internet Printing Protocol (HTTP) from the Type drop-down list.
Chapter 11 Sharing a USB Printer Note: If you change the P-2812HNU-51c’s LAN IP address, use the new IP address in the URL to access the print server. • Enter a descriptive name for the printer and where it is located. • Select your printer manufacturer from the Print Using drop-down list and then select a printer model. Click Add to save and close the Printer Browser configuration screen. Figure 125 Add Printer 7 The new network printer displays in the Printers list.
Chapter 11 Sharing a USB Printer 11.7 P-2812HNU-51c Print Server Compatible USB Printers The following is a list of USB printer models compatible with the P-2812HNU-51c print server.
CHAPTER 12 IPSec VPN 12.1 Overview A virtual private network (VPN) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing. It is used to transport traffic over the Internet or any insecure network that uses TCP/IP for communication.
Chapter 12 IPSec VPN 12.2 What You Need to Know A VPN tunnel is usually established in two phases. Each phase establishes a security association (SA), a contract indicating what security parameters the P2812HNU-51c and the remote IPSec router will use. The first phase establishes an Internet Key Exchange (IKE) SA between the P-2812HNU-51c and remote IPSec router.
Chapter 12 IPSec VPN Finding Out More See Section 12.5 on page 267 for advanced technical information on IPSec VPN. 12.2.1 Before You Begin If a VPN tunnel uses Telnet, FTP, WWW, then you should configure remote management (Remote MGMT) to allow access for that service. 12.3 The IPSec Screen The following figure helps explain the main fields in the web configurator.
Chapter 12 IPSec VPN The following table describes the fields in this screen. Table 73 Security > IPSec VPN > IPSec VPN LABEL DESCRIPTION Add Click this button to configure a new VPN policy. Enable This field displays whether the VPN policy is active or not. A yellow bulb signifies that this VPN policy is active. A gray bulb signifies that this VPN policy is not active. Connection Name This field displays the identification name for this VPN policy.
Chapter 12 IPSec VPN Note: The P-2812HNU-51c uses the system default gateway interface’s WAN IP address as its WAN IP address to set up a VPN tunnel.
Chapter 12 IPSec VPN The following table describes the fields in this screen. Table 74 Security > IPSec VPN > IPSec Setting > IKE LABEL DESCRIPTION IPSec Setting Enable Select this check box to activate this VPN policy. This option determines whether a VPN rule is applied before a packet leaves the firewall. IPSec Connection Name Type up to 60 alphanumeric characters to identify this VPN policy. You may use spaces, underscores and dashes, but the P-2812HNU-51c drops trailing spaces.
Chapter 12 IPSec VPN Table 74 Security > IPSec VPN > IPSec Setting > IKE (continued) LABEL IP Subnetmask DESCRIPTION When the remote IP address type is configured to Single Address, this field is not available. When the remote IP address type is configured to Subnet, enter a subnet mask on the network behind the remote IPSec router. Protocol This field displays ESP and the P-2812HNU-51c uses ESP (Encapsulation Security Payload) for VPN.
Chapter 12 IPSec VPN Table 74 Security > IPSec VPN > IPSec Setting > IKE (continued) LABEL DESCRIPTION Local ID Type Select IP to identify this P-2812HNU-51c by its IP address. Select DNS to identify this P-2812HNU-51c by a domain name. Select E-mail to identify this P-2812HNU-51c by an e-mail address. Select ASN1DN (Abstract Syntax Notation one - Distinguished Name) to identify the remote IPSec router by the subject field in a certificate. This is used only with certificate-based authentication.
Chapter 12 IPSec VPN Table 74 Security > IPSec VPN > IPSec Setting > IKE (continued) LABEL DESCRIPTION Integrity Algorithm Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
Chapter 12 IPSec VPN 12.3.3 Configuring Manual Key You only configure VPN manual key when you select Manual in the Key Exchange Method field on the IPSec Setting screen. This is the IPSec Setting - Manual screen as shown next.
Chapter 12 IPSec VPN The following table describes the fields in this screen. Table 75 Security > IPSec VPN > IPSec Setting > Manual LABEL DESCRIPTION IPSec Setting Enable Select this check box to activate this VPN policy. This option determines whether a VPN rule is applied before a packet leaves the firewall. IPSec Connection Name Type up to 60 alphanumeric characters to identify this VPN policy. You may use spaces, underscores and dashes, but the P-2812HNU-51c drops trailing spaces.
Chapter 12 IPSec VPN Table 75 Security > IPSec VPN > IPSec Setting > Manual (continued) LABEL IP Subnetmask DESCRIPTION When the remote IP address type is configured to Single Address, this field is not available. When the remote IP address type is configured to Subnet, enter a subnet mask on the network behind the remote IPSec router. Protocol This field displays ESP and the P-2812HNU-51c uses ESP (Encapsulation Security Payload) for VPN.
Chapter 12 IPSec VPN Table 75 Security > IPSec VPN > IPSec Setting > Manual (continued) LABEL DESCRIPTION Local ID Type Select IP to identify this P-2812HNU-51c by its IP address. Select DNS to identify this P-2812HNU-51c by a domain name. Select E-mail to identify this P-2812HNU-51c by an e-mail address. Select ASN1DN (Abstract Syntax Notation one - Distinguished Name) to identify the remote IPSec router by the subject field in a certificate. This is used only with certificate-based authentication.
Chapter 12 IPSec VPN Table 75 Security > IPSec VPN > IPSec Setting > Manual (continued) LABEL DESCRIPTION Integrity Algorithm Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
Chapter 12 IPSec VPN The following table describes the fields in this screen. Table 76 Security > IPSec VPN > Status LABEL DESCRIPTION Status This field displays whether the VPN connection is up (a yellow bulb) or down (a gray bulb). Connection Name This field displays the identification name for this VPN policy. Remote Gateway This is the static WAN IP address or URL of the remote IPSec router. Local Addresses This is the IP address of computer(s) on your local network behind your P-2812HNU-51c.
Chapter 12 IPSec VPN IPSec Algorithms The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms). The Encryption Algorithm describes the use of encryption techniques such as DES (Data Encryption Standard) and Triple DES algorithms.
Chapter 12 IPSec VPN With the use of AH as the security protocol, protection is extended forward into the IP header to verify the integrity of the entire packet by use of portions of the original IP header in the hashing process. Tunnel Mode Tunnel mode encapsulates the entire IP packet to transmit it securely. A Tunnel mode is required for gateway services to provide access to internal systems. Tunnel mode is fundamentally an IP tunnel with authentication and encryption.
Chapter 12 IPSec VPN • Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2). • Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should stay up before it times out. An IKE SA times out when the IKE SA lifetime period expires. If an IKE SA times out when an IPSec SA is already established, the IPSec SA stays connected. In phase 2 you must: • Choose an encryption algorithm.
Chapter 12 IPSec VPN value, and complain that the hash value appended to the received packet doesn't match. The VPN device at the receiving end doesn't know about the NAT in the middle, so it assumes that the data has been maliciously altered. IPSec using ESP in Tunnel mode encapsulates the entire original packet (including headers) in a new IP packet.
Chapter 12 IPSec VPN Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because the NAT router changes the header of the IPSec packet. NAT traversal solves the problem by adding a UDP port 500 header to the IPSec packet. The NAT router forwards the IPSec packet with the UDP port 500 header unchanged. In Figure 137 on page 271, when IPSec router A tries to establish an IKE SA, IPSec router B checks the UDP port 500 header, and IPSec routers A and B build the IKE SA.
Chapter 12 IPSec VPN IPSec routers that have dynamic WAN IP addresses. The P-2812HNU-51c can distinguish up to 48 incoming SAs because you can select between three encryption algorithms (DES, 3DES and AES), two authentication algorithms (MD5 and SHA1) and eight key groups when you configure a VPN rule (see Section 12.3 on page 255). The ID type and content act as an extra level of identification for incoming SAs. The type of ID can be a domain name, an IP address or an e-mail address.
Chapter 12 IPSec VPN The two P-2812HNU-51cs in this example can complete negotiation and establish a VPN tunnel. Table 81 Matching ID Type and Content Configuration Example P-2812HNU-51C A P-2812HNU-51C B Local ID type: E-mail Local ID type: IP Local ID content: tom@yourcompany.com Local ID content: 1.1.1.2 Remote ID type: IP Remote ID type: E-mail Remote ID content: 1.1.1.2 Remote ID content: tom@yourcompany.
CHAPTER 13 Firewall 13.1 Overview This chapter shows you how to enable and configure the P-2812HNU-51c firewall settings. The P-2812HNU-51c firewall is a packet filtering firewall and restricts access based on the source/destination computer network address of a packet and the type of application. 13.1.1 What You Can Do in this Chapter The Incoming screen lets you view and configure incoming IP filtering rules (Section 13.3 on page 276). 13.
Chapter 13 Firewall Some of the most common IP ports are: Table 83 Common IP Ports 21 FTP 53 DNS 23 Telnet 80 HTTP 25 SMTP 110 POP3 Default Filtering Policies Filtering rules are grouped based on the direction of travel of packets to which they apply. The default rule for incoming traffic blocks all incoming connections from the WAN to the LAN. If you wish to allow certain WAN users to have access to your LAN, you will need to create custom rules to allow it.
Chapter 13 Firewall The following table describes the labels in this screen. Table 84 Firewall > Incoming LABEL DESCRIPTION Active Firewall Select this check box to enable the firewall on the P-2812HNU-51c. When the firewall is enabled, the P-2812HNU-51c blocks all incoming traffic from the WAN to the LAN. Create custome rules below to allow certain WAN users to access your LAN or to allow traffic from the WAN to a certain computer on the LAN. Active Select this check box to enable the rule.
Chapter 13 Firewall 13.3.1 Creating Incoming Firewall Rules In the Incoming screen, click Add to display this screen and refer to the following table for information on the labels. Figure 139 Firewall > Incoming: Add The following table describes the labels in this screen. Table 85 Firewall > Incoming: Add LABEL DESCRIPTION Active Select this check box to enable the rule. Filter Name Enter a descriptive name of up to 16 printable English keyboard characters, including spaces.
Chapter 13 Firewall Table 85 Firewall > Incoming: Add (continued) LABEL DESCRIPTION Interface Select Select All to apply the rule to all interfaces on the P-2812HNU51c or select the specific WAN interface(s) to which this rule applies. Back Click Back to return to the previous screen. Apply Click Apply to save your customized settings and exit this screen.
Chapter 13 Firewall 280 P-2812HNU-51c User’s Guide
CHAPTER 14 Certificate 14.1 Overview The P-2812HNU-51c can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. 14.1.1 What You Can Do in this Chapter • The Local Certificates screen lets you generate certification requests and import the P-2812HNU-51c's CA-signed certificates (Section 14.
Chapter 14 Certificate • PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses 64 ASCII characters to convert a binary X.509 certificate into a printable form. 14.3 The Local Certificates Screen Click Security > Certificates to open the Local Certificates screen. This is the P-2812HNU-51c’s summary list of certificates and certification requests. Figure 140 Local Certificates The following table describes the labels in this screen.
Chapter 14 Certificate Table 86 Local Certificates (continued) LABEL DESCRIPTION Modify Click the View button to open a screen with an in-depth list of information about the certificate (or certification request). Click the Load Signed button to import a valid certification to replace the request. Click the Remove button to delete the certificate (or certification request). You cannot delete a certificate that one or more features is configured to use.
Chapter 14 Certificate Table 87 Create Certificate Request (continued) LABEL DESCRIPTION Organization Name Type up to 127 characters to identify the company or group to which the certificate owner belongs. You may use any character, including spaces, but the P-2812HNU-51c drops trailing spaces. State/Province Name Type up to 127 characters to identify the state or province where the certificate owner is located. You may use any character, including spaces, but the P-2812HNU-51c drops trailing spaces.
Chapter 14 Certificate Note: You must remove any spaces from the certificate’s filename before you can import it. Figure 143 Import Local Certificate The following table describes the labels in this screen. Table 88 Import Local Certificate LABEL DESCRIPTION Certificate Name Type up to 31 ASCII characters (not including spaces) to identify this certificate. Certificate Copy and paste the certificate into the text box to store it on the P-2812HNU51c.
Chapter 14 Certificate Table 88 Import Local Certificate LABEL DESCRIPTION Private Key Copy and paste the private key into the text box to store it on the P2812HNU-51c. Back Click Back to return to the previous screen. Apply Click Apply to save the certificate on the P-2812HNU-51c. 14.3.3 Certificate Details Click Security > Certificates > Local Certificates to open the My Certificates screen (see Figure 140 on page 282). Click the View icon to open the Certificate Details screen.
Chapter 14 Certificate Figure 144 Certificate Details P-2812HNU-51c User’s Guide 287
Chapter 14 Certificate The following table describes the labels in this screen. Table 89 Certificate Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this certificate. You may use any character (not including spaces). Type This field displays general information about the certificate. signed means that a Certification Authority signed the certificate.
Chapter 14 Certificate Figure 145 Load Certificate The following table describes the labels in this screen. Table 90 Load Certificate LABEL DESCRIPTION Certificate Name This field is read-only and displays the identifying name of this certificate. Certificate Copy and paste the certificate into the text box to store it on the P-2812HNU51c. Back Click Back to return to the previous screen. Apply Click Apply to save the certificate on the P-2812HNU-51c. 14.
Chapter 14 Certificate this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities. Figure 146 Trusted CA The following table describes the fields in this screen. Table 91 Trusted CA LABEL DESCRIPTION Name This field displays the name used to identify this certificate.
Chapter 14 Certificate 14.4.1 View Trusted CA Certificate Click the View button in the Trusted CA screen to open the following screen. Use this screen to view in-depth information about the certification authority’s certificate. Figure 147 Trusted CA: View The following table describes the fields in this screen. Table 92 Trusted CA: View LABEL DESCRIPTION Name This field displays the identifying name of this certificate. Type This field displays general information about the certificate.
Chapter 14 Certificate 14.4.2 Import Trusted CA Certificate Click the Import Certificate button in the Trusted CA screen to open the following screen. The P-2812HNU-51c trusts any valid certificate signed by any of the imported trusted CA certificates. Figure 148 Trusted CA: Import Certificate The following table describes the fields in this screen. Table 93 Trusted CA: Import Certificate 292 LABEL DESCRIPTION Certificate Name Enter the name that identifies this certificate.
CHAPTER 15 Static Route 15.1 Overview The P-2812HNU-51c usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the P-2812HNU-51c send data to devices not reachable through the default gateway, use static routes. For example, the next figure shows a computer (A) connected to the P-2812HNU51c’s LAN interface. The P-2812HNU-51c routes most traffic from A to the Internet through the P-2812HNU-51c’s default gateway (R1).
Chapter 15 Static Route 15.2 The Static Route Screen Click Advanced > Static Route to open the Static Route screen. Figure 150 Advanced > Static Route The following table describes the labels in this screen. Table 94 Advanced > Static Route LABEL DESCRIPTION # This is the number of an individual static route. Active This field indicates whether the rule is active or not. Clear the check box to disable the rule. Select the check box to enable it.
Chapter 15 Static Route 15.2.1 Static Route Edit Click the Add button in the Static Route screen. Use this screen to configure the required information for a static route. Figure 151 Static Route: Add The following table describes the labels in this screen. Table 95 Static Route: Add LABEL DESCRIPTION Destination IP Address This parameter specifies the IP network address of the final destination. Routing is always based on network number.
Chapter 15 Static Route 296 P-2812HNU-51c User’s Guide
CHAPTER 16 Policy Forwarding 16.1 Overview Traditionally, routing is based on the destination address only and the P-2812HNU51c takes the shortest path to forward a packet. Policy forwarding allows the P2812HNU-51c to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator. Policy-based routing is applied to outgoing packets, prior to the normal routing.
Chapter 16 Policy Forwarding The following table describes the labels in this screen. Table 96 Advanced > Policy Forwarding LABEL DESCRIPTION Policy Name This is the name of the rule. SourceIP This is the source IP address. Protocol This is the transport layer protocol. SourcePort This is the source port number. SourceMAC This is the source MAC address. Interface This is the WAN interface through which the traffic is routed. Remove Click the icon to remove a rule from the P-2812HNU-51c.
Chapter 16 Policy Forwarding Table 97 Policy Forwarding: Add LABEL DESCRIPTION Back Click Back to return to the previous screen without saving. Apply Click Apply to save your changes back to the P-2812HNU-51c. Cancel Click Cancel to begin configuring this screen afresh.
Chapter 16 Policy Forwarding 300 P-2812HNU-51c User’s Guide
CHAPTER 17 DNS Route 17.1 Overview DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. In addition to the system DNS server(s), each WAN interface (service) is set to have its own static or dynamic DNS server list.
Chapter 17 DNS Route 17.1.1 What You Can Do in this Chapter The DNS Route screens let you view and configure DNS routes on the P2812HNU-51c (Section 17.2 on page 302). 17.2 The DNS Route Screen Click Advanced > DNS Route to open the DNS Route screen. Figure 155 Advanced > DNS Route The following table describes the labels in this screen. Table 98 Advanced > DNS Route LABEL DESCRIPTION Domain Name This is the domain name to which the DNS route applies.
Chapter 17 DNS Route 17.2.1 DNS Route Edit Click the Add button in the DNS Route screen. Use this screen to configure the required information for a DNS route. Figure 156 DNS Route > Add The following table describes the labels in this screen. Table 99 DNS Route > Add LABEL DESCRIPTION Domain Name Enter the domain name you want to resolve. You can use the wildcard character, an “*” (asterisk) as the left most part of a domain name, such as *.example.com.
Chapter 17 DNS Route 304 P-2812HNU-51c User’s Guide
CHAPTER 18 RIP 18.1 Overview Routing Information Protocol (RIP, RFC 1058 and RFC 1389) allows a device to exchange routing information with other routers. 18.1.1 What You Can Do in this Chapter The RIP screen lets you set up RIP settings on the P-2812HNU-51c (Section 18.2 on page 305). 18.2 The RIP Screen Click Advanced > RIP to open the RIP screen.
Chapter 18 RIP The following table describes the labels in this screen. Table 100 Advanced > RIP LABEL DESCRIPTION Interface This is the name of the interface in which the RIP setting is used. Version The RIP version controls the format and the broadcasting method of the RIP packets that the P-2812HNU-51c sends (it recognizes both formats when receiving). RIP version 1 is universally supported but RIP version 2 carries more information.
CHAPTER 19 Quality of Service (QoS) 19.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested. This can cause a reduction in network performance and make the network inadequate for time-critical application such as video-ondemand.
Chapter 19 Quality of Service (QoS) • The Policer Setup screen lets you add, edit or delete QoS policers (Section 19.5 on page 313). • The Monitor screen lets you view the P-2812HNU-51c's QoS-related packet statistics (Section 19.7 on page 323). 19.2 What You Need to Know The following terms and concepts may help as you read through this chapter. QoS versus Cos QoS is used to prioritize source-to-destination traffic flows. All packets in the same flow are given the same priority.
Chapter 19 Quality of Service (QoS) queues). Your P-2812HNU-51c uses the Token Bucket algorithm to allow a certain amount of large bursts while keeping a limit at the average rate. Traffic Rate Traffic Traffic Traffic Rate Time Time (Before Traffic Shaping) (After Traffic Shaping) Traffic Policing Traffic policing is the limiting of the input or output transmission rate of a class of traffic on the basis of user-defined criteria.
Chapter 19 Quality of Service (QoS) the IEEE 802.1p priority level, IP precedence or packet length. See Section 19.1 on page 307 for more information. Figure 158 QoS General The following table describes the labels in this screen. Table 101 QoS General LABEL DESCRIPTION Enable QoS Select the check box to turn on QoS to improve your network performance. WAN Managed Upstream Bandwidth Enter the amount of upstream bandwidth for the WAN interface that you want to allocate using QoS.
Chapter 19 Quality of Service (QoS) Table 101 QoS General LABEL DESCRIPTION Upstream traffic priority will be automatically assigned by These fields are ignored if upstream traffic matches a class you configured in the Class Setup screen. If you select Ethernet Priority, IP Precedence or Packet Length and traffic does not match a class configured in the Class Setup screen, the P-2812HNU-51c assigns priority to unmatched traffic based on the IEEE 802.1p priority level, IP precedence or packet length.
Chapter 19 Quality of Service (QoS) Table 102 QoS Queue Setup LABEL DESCRIPTION Name This shows the descriptive name of this queue. Interface This shows the name of the P-2812HNU-51c’s interface through which traffic in this queue passes. Priority This shows the priority of this queue. Weight This shows the weight of this queue. Buffer Management This shows the queue management algorithm used for this queue. Rate Limit This shows the maximum transmission rate allowed for traffic on this queue.
Chapter 19 Quality of Service (QoS) The following table describes the labels in this screen. Table 103 QoS Queue Setup: Add LABEL DESCRIPTION Enable Select to enable or disable this queue. Name Enter the descriptive name of this queue. Interface Select the interface to which this queue is applied. Priority Select the priority level (from 1 to 4) of this queue. The smaller the number, the higher the priority level.
Chapter 19 Quality of Service (QoS) Click QoS > Class Setup to open the following screen. Figure 161 QoS Class Setup The following table describes the labels in this screen. Table 104 QoS Class Setup LABEL DESCRIPTION Add Click this button to create a new classifier. Order This field displays the index number of the classifier. Active Select the check box to enable the classifier. Class Name This is the name of the classifier.
Chapter 19 Quality of Service (QoS) 19.5.1 QoS Class Edit Click the Add button or the Edit icon in the Class Setup screen to configure a classifier.
Chapter 19 Quality of Service (QoS) The following table describes the labels in this screen. Table 105 QoS Class Configuration LABEL DESCRIPTION Class Configuration Active Select to enable or disable this classifier. Class Name Enter a descriptive name of up to 20 printable English keyboard characters, including spaces. Classification Order Select an existing number for where you want to put this classifier to move the classifier to the number you selected after clicking Apply.
Chapter 19 Quality of Service (QoS) Table 105 QoS Class Configuration (continued) LABEL DESCRIPTION From Interface Select from which LAN, WLAN or WAN interface traffic of this class should come. Ether Type Select a predefined application to configure a class for the matched traffic. If you select IP, you also need to configure source or destination MAC address, IP address, DHCP options, DSCP value or the protocol type. If you select 8021Q, you can configure an 802.
Chapter 19 Quality of Service (QoS) Table 105 QoS Class Configuration (continued) LABEL Exclude DESCRIPTION Select this option to exclude the packets that match the specified criteria from this classifier. Others 802.1P This field is available only when you select 802.1Q in the Ether Type field. Select this option and select a priority level (between 0 and 7) from the drop down list box. "0" is the lowest priority level and "7" is the highest. VLAN ID This field is available only when you select 802.
Chapter 19 Quality of Service (QoS) 19.6 The QoS Policer Setup Screen Use this screen to configure QoS policers that allow you to limit the transmission rate of incoming traffic. Click Advanced > QoS > Policer Setup. The screen appears as shown. Figure 163 QoS > Policer Setup The following table describes the labels in this screen. Table 106 QoS > Policer Setup LABEL DESCRIPTION Add Click this button to create a new entry. No. This is the index number of this entry.
Chapter 19 Quality of Service (QoS) 19.6.1 Adding a QoS Policer Click the Add button or the edit icon in the Policer Setup screen to configure a policer. Figure 164 QoS Policer Setup: Add The following table describes the labels in this screen. Table 107 QoS Policer Setup: Add 320 LABEL DESCRIPTION Enable Select to enable or disable this policer. Name Enter the descriptive name of this policer.
Chapter 19 Quality of Service (QoS) Table 107 QoS Policer Setup: Add LABEL DESCRIPTION Meter Type Select a traffic metering algorithm used in this policer. The Simple Token Bucket algorithm uses tokens in a bucket to control when traffic can be transmitted. Each token represents one byte. The algorithm allows bursts of up to b bytes which is also the bucket size.
Chapter 19 Quality of Service (QoS) Table 107 QoS Policer Setup: Add LABEL DESCRIPTION NonConforming Action Specify the action that the P-2812HNU-51c takes on red-marked packets. Select Drop to discard the packets. Select DSCP Mark to assign a specified DSCP number (between 0 and 63) to the packets and forward them. The packets are dropped if there is congestion on the network.
Chapter 19 Quality of Service (QoS) 19.7 The QoS Monitor Screen To view the P-2812HNU-51c’s QoS packet statistics, click Advanced > QoS > Monitor. The screen appears as shown. Figure 165 QoS > Monitor The following table describes the labels in this screen. Table 108 QoS > Monitor LABEL DESCRIPTION Refresh Interval Enter how often you want the P-2812HNU-51c to update this screen. Select No Refresh to stop refreshing statistics. Interface Monitor No. This is the index number of the entry.
Chapter 19 Quality of Service (QoS) Table 108 QoS > Monitor (continued) LABEL DESCRIPTION Pass This shows the transmission rate of packets which are assigned to this queue and transmitted successfully. Drop This shows the transmission rate of packets which are assigned to this queue and dropped. 19.8 Technical Reference The following section contains additional technical information about the P2812HNU-51c features described in this chapter. IEEE 802.1Q Tag The IEEE 802.
Chapter 19 Quality of Service (QoS) DiffServ QoS is used to prioritize source-to-destination traffic flows. All packets in the flow are given the same priority. You can use CoS (class of service) to give different priorities to different packet types. DiffServ (Differentiated Services) is a class of service (CoS) model that marks packets so that they receive specific per-hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow.
Chapter 19 Quality of Service (QoS) Automatic Priority Queue Assignment If you enable QoS on the P-2812HNU-51c, the P-2812HNU-51c can automatically base on the IEEE 802.1p priority level, IP precedence and/or packet length to assign priority to traffic which does not match a class. The following table shows you the internal layer-2 and layer-3 QoS mapping on the P-2812HNU-51c.
Chapter 19 Quality of Service (QoS) Token Bucket The token bucket algorithm uses tokens in a bucket to control when traffic can be transmitted. The bucket stores tokens, each of which represents one byte. The algorithm allows bursts of up to b bytes which is also the bucket size, so the bucket can hold up to b tokens. Tokens are generated and added into the bucket at a constant rate.
Chapter 19 Quality of Service (QoS) All packets are evaluated against the CBS. If a packet does not exceed the CBS it is marked green. Otherwise it is evaluated against the EBS. If it is below the EBS then it is marked yellow. If it exceeds the EBS then it is marked red. The following shows how tokens work with incoming packets in srTCM: • A packet arrives.
CHAPTER 20 Dynamic DNS Setup 20.1 Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
Chapter 20 Dynamic DNS Setup 20.3 The Dynamic DNS Screen To change your P-2812HNU-51c’s DDNS, click Advanced > Dynamic DNS. The screen appears as shown. Figure 166 Advanced > Dynamic DNS The following table describes the fields in this screen. Table 111 Advanced > Dynamic DNS LABEL DESCRIPTION Service Provider Select the name of your Dynamic DNS service provider. Host Name Type the domain name assigned to your P-2812HNU-51c by your Dynamic DNS provider.
CHAPTER 21 Remote Management 21.1 Overview This chapter explains how to configure the remote management and access control settings on the P-2812HNU-51c. 21.1.1 What You Can Do in this Chapter • The TR-069 screen lets you configure the P-2812HNU-51c’s TR-069 autoconfiguration settings (Section 21.3 on page 333). • The TR-064 screen lets you enable management via TR-064 on the P2812HNU-51c (Section 21.3 on page 333). • The SNMP screen lets you configure your SNMP settings (Section 21.4 on page 334).
Chapter 21 Remote Management Click Advanced > Remote MGMT to open the following screen. Use this screen to configure your P-2812HNU-51c to be managed by an ACS. Figure 167 TR-069 The following table describes the fields in this screen. Table 112 TR-069 332 LABEL DESCRIPTION Inform Select Enable to activate remote management via TR-069 on the WAN. Otherwise, select Disable.
Chapter 21 Remote Management Table 112 TR-069 (continued) LABEL DESCRIPTION Connection Request User Name Enter the connection request user name. Connection Request Password Enter the connection request password. Connection Request URL This shows the connection request URL. Apply/Save Click this button to save your changes back to the P-2812HNU-51c. Cancel Click Cancel to begin configuring this screen afresh.
Chapter 21 Remote Management 21.4 The SNMP Screen Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. Your P-2812HNU-51c supports SNMP agent functionality, which allows a manager station to manage and monitor the P-2812HNU-51c through the network. An SNMP managed network consists of two main components: agents and a manager. An agent is a management software module that resides in a managed device (the P-2812HNU-51c).
Chapter 21 Remote Management Click Advanced > Remote MGMT > SNMP to open the following screen. Use this screen to configure the P-2812HNU-51c SNMP settings. Figure 169 SNMP The following table describes the fields in this screen. Table 115 SNMP LABEL DESCRIPTION SNMP Agent Select Enable to allow a manager station to manage and monitor the P-2812HNU-51c through the network via SNMP. Otherwise, select Disable.
Chapter 21 Remote Management 21.5 The Service Control Screen Click Advanced > Remote MGMT > Service Control to open the following screen. Use this screen to decide what services you may use to access which P2812HNU-51c interface. Figure 170 Service Control The following table describes the fields in this screen. Table 116 Service Control 336 LABEL DESCRIPTION Service Control Select Enable to turn on service control. Otherwise, select Disable. # This is the index number of the entry.
Chapter 21 Remote Management 21.6 The IP Address Screen Click Advanced > Remote MGMT > IP Address to open the following screen. Use this screen to specify the “trusted” computers from which an administrator may use a service to manage the P-2812HNU-51c. Figure 171 IP Address The following table describes the fields in this screen. Table 117 IP Address LABEL DESCRIPTION Access Control Mode Select Enable to activate the secured client list. Select Disable to disable the list without deleting it.
Chapter 21 Remote Management 21.6.1 Adding an IP Address Click the Add button in the IP Address screen to open the following screen. Figure 172 IP Address: Add The following table describes the fields in this screen. Table 118 IP Address: Add 338 LABEL DESCRIPTION IP Address Enter the IP address of the trusted computer from which you can manage the P-2812HNU-51c. Apply/Save Click this button to save your changes back to the P-2812HNU-51c.
CHAPTER 22 Universal Plug-and-Play (UPnP) 22.1 Overview Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use. 22.1.
Chapter 22 Universal Plug-and-Play (UPnP) Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments.
Chapter 22 Universal Plug-and-Play (UPnP) The following table describes the fields in this screen. Table 119 Advanced > UPnP LABEL DESCRIPTION Activate Universal Plug and Play (UPnP) Feature Select this check box to enable UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the P-2812HNU-51c's IP address (although you must still enter the password to access the web configurator).
Chapter 22 Universal Plug-and-Play (UPnP) 22.4.2 Windows XP To install the UPnP in Windows XP: 1 Click Start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components …. Network Connections 4 The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details.
Chapter 22 Universal Plug-and-Play (UPnP) 5 In the Networking Services window, select the Universal Plug and Play check box. Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 22.5 Using UPnP in Windows XP This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the P2812HNU-51c. Make sure the computer is connected to a LAN port of the P-2812HNU-51c.
Chapter 22 Universal Plug-and-Play (UPnP) 22.5.1 Auto-discover Your UPnP-enabled Network Device 1 Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. 2 Right-click the icon and select Properties. Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 22 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Internet Connection Properties: Advanced Settings Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 22 Universal Plug-and-Play (UPnP) 7 Double-click on the icon to display your current Internet connection status. Internet Connection Status 22.5.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the P-2812HNU-51c without finding out the IP address of the P-2812HNU-51c first. This comes helpful if you do not know the IP address of the P-2812HNU-51c. Follow the steps below to access the web configurator. 346 1 Click Start and then Control Panel.
Chapter 22 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your P-2812HNU-51c and select Invoke. The web configurator login screen displays.
Chapter 22 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your P-2812HNU-51c and select Properties. A properties window displays with basic information about the P-2812HNU-51c.
CHAPTER 23 Parental Control 23.1 Overview Parental control allows you to block web sites with the specific URL. You can also define time periods and days during which the P-2812HNU-51c performs parental control on a specific user. 23.1.1 What You Can Do in this Chapter • The Time Restriction screen lets you give different time restrictions to each user of your network (Section 23.2 on page 349). • The URL Filter screen lets you restrict home network users from viewing inappropriate websites (Section 23.
Chapter 23 Parental Control The following table describes the fields in this screen. Table 120 Parental Control > Time Restriction LABEL DESCRIPTION # This shows the index number of the schedule. Active Select the check box to enable the schedule. username This shows the name of the user. MAC This shows the MAC address of the LAN user’s computer to which this schedule applies. Mon ~ Sun x indicates the day(s) on which parental control is enabled.
Chapter 23 Parental Control The following table describes the fields in this screen. Table 121 Time Restriction Configuration LABEL DESCRIPTION User Name Enter the name of the user. MAC Address Enter the MAC address of the LAN user’s computer to which this schedule applies. Days of the week Select check boxes for the days that you want the P-2812HNU-51c to perform parental control.
Chapter 23 Parental Control The following table describes the fields in this screen. Table 122 Parental Control > URL Filter LABEL DESCRIPTION Enable URL Filter Select the check box to enable URL filtering on the P-2812HNU-51c. Blocking list The P-2812HNU-51c prohibits the users from viewing the Web sites with the URLs listed below. # This is the index number of the rule. Active Select the check box to enable the filtering rule. Address This is the URL of the web site in this rule.
CHAPTER 24 Interface Group 24.1 Overview By default, all LAN and WAN interfaces on the P-2812HNU-51c are in the same group and can communicate with each other. You can create multiple groups to have the P-2812HNU-51c assign the IP addresses in different domains to different groups. Each group acts as an independent network on the P-2812HNU-51c. 24.1.1 What You Can Do in this Chapter The Interface Group screen lets you create multiple networks on the P2812HNU-51c (Section 24.2 on page 353). 24.
Chapter 24 Interface Group In the following example, the client that sends packets with the source MAC address 00:19:cb:01:23:45 is assigned the IP address 192.168.2.2 and uses the WAN interface ptm0_2. Figure 178 Interface Grouping Application Default: ETH 2~4 192.168.1.x/24 ptm0_1 ptm0_2 192.168.2.x/24 G2:00:19:cb:01:23:45 Click Advanced Setup > Interface Group to open the following screen. Figure 179 Interface Group The following table describes the fields in this screen.
Chapter 24 Interface Group Table 124 Interface Grouping (continued) LABEL DESCRIPTION Remove Click the Remove icon to delete the group. Add Click this button to create a new group. 24.2.1 Interface Group Configuration Click the Add button in the Interface Group screen to open the following screen. Use this screen to create a new interface group. Note: An interface can belong to a group only.
Chapter 24 Interface Group The following table describes the fields in this screen. Table 125 Interface Group Configuration LABEL DESCRIPTION Group Name Enter a name to identify this group. WAN Interfaces used in the grouping Select a WAN interface to be used in this group. Grouped LAN Interfaces Select a LAN or wireless LAN interface in the Available LAN Interfaces and use the left-facing arrow to move it to the Grouped LAN Interfaces to add the interface to this group.
Chapter 24 Interface Group The following table describes the fields in this screen. Table 126 Interface Grouping Criteria LABEL DESCRIPTION Source MAC Address Enter the source MAC address of the packet. DHCP Option 60 Select this option and enter the Vendor Class Identifier (Option 60) of the matched traffic, such as the type of the hardware or firmware. DHCP Option 61 Select this and enter the device identity of the matched traffic.
Chapter 24 Interface Group 358 P-2812HNU-51c User’s Guide
CHAPTER 25 E-mail Notification 25.1 Overview A mail server is an application or a computer that runs such an application to receive, forward and deliver e-mail messages. To have the P-2812HNU-51c send reports, logs or notifications via e-mail, you must specify an e-mail server and the e-mail addresses of the sender and receiver. 25.1.1 What You Can Do in this Chapter The Email Notification screens let you configure up to two mail servers and sender addresses on the P-2812HNU-51c (Section 25.
Chapter 25 E-mail Notification The following table describes the labels in this screen. Table 127 Advanced > Email Notification LABEL DESCRIPTION Mail Server Address This field displays the server name or the IP address of the mail server. Mail Server Port This field displays the number of the port used for mail transport on the mail server. Username This field displays the user name of the sender’s mail account. Password This field displays the password of the sender’s mail account.
Chapter 25 E-mail Notification The following table describes the labels in this screen. Table 128 Email Notification > Add LABEL DESCRIPTION Requires TLS Select this option to enable SSL/TLS authentication. If mail server authentication is needed but this feature is disabled, you will not receive e-mail.
Chapter 25 E-mail Notification 362 P-2812HNU-51c User’s Guide
CHAPTER 26 System Settings 26.1 Overview This chapter shows you how to configure system related settings, such as system time, password, name, the domain name and the inactivity timeout interval. 26.1.1 What You Can Do in this Chapter • The General screen lets you configure system settings (Section 26.2 on page 363). • The Time Setting screen lets you set the system time (Section 26.3 on page 364). 26.2 The General Screen Use the General screen to configure system settings such as the system password.
Chapter 26 System Settings The following table describes the labels in this screen. Table 129 Maintenance > System > Genera LABEL DESCRIPTION UserName Type the user name you use to access the system. Old Password Type the default password or the existing password you use to access the system in this field. New Password Type your new system password (up to 30 characters). Note that as you type a password, the screen displays a (*) for each character you type.
Chapter 26 System Settings The following table describes the fields in this screen. Table 130 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time Current Time This field displays the time of your P-2812HNU-51c. Each time you reload this page, the P-2812HNU-51c synchronizes the time with the time server. Current Date This field displays the date of your P-2812HNU-51c. Each time you reload this page, the P-2812HNU-51c synchronizes the date with the time server.
Chapter 26 System Settings 366 P-2812HNU-51c User’s Guide
CHAPTER 27 Logs 27.1 Overview This chapter contains information about configuring general log settings and viewing the P-2812HNU-51c’s logs. The web configurator allows you to choose which categories of events and/or alerts to have the P-2812HNU-51c log and then display the logs or have the P2812HNU-51c send them to a syslog server. 27.1.1 What You Can Do in this Chapter • The View Log screen lets you see the logs for the categories that you selected in the Log Settings screen (Section 27.2 on page 367).
Chapter 27 Logs The log wraps around and deletes the old entries after it fills. Figure 186 Maintenance > Logs > View Log The following table describes the fields in this screen. Table 131 Maintenance > Logs > View Log LABEL DESCRIPTION Display Select a severity level of logs to view. The P-2812HNU-51c displays the logs with the severity level equal to or higher than what you selected. # This field is a sequential value and is not associated with a specific entry.
Chapter 27 Logs To change your P-2812HNU-51c’s log settings, click Maintenance > Logs > Log Settings. The screen appears as shown. Figure 187 Maintenance > Logs > Log Settings The following table describes the fields in this screen. Table 132 Maintenance > Logs > Log Settings LABEL DESCRIPTION Active Select to enable or disable system logging. Log Level Select the severity level of the logs that you want the P-2812HNU-51c to display, record and send to the log server.
Chapter 27 Logs 370 P-2812HNU-51c User’s Guide
CHAPTER 28 Tools Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE your P-2812HNU-51c. 28.1 Overview This chapter explains how to upload new firmware, manage configuration files and restart your P-2812HNU-51c. Use the instructions in this chapter to change the device’s configuration file or upgrade its firmware. After you configure your device, you can backup the configuration file to a computer.
Chapter 28 Tools 28.2 The Firmware Screen Click Maintenance > Tools to open the Firmware screen. Follow the instructions in this screen to upload firmware to your P-2812HNU-51c. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Do NOT turn off the P-2812HNU-51c while firmware upload is in progress! Figure 188 Maintenance > Tools > Firmware The following table describes the labels in this screen.
Chapter 28 Tools After you see the Firmware Upload in Progress screen, wait two minutes before logging into the P-2812HNU-51c again. Figure 189 Firmware Upload In Progress The P-2812HNU-51c automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 190 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen.
Chapter 28 Tools 28.3 The Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next. Figure 192 Maintenance > Tools > Configuration Backup Configuration Backup Configuration allows you to back up (save) the P-2812HNU-51c’s current configuration to a file on your computer.
Chapter 28 Tools Restore Configuration Restore Configuration allows you to upload a new or previously saved configuration file from your computer to your P-2812HNU-51c. Table 134 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them.
Chapter 28 Tools If the upload was not successful, the following screen will appear. Click Tools > Configuration to go back to the Configuration screen. Figure 195 Configuration Upload Error Reset to Factory Defaults Click the Reset button to clear all user-entered configuration information and return the P-2812HNU-51c to its factory defaults. The following warning screen appears.
Chapter 28 Tools Click Maintenance > Tools > Restart. Click Restart to have the P-2812HNU51c reboot. This does not affect the P-2812HNU-51c's configuration.
Chapter 28 Tools 378 P-2812HNU-51c User’s Guide
CHAPTER 29 Diagnostic 29.1 Overview The Diagnostic screens display information to help you identify problems with the P-2812HNU-51c. The route between a CO VDSL switch and one of its CPE may go through switches owned by independent organizations. A connectivity fault point generally takes time to discover and impacts subscriber’s network access. In order to eliminate the management and maintenance efforts, IEEE 802.
Chapter 29 Diagnostic • Loopback test - checks if the MEP port receives its Loop Back Response (LBR) from its target after it sends the Loop Back Message (LBM). If no response is received, there might be a connectivity fault between them. • Link trace test - provides additional connectivity fault analysis to get more information on where the fault is. If an MEP port does not respond to the source MEP, this may indicate a fault.
Chapter 29 Diagnostic 29.4 The 802.1ag Screen Click Diagnostic to open the following screen. Use this screen to perform CFM actions. Figure 199 802.1ag The following table describes the fields in this screen. Table 136 Maintenance > Diagnostic > 802.1ag LABEL DESCRIPTION 802.1ag Connectivity Fault Management Maintenance Domain (MD) Name Type a name of up to 39 printable English keyboard characters for this MD. Maintenance Domain (MD) Level Select a level (0-7) under which you want to create an MA.
Chapter 29 Diagnostic Table 136 Maintenance > Diagnostic > 802.1ag (continued) LABEL DESCRIPTION Maintenance Association (MA) Name Type a name of up to 39 printable English keyboard characters for this MA. Maintenance Association (MA) Format Select the format which the P-2812HNU-51c uses to send this MA information in the domain (MD). Options are VID, String and Integer. The combined length of the MD Name and MA name must be less or equal to 44bytes.
Chapter 29 Diagnostic 29.5 The OAM Ping Test Screen Click Maintenance > Diagnostic > OAM Ping Test to open the screen shown next. Use this screen to perform an OAM (Operation, Administration and Maintenance) F4 or F5 loopback test on a PVC. The P-2812HNU-51c sends an OAM F4 or F5 packet to the DSLAM or ATM switch and then returns it to the P2812HNU-51c. The test result then displays in the text box. ATM sets up virtual circuits over which end systems communicate.
Chapter 29 Diagnostic which terminates a VP or VC segment. End-to-end flows are terminated at the end point of a VP or VC connection, where an ATM link is terminated. Segment loopback tests allow you to verify integrity of a PVC to the nearest neighboring ATM device. End-to-end loopback tests allow you to verify integrity of an end-toend PVC. Note: The DSLAM to which the P-2812HNU-51c is connected must also support ATM F4 and/or F5 to use this test.
CHAPTER 30 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • P-2812HNU-51c Access and Login • Internet Access • Phone Calls and VoIP • USB Device Connection • Wireless LAN Troubleshooting • UPnP 30.1 Power, Hardware Connections, and LEDs The P-2812HNU-51c does not turn on. None of the LEDs turn on. 1 Make sure the P-2812HNU-51c is turned on.
Chapter 30 Troubleshooting One of the LEDs does not behave as expected. 1 Make sure you understand the normal behavior of the LED. See Section 1.6 on page 30. 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Turn the P-2812HNU-51c off and on. 5 If the problem continues, contact the vendor. 30.2 P-2812HNU-51c Access and Login I forgot the IP address for the P-2812HNU-51c.
Chapter 30 Troubleshooting I cannot see or access the Login screen in the web configurator. 1 Make sure you are using the correct IP address. • The default IP address is 192.168.1.1. • If you changed the IP address (Section on page 144), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the P-2812HNU-51c. 2 Check the hardware connections, and make sure the LEDs are behaving as expected.
Chapter 30 Troubleshooting I cannot Telnet to the P-2812HNU-51c. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. I cannot use FTP to upload / download the configuration file. / I cannot use FTP to upload new firmware. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser.
Chapter 30 Troubleshooting 5 If the problem continues, contact your ISP. I cannot access the Internet through a DSL connection. 1 Check if you set the DSL/WAN switch (on the back of the P-2812HNU-51c) to the DSL side to have the P-2812HNU-51c use the DSL port for Internet access. 2 Make sure you configured a proper ATM or PTM layer-2 interface and WAN services with the Internet account information provided by your ISP.
Chapter 30 Troubleshooting Your layer-2 interface must be in VLAN MUX Mode or MSC mode to create multiple WAN serivces for each connection. I cannot access the Internet anymore. I had access to the Internet (with the P2812HNU-51c), but my Internet connection is not available anymore. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.6 on page 30. 2 Turn the P-2812HNU-51c off and on. 3 If the problem continues, contact your ISP.
Chapter 30 Troubleshooting 30.4 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. 1 Check the telephone connections and telephone wire. 2 Make sure you have the VoIP > SIP Account and SIP Service Provider screens properly configured. The PHONE light should be on when the SIP line is properly registered. I can access the Internet, but cannot make VoIP calls. 1 Make sure you have the VoIP > SIP Account and SIP Service Provider screens properly configured.
Chapter 30 Troubleshooting 30.6 Wireless LAN Troubleshooting I cannot access the P-2812HNU-51c or ping any computer from the WLAN (wireless AP or router). 1 Make sure the wireless LAN is enabled on the P-2812HNU-51c. 2 Make sure the wireless adapter on the wireless station is working properly. 3 Make sure the wireless adapter installed on your computer is IEEE 802.11 compatible and supports the same wireless standard as the P-2812HNU-51c.
Chapter 30 Troubleshooting 1 Disconnect the Ethernet cable from the P-2812HNU-51c’s LAN port or from your computer. 2 Re-connect the Ethernet cable. The Local Area Connection icon for UPnP disappears in the screen. Restart your computer. I cannot open special applications such as white board, file transfer and video when I use the MSN messenger. 1 Wait more than three minutes. 2 Restart the applications.
Chapter 30 Troubleshooting 394 P-2812HNU-51c User’s Guide
CHAPTER 31 Product Specifications The following tables summarize the P-2812HNU-51c’s hardware and firmware features. 31.
Chapter 31 Product Specifications 31.2 Firmware Specifications Table 139 Firmware Specifications Default IP Address 192.168.1.1 Default Subnet Mask 255.255.255.0 (24 bits) Default User Name admin Default Password 1234 DHCP Server IP Pool 192.168.1.33 to 192.168.1.132 Static Routes 16 Device Management Use the web configurator to easily configure the rich range of features on the P-2812HNU-51c. Wireless Functionality Allow the IEEE 802.11b, IEEE 802.11g and/or IEEE 802.
Chapter 31 Product Specifications Table 139 Firmware Specifications (continued) QoS (Quality of Service) You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers. Remote Management This allows you to decide whether a service (HTTPS or FTP traffic for example) from a computer on a network (LAN or WAN for example) can access the P-2812HNU-51c.
Chapter 31 Product Specifications Table 139 Firmware Specifications (continued) ADSL Standards Multi-Mode standard (ANSI T1.413,Issue 2; G.dmt(G.992.1); G.lite(G992.2)) ADSL2 G.dmt.bis (G.992.3) ADSL2 G.lite.bis (G.992.4) ADSL2+ (G.992.
Chapter 31 Product Specifications The following list, which is not exhaustive, illustrates the standards supported in the P-2812HNU-51c.
Chapter 31 Product Specifications 400 P-2812HNU-51c User’s Guide
APPENDIX A Network Troubleshooting Overview The three most basic utilities for troubleshooting network connection issues are: ipconfig, ping and tracert. This appendix gives a quick overview of them as well as some common usage examples. Moreover, three slightly more advanced utilities are also discussed: arp, route, and netstat. Note: All command examples here use the Microsoft Windows operating system version of the commands.
Appendix A Network Troubleshooting Note: Most operating systems ship with TCP/IP already installed and enabled. See your Windows documentation for details on installing or configuring TCP/IP. The Command Line Interface To open the Windows command line interface: 1 Click Start > Run. 2 In the Run dialog box, enter cmd then click OK. 3 The Command Prompt window opens.
Appendix A Network Troubleshooting For example, the date command has the optional /t and date parameters. If you do not use either of them and enter just date by itself, then the system shows you the date it is currently using and then prompts you to change it. C:\>date The current date is: 2009/10/21 Enter the new date: (mm-dd-yy) However, if you use the /t parameter it just displays the date and nothing more. C:\>date /t 2009/10/21 C:\> To view the parameters for any given command, enter help [command].
Appendix A Network Troubleshooting Here you can see that the device has IP address of 1.1.1.1 and example.com is its Domain Name Server (DNS). If the device is disconnected then you would see the following instead: Ethernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected If the device is connected but cannot get an IP address then you would see: Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . .
Appendix A Network Troubleshooting ping The ping command line utility allows you to verify the connection and latency between your computer and either the P-2812HNU-51c or other devices on the network. If you cannot reach a target using this command, then it may indicate possible network trouble. Syntax: ping target The target can be an IP address or a host name.
Appendix A Network Troubleshooting If your ping test fails to get a response, then you may see a message like this: C:\>ping www.example.com Pinging www.example.com [192.0.32.10] with 32 bytes of data: Request Request Request Request timed timed timed timed out. out. out. out. Ping statistics for 192.0.32.
Appendix A Network Troubleshooting tracert The tracert command line utility allows you to determine the network path between your computer and a host you specify. When you communicate with other devices on a network, the data is not often sent directly from point A to point B; rather, it moves through a series of intermediate servers, passed along until eventually the server closest to point B hands it off directly.
Appendix A Network Troubleshooting The following examples show the typical output of this command: C:\>tracert www.example.com Tracing route to www.example.com [192.0.32.
Appendix A Network Troubleshooting In this example, we abridge the tracert results table to show only server IP addresses and not domain names by using the -d parameter. We also use the -h parameter to limit the number of hops to 5 to test local connections only. C:\>tracert -d -h 5 www.zyxel.com Tracing route to a1524.g.akamai.net [203.69.113.16] over a maximum of 5 hops: 1 2 3 4 5 <1 5 5 17 24 ms ms ms ms ms <1 4 5 16 25 ms ms ms ms ms <1 4 6 14 24 ms ms ms ms ms 172.23.31.254 172.23.6.113 172.23.
Appendix A Network Troubleshooting To check the ARP table on a Windows XP computer: 1 Click Start > Programs > Accessories > Command Prompt. The Command Prompt screen appears. 2 Type arp -a and press [Enter]. The following examples show the typical output of this command: C:\>arp -a Interface: 172.16.1.28 on Interface 0x1000003 Internet Address Physical Address 172.16.1.5 00-00-aa-19-07-38 172.16.1.25 00-18-f3-f0-aa-34 172.16.1.44 00-0e-a6-2c-60-10 172.16.1.210 00-19-cb-e9-66-33 172.16.1.
Appendix A Network Troubleshooting and other route information. When your computer wants to access an IP address on another network, it references this table. Syntax: route print Parameters: For the purposes of this section, the print parameter is the most important. If you enter route by itself, the command’s help page displays. The following example shows the typical output of this command: C:\>route print =========================================================================== Interface List 0x1 .....
Appendix A Network Troubleshooting Table 141 route print Command Output OUTPUT DESCRIPTION Netmask The destination subnet mask of packets that this route entry is to route. The subnet mask can be the apropriate subnet mask for a network, 255.255.255.255 for a host, or 0.0.0.0 for the default route. Gateway The IP address of the gateway through which this computer should send the matched packets.
Appendix A Network Troubleshooting netstat The netstat command line utility is used to show Ethernet statistics and current TCP/IP network connections. Syntax: netstat With no parameters, this command simply displays only active statistics for ports that are currently in use by one process or another. Parameter: netstat [-a] [-e] The -a parameter displays all available listening ports and connections whether they are active or not, while the -e parameter displays Ethernet statistics.
Appendix A Network Troubleshooting Use the -a parameter to display all possible connections to your device, not just the ones that are currently in use: C:\>netstat -a Active Connections Proto TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP TCP Local Address COMPUTERA:http COMPUTERA:http COMPUTERA:2744 COMPUTERA:5152 COMPUTERA:5152 COMPUTERA:5354 COMPUTERA:27015 COMPUTERA:40000 COMPUTERA:40000 COMPUTERA:netbios-ssn COMPUTERA:4177 COMPUTERA:4178 COMPUTERA:4180 COMPUTERA:4182 COMPUTERA:43
Appendix A Network Troubleshooting Additionally, you can use netstat -e to display Ethernet statistics as the following example.
Appendix A Network Troubleshooting 416 P-2812HNU-51c User’s Guide
APPENDIX B Setting Up Your Computer’s IP Address Note: Your specific P-2812HNU-51c may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 418 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel.
Appendix B Setting Up Your Computer’s IP Address 3 Click Change adapter settings. 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix B Setting Up Your Computer’s IP Address 430 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix B Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 203 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 432 Click Apple > System Preferences.
Appendix B Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your P-2812HNU-51c. 6 434 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 204 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address Follow the steps below to configure your computer IP address in GNOME: 436 1 Click System > Administration > Network. 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix B Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 438 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 206 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 442 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 207 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 210 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 211 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 212 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 213 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 214 Security Settings - Java Scripting Java Permissions 450 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 215 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 216 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 454 P-2812HNU-51c User’s Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 219 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 220 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting.
Appendix D IP Addresses and Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.
Appendix D IP Addresses and Subnetting Table 149 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 128 IP Address (Binary) 11000000.10101000.00000001. 10000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.128 Lowest Host ID: 192.168.1.129 Broadcast Address: 192.168.1.191 Highest Host ID: 192.168.1.190 Table 150 Subnet 4 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1.
Appendix D IP Addresses and Subnetting Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 152 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.255.255.192 (/26) 4 62 3 255.255.255.224 (/27) 8 30 4 255.255.255.240 (/28) 16 14 5 255.255.255.248 (/29) 32 6 6 255.255.255.252 (/30) 64 2 7 255.255.255.
Appendix D IP Addresses and Subnetting addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0.
Appendix D IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix D IP Addresses and Subnetting following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 223 Conflicting Router IP Addresses Example Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
Appendix D IP Addresses and Subnetting 466 P-2812HNU-51c User’s Guide
APPENDIX E Wireless LANs Note: Your specific P-2812HNU-51c may not support all of the wireless security types described in this appendix. See the product specifications for more information about which wireless security types are supported. Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C).
Appendix E Wireless LANs Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other.
Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 227 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix E Wireless LANs hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 228 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix E Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 154 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.
Appendix E Wireless LANs accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: • User based identification that allows for roaming. • Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on a network RADIUS server.
Appendix E Wireless LANs The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: • Accounting-Request Sent by the access point requesting accounting. • Accounting-Response Sent by the RADIUS server to indicate that it has started or stopped accounting. In order to ensure network security, the access point and the RADIUS server use a shared secret key, which is a password, they both know. The key is not sent over the network.
Appendix E Wireless LANs authentication method does not support data encryption with dynamic session key. You must configure WEP encryption keys for data encryption. EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by both the server and the wireless clients for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server.
Appendix E Wireless LANs Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types.
Appendix E Wireless LANs required for compatibility reasons, but offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP). TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm called Rijndael.
Appendix E Wireless LANs authentication. These two features are optional and may not be supported in all wireless devices. Key caching allows a wireless client to store the PMK it derived through a successful authentication with an AP. The wireless client uses the PMK when it tries to connect to the same AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.
Appendix E Wireless LANs 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 229 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows.
Appendix E Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 230 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix E Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix E Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb.
APPENDIX F IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Appendix F IPv6 Link-local Address A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A link-local unicast address has a predefined prefix of fe80::/10. The link-local unicast address format is as follows.
Appendix F IPv6 The following table describes the multicast addresses which are reserved and can not be assigned to a multicast group.
Appendix F IPv6 MAC address and complements the seventh bit of the first byte of the MAC address. See the following example. MAC EUI-64 00 : 13 02 : 13 : 49 : 49 : 12 : 34 : 56 : FF : FE : 12 : 34 : 56 Stateless Autoconfiguration With stateless autoconfiguration in IPv6, addresses can be uniquely and automatically generated.
Appendix F IPv6 Each IA must be associated with exactly one interface. The DHCP client uses the IA assigned to an interface to obtain configuration from a DHCP server for that interface. Each IA consists of a unique IAID and associated IP information. The IA type is the type of address in the IA. Each IA holds one type of address. IA_NA means an identity association for non-temporary addresses and IA_TA is an identity association for temporary addresses.
Appendix F IPv6 multicast, the P-2812HNU-51c passes the IPv6 prefix information to its LAN hosts. The hosts then can use the prefix to generate their IPv6 addresses. ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4. ICMPv6 is an integral part of IPv6.
Appendix F IPv6 also displays how to use the ipconfig command to see auto-generated IP addresses. C:\>ipv6 install Installing... Succeeded. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . IP Address. . . . . Default Gateway . . DNS . . . . . . . . Suffix . . . . . . . . . . . . . . . . . . . . . : : : : : 10.1.1.46 255.255.255.0 fe80::2d0:59ff:feb8:103c%4 10.1.1.
Appendix F IPv6 4 Double click Dibbler - a DHCPv6 client. 5 Click Start and then OK. 6 Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
Appendix F IPv6 1 Select Control Panel > Network and Sharing Center > Local Area Connection. 2 Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. 3 Click OK to save the change. 4 Click Close to exit the Local Area Connection Status screen. 5 Select Start > All Programs > Accessories > Command Prompt.
Appendix F IPv6 6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS IPv6 Address. . . . . . Link-local IPv6 Address IPv4 Address. . . . . . Subnet Mask . . . . . . Default Gateway . . . . 492 Suffix . . . . . . . . . . . . . . . . . . . . . . . . . .
APPENDIX G Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix G Common Services Table 161 Commonly Used Services (continued) 494 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix G Common Services Table 161 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix G Common Services Table 161 Commonly Used Services (continued) 496 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX H Open Software Announcements End-User License Agreement for "P-2812HNU-51c" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix H Open Software Announcements 3 Copyright The Software and Documentation contain material that is protected by International Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL.
Appendix H Open Software Announcements and conditions of this License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. 6 No Warranty THE SOFTWARE IS PROVIDED "AS IS.
Appendix H Open Software Announcements DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.
Appendix H Open Software Announcements Open-Source Packages for "P-2812HNU-51c" 3RD PARTY SOFTWARE VERSION WEB ADDRESS OF THE SOFTWARE LICENSE TERM MIPS Linux kernel 2.6.21.5 http://www.linux-mips.org Bridge-Utils 1.2 http://bridge.sourceforge.net bftpd 1.0.24 http://www.bftpd.org/ busybox 1.0.0 http://www.busybox.net/ Dhcpv6 Dnsmasq http://sourceforge.net/projects/wide-dhcpv6/ 2.48 Dproxy: dproxynexgen http://www.thekelleys.org.uk/dnsmasq/ http://dproxy.sourceforge.net ebtables 2.0.
Appendix H Open Software Announcements NTFS-3G 1.231, Ppp 2.4.1, Samba 3.0.34, Udhcp 0.9.6 and zebra 0.93a under below GPL license GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Appendix H Open Software Announcements know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.
Appendix H Open Software Announcements c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Appendix H Open Software Announcements normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Appendix H Open Software Announcements wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8.
Appendix H Open Software Announcements LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Appendix H Open Software Announcements OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix H Open Software Announcements Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc.
Appendix H Open Software Announcements BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e.
APPENDIX I Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix I Legal Information • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix I Legal Information This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication.
Appendix I Legal Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page.
Index Index A C AAL5 398 CA 281, 475 ACK message 221 adding a printer example 242 call history 214 incoming calls 216 outgoing calls 215 ADSL2 398 call hold 228, 230 Advanced Encryption Standard See AES.
Index interference 469 disclaimer 511 channel ID 153 DNS 139 CIFS 234 DNS server address assignment 133 CIFS (Common Internet File System) 236 Domain Name 193 Class of Service 226 Class of Service, see CoS domain name system see DNS client-server protocol 218 Domain Name System. See DNS.
Index F5 cells 383 IGMP v2 398 FCC interference statement 511 IKE phases 269 file sharing 27, 236 importing certificates 284, 288 Finger 193 Independent Basic Service Set See IBSS 467 firmware upload 372 upload error 373 initialization vector (IV) 477 inside header 269 firmware version 83 Integrated Access Device 23 flash key 227 internal routing table 90 flashing 227 Internet access 24 fragmentation threshold 471 Internet Assigned Numbers Authority See IANA 463 FTP 184, 193 Internet Key
Index ITU-T 224 Maximum Burst Size (MBS) 105, 127 MD 379 memory usage 85 K MEP 379 key combinations 231 MIB and SNMP 334 keypad 231 Message Integrity Check (MIC) 476 MIB (Management Information Base) 334 MTU (Multi-Tenant Unit) 132 L LAN and USB printer 240 LAN statistics 95 LAN TCP/IP 144 multicast 133, 138, 146 multimedia 217 multiplexing 126 LLC-based 127 VC-based 126 multiprotocol encapsulation 126 LAN-Side DSL CPE Configuration 333 LBR 380 link trace 380 Link Trace Message, see LTM Link Trac
Index O OAM 383, 398 OAM ping test 383 OK response 221, 223 operation humidity 395 printer sharing 239 and LAN 240 requirements 240 product registration 514 PSK 477 PTM 99 operation temperature 395 Operation, Administration and Maintenance, see OAM Q outside header 269 P Packet Transfer Mode 99 Pairwise Master Key (PMK) 477, 479 Peak Cell Rate (PCR) 105, 127 QoS 225, 307, 325 marking 308 setup 307 tagging 308 versus CoS 308 Quality of Service, see QoS Quick Start Guide 73 peer-to-peer calls 212 Per-
Index RFC 2684 398 URI 217 user agent 218 RIP 138, 305 Routing Information Protocol see RIP SIP ALG 192 route 410 SMTP 193 route status 91 SNMP 193, 334, 398 agent 334 and MIB 334 manager 334 network components 334 object variables 334 protocol operations 334 router features 24 routing information 90 Routing Information Protocol.
Index TPID 132 virtual path 383 TR-064 333 Virtual Private Network, see VPN TR-069 331 ACS setup 331 authentication 332 trademarks 511 VLAN 132 Introduction 132 number of possible VIDs priority frame static traffic shaping 127 VLAN ID 132 transparent bridging 398 VLAN Identifier See VID transport mode 268 VLAN tag 132 trTCM 328 voice activity detection 224 tunnel mode 269 voice coding 223 Two Rate Three Color Marker, see trTCM VoIP 217 peer-to-peer calls 212 tracert 407 Type of Service, s
Index WLAN interference 469 security parameters 480 WLAN button 28 WPA 476 key caching 478 pre-authentication 478 user authentication 477 vs WPA-PSK 477 wireless client supplicant 478 with RADIUS application example 478 WPA2 476 user authentication 477 vs WPA2-PSK 477 wireless client supplicant 478 with RADIUS application example 478 WPA2-Pre-Shared Key 476 WPA2-PSK 476, 477 application example 479 WPA-PSK 476, 477 application example 479 WPS status 84 522 P-2812HNU-51c User’s Guide