Indoor Gateway Unit,
with Four LAN (RJ-45) Ports,
Two VoIP (RJ-11) Ports,
and 802.11g Wi-Fi
Page 4
OD200-IDU
E122008-CS-R01
1*************
Page 5
Compliances
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment and receiver
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected
• Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired
operation.
FCC Caution: Any changes or modifications not expressly approved by the party
responsible for compliance could void the user’s authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance
20 cm between the radiator and your body.
This transmitter must not be co-located or operating in conjunction with any other antenna
or transmitter.
i
Page 6
EC Conformance Declaration
Marking by the above symbol indicates compliance with the Essential Requirements of
the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the
following conformance standards:
• EN 60950-1 (IEC 60950-1) - Product Safety
• EN 301 489-1, EN 301 489-17, EN 300 328 - EMC requirements for radio equipment
This device is intended for use in all European Community countries.
0682
NCC
ii
Page 7
About This Guide
Purpose
This guide details the hardware features of the WiMAX Residential Gateway including its
physical and performance-related characteristics, and how to install the device and use its
configuration software.
Audience
The guide is intended for use by network administrators who are responsible for operating
and maintaining network equipment; consequently, it assumes a working knowledge of
general networking concepts, the Internet Protocol (IP), and Simple Network
Management Protocol (SNMP).
Conventions
The following conventions are used throughout this guide to show information:
Note: Emphasizes important information or calls your attention to related features or
instructions.
Caution: Alerts you to a potential hazard that could cause loss of data, or damage the
system or equipment.
Warning: Alerts you to a potential hazard that could cause personal injury.
Related Publications
The following publication gives basic information on how to install and use the WiMAX
Residential Gateway.
Quick Installation Guide
As part of the WiMAX Residential Gateway’s software, there is online help that describes
all configuration related features.
Revision History
This section summarizes the changes in each revision of this guide.
December 2008 Revision
This is the first revision of this guide. This guide is valid for software release v0.2.0.3.
iii
Page 8
iv
Page 9
Table of Contents
Chapter 1: Introduction 1-1
IDU Hardware Description 1-2
Wi-Fi Antennas 1-3
Scan Button 1-3
Reset Button 1-3
IDU Ground Wire 1-3
Power Status Indicator LED 1-3
Wi-Fi Status Indicator LED 1-4
10BASE-T/100BASE-TX LAN Ports 1-4
ODU Port 1-5
VoIP Phone Ports 1-5
Power Adapter Socket 1-5
The OD200 WiMAX Residential Gateway is a WiMAX subscriber station designed to
provide Internet access for a home or small office. The unit provides a gateway
function between a WiMAX service provider and a local Ethernet LAN. The device
enables a service provider to deliver last mile broadband wireless access as an
alternative to wired DSL or cable modems.
The OD200 is a combination of an indoor unit (IDU) and an outdoor unit (ODU).
There are different ODU units for each of the 2.3, 2.5, and 3.5 GHz WiMAX
frequency bands. Which ODU unit you use depends on the frequency band of your
service provider’s WiMAX service.
The OD200 IDU includes four RJ-45 Ethernet switch ports for LAN connections and
two RJ-11 Voice over IP (VoIP) phone ports. An 802.11b/g Wi-Fi module is included
that provides a local Wi-Fi access point service. The IDU also includes a dedicated
Power-over-Ethernet (PoE) RJ-45 port that connects to the ODU.
The following table lists the available OD200 models.
Table 1-1 OD200 Models
Model NumberDescription
OD200-2.3-ODU2.3 GHz ODU with integrated antenna
OD200-2.5-ODU2.5 GHz ODU with integrated antenna
OD200-3.5-ODU3.5 GHz ODU with integrated antenna
OD200-IDU-1DIDU with 1 LAN port
OD200-IDU-4DIDU with 4 LAN ports
OD200-IDU-1D2VIDU with 1 LAN port and 2 VoIP ports
OD200-IDU-4D2VIDU with 4 LAN ports and 2 VoIP ports
OD200-IDU-4D1WIDU with 4 LAN ports and Wi-Fi
OD200-IDU-4D2V1WIDU with 4 LAN ports and 2 VoIP ports and Wi-Fi
The OD200 offers a user-friendly web-based management interface for the
configuration of all the unit’s features. Any PC directly attached to the unit can
access the management interface using a web browser, such as Internet Explorer
(version 6.0 or above) or Firefox (version 1.5 or above).
The initial configuration steps can be made through the web browser interface using
the Setup Wizard. It is recommended to make the initial changes by connecting a
PC directly to one of the IDU’s LAN ports.
1-1
Page 18
Introduction
1
IDU Hardware Description
The front of the IDU provides an array of system status indicators. The back includes
four LAN ports for 10/100 Mbps Ethernet connections, two RJ-11 Voice over IP
(VoIP) phone ports, and a DC power jack. One additional RJ-45 port is for
connection to the ODU, providing both a data link and power to the ODU unit.
The following figures show the external components of the IDU:
2.4 GHz Wi-Fi Antennas
Scan Button
Power Status Indicator
Wi-Fi Indicator
1-2
Figure 1-1 Front of the IDU
IDU Ground Wire
Reset Button
Figure 1-2 Base of the IDU
Page 19
IDU Hardware Description
DC IN
PHONE 1 PHONE 2LAN 1LAN 2LAN 3LAN 4
ODU
10-19V
2A
1
RJ-45 LAN Ports
(include Link/Activity LEDs)
Figure 1-3 Back of the IDU
VoIP Phone PortsPower SocketRJ-45 ODU Port
Wi-Fi Antennas
The IDU includes 802.11b/g Wi-Fi. There are two 2.4 GHz diversity antennas
included for local wireless connections to PCs.
Scan Button
Press the button to start a partial scan to find the best of known frequency channels.
Reset Button
This button is used to reset the IDU or restore the factory default configuration. If you
press the button for less than 1 second, the unit will perform a hardware reset. If you
press and hold down the button for 5 seconds or more, any configuration changes
you may have made are removed, and the factory default configuration is restored to
the unit.
IDU Ground Wire
The ground wire on the IDU is provided to safely ground the unit to nearby earth
point.
Power Status Indicator LED
The IDU includes a Power LED indicator that simplifies installation and network
troubleshooting. The LED, which is located on the front panel, is described in the
following table.
1-3
Page 20
1
Introduction
Power Status LED
Wi-Fi Status LED
Figure 1-4 IDU LED Indicators
Table 1-2 Power Status LED
StatusDescription
On GreenThe unit has a network association with a WiMAX base station.
Blinking GreenWhen blinking with three of the WiMAX signal LEDs turned on, indicates
authentication has failed.
On OrangeIndicates one of the following conditions:
• After power on, indicates the unit is running its self test.
• Indicates the network entry process has restarted.
On RedA system failure has occured.
OffNo power is being supplied to the unit.
Power
WiFi
Wi-Fi Status Indicator LED
The IDU, which supports Wi-Fi operation, includes a Wi-Fi LED indicator that
displays the Wi-FI network status. The LED, which is located on the front panel, is
described in the following table.
Table 1-3 Wi-Fi Status LED
StatusDescription
On GreenThe Wi-Fi radio is enabled and operating normally.
Flashing GreenIndicates data traffic in the Wi-Fi network.
OffThere is no Wi-Fi connection or the radio is disabled.
10BASE-T/100BASE-TX LAN Ports
The IDU provides four 10BASE-T/100BASE-TX RJ-45 ports. These LAN ports are
standard RJ-45 Ethernet network ports that connect directly to PCs. They can also
be connected to an Ethernet switch or hub to support more users.
1-4
Page 21
IDU Hardware Description
All ports support automatic MDI/MDI-X operation, so you can use straight-through
cables for all network connections to PCs or servers, or to other switches or hubs.
Each of these ports support auto-negotiation, so the optimum transmission mode
(half or full duplex), and data rate (10 or 100 Mbps) is selected automatically.
Each RJ-45 port includes a built-in LED indicator. This LED indicator is described in
the following table.
Table 1-4 LAN Port Status LEDs
LEDStatusDescription
Link/ActivityOn GreenEthernet port has a valid link with an attached device.
Flashing GreenThe port is transmitting or receiving data.
OffEthernet port has no link with another device.
ODU Port
The IDU includes one 10BASE-T/100BASE-TX RJ-45 port that supports a
Power-over-Ethernet (PoE) connection to the ODU. The ODU port also includes a
built-in LED indicator that provides status indications as described in Table 1-4.
Caution: DC VOLTAGE! Do not connect the ODU port to a computer’s RJ-45 port.
VoIP Phone Ports
The IDU provides two RJ-11 telephone ports that connect directly to a standard
(analog) telephone set. This allows a regular telephone to be used for making VoIP
calls over the Internet.
1
Power Adapter Socket
The power socket is located on the rear panel of the IDU. The power socket is for
the AC power adapter connection.
The unit is powered on when connected to its AC power adapter, and the power
adapter is connected to an AC power source between 100-240 volts at 50-60Hz.
1-5
Page 22
1
Introduction
1-6
Page 23
Chapter 2: Installing the OD200
This section describes how to install and connect the OD200 WiMAX Residential
Gateway.
Package Checklist
The OD200-IDU package includes:
• IDU indoor gateway unit (OD200-IDU)
• AC power adapter
• Quick Installation Guide
• User Guide CD
Installation Overview
Before installing the OD200, verify that you have all the items listed in the package
checklist above. If any of the items are missing or damaged, contact your local
dealer. Also, be sure you have all the necessary tools and cabling before installing
the OD200.
Hardware installation of the OD200 involves these steps:
1.Mount the ODU on a pole, mast, or tower using the mounting bracket.
2.Install the IDU indoors.
3.Connect the ODU-IDU Ethernet cable and a grounding wire to the ODU.
4.Align the ODU antenna with the base station.
2-1
Page 24
Installing the OD200
2
IDU Installation
Select a Location
The IDU can be installed indoors on any horizontal surface, such as a desktop or
shelf. Be sure to select an suitable location for the device. Consider these
guidelines:
• Select a cool, dry place, which is out of direct sunlight.
• The device should have adequate space (approximately two inches) on all sides
for proper air flow.
• The device must be near an AC power outlet that provides 100 to 240 V, 50 to
60 Hz.
• Be sure to attach the IDU ground wire to a nearby electrical earth point.
• The device should be accessible for network cabling and allow the status LED
indicators to be clearly visible.
Install the Unit
The IDU is a plug-and-play device, so once it has been connected to local PCs and
powered up, it is fully operable.
To connect the IDU, follow these steps:
1.Power on the IDU by connecting the AC power adapter and plugging it into an
AC power source.
Caution: Use ONLY the power adapter supplied with the OD200. Otherwise, the
product may be damaged.
2.Observe the Indicator LEDs. When you power on the IDU, verify that the Power
LED turns on and that the other LED indicators start functioning as described
under “IDU Hardware Description” on page 1-2.
3.Connect Category 5 or better Ethernet cables from the IDU’s LAN ports to the
network ports of your PCs. Alternatively, you can connect the LAN ports to an
Ethernet switch or other devices. Make sure the length of each cable does not
exceed 100 meters (328 ft).
If your PCs are powered on, the RJ-45 LAN port LEDs on the IDU should turn
on to indicate valid links.
2-2
Page 25
Wi-Fi Client PC
Notebook PC
ODU
10-19V
Regular Phone
To ODU
DCIN
PHONE 1 PHONE 2LAN 1 LAN 2 LAN 3 LAN 4
Figure 2-1 IDU Connections
2A
AC Power Adapter
IDU Installation
AC Power Outlet
2
4.Connect one or two standard (analog) telephone sets to the IDU’s VoIP ports
using standard telephone cable with RJ-11 plugs.
The IDU enables VoIP calls to be made through the unit using a standard
(analog) telephone set connected to a VoIP port, or from PCs or other network
devices connected to the LAN ports. Standard Session Initiation Protocol (SIP)
technology is used to make VoIP calls. You must access the web interface and
configure settings for your SIP service provider before being able to make VoIP
calls.
5.Use your PC’s web browser to access the unit’s management interface and run
the Basic Setup to make any configuration changes. For more information, see
Chapter 3, “Initial Configuration.”
2-3
Page 26
Installing the OD200
2
2-4
Page 27
Chapter 3: Initial Configuration
The OD200 can be configured through its web management interface. The web
interface provides a simple Basic Setup or Advanced Setup options.
Accessing the Web Management Interface
The OD200 has a default IP address of 192.168.1.1 and a subnet mask of
255.255.255.0. If your PC is set to have an IP address assigned by DHCP (Dynamic
Host Configuration Protocol), you can connect immediately to the web management
interface. Otherwise, you must first check if your PC’s IP address is set on the same
subnet as the OD200 (that is, the PC’s IP address starts 192.168.1.x).
In the web browser’s address bar, type the default IP address: http://192.168.1.1.
The web browser displays the OD200’s login page.
Figure 3-1 Login Page
Logging In – Type the default User Name “admin” and Password “admin,” then click
Login. The home page displays.
3-1
Page 28
Initial Configuration
3
Figure 3-2 Home Page
To configure basic settings for the current operating mode, click Basic Setup. For
more information, see “Initial Configuration” on page 3-1.
Alternatively, to configure more detailed settings, click Advanced Setup. For more
information, see “The Advanced Setup Menu” on page 3-5.
Note: It is recommended that you configure a user password as the first step under
“Administrator Settings” on page 4-3 to control management access to the
3-2
unit.
Page 29
Using the Basic Setup
Using the Basic Setup
The Basic Setup takes you through the basic configuration steps for the OD200.
Launching the Basic Setup – To perform basic configuration, click Basic Setup on
the home page.
When configuring the unit through the Basic Setup you will need to proceed through
the following steps:
1.WiMAX Login – Configures user authentication settings for connection to the
WiMAX network.
3
Figure 3-3 WiMAX Login
User Name – The user name required for authentication as provided by the
WiMAX operator. (Default: pseudo@realm)
Password – The user password required for authentication as provided by the
WiMAX operator. (Default: hello)
3-3
Page 30
Initial Configuration
3
2.Apply Settings – Click “Apply” to confirm the basic settings.
Figure 3-4 Apply Settings
3.Basic Setup Finished – When the Basic Setup steps are completed the unit
reboots and attempts to connect to the specified WiMAX network. Click on the
Home button to return to the Home page.
3-4
Figure 3-5 Basic Setup Finished
Page 31
The Advanced Setup Menu
The Advanced Setup Menu
The Advanced Setup menu provides access to all the configuration settings
available for the OD200.
Figure 3-6 Advanced Setup
3
Each primary menu item is sumarized below with links to the relevant section in this
guide where configuration parameters are described in detail:
• System – Configures general device settings.see page 4-1
• WiMAX – Views the wireless connection status.see page 6-1
• VoIP – Configures VoIP SIP settings.see page 7-1
• WiFi – Configures 802.11 access point settings.see page 8-1
3-5
Page 32
Initial Configuration
3
3-6
Page 33
Chapter 4: System Settings
The gateway’s System menu allows you to perform general management functions
for the unit, including setting the system time, configuring an access password, and
upgrading the system software.
The System pages include the following options.
Table 4-1 System Settings
MenuDescriptionPage
Host Name ConfigConfigures a host name and domain name4-1
System StatusDisplays WAN and LAN interface information and other system
Administrator SettingsConfigures user password for management
Firmware UpgradeUpdates the current firmware4-4
Configuration ToolsRestores the factory default settings, or save the unit’s current
System TimeConfigures the system time settings for updates from a time server4-6
System LogDisplays event log entries4-7
ResetResets the device4-8
details
access
settings
Host Name
4-2
4-3
4-4
The gateway allows you to define a name that identifies your unit and the domain
name used by the local network. Setting a host name enables the web interface to
be accessed using an easy-to-remember name instead of its IP address.
Figure 4-1 System Host Name
•Host Name – Enter the name chosen for the unit. (Default: cpe)
• Domain Name – Enter the domain to which the unit is connected.
4-1
Page 34
System Settings
4
System Status
The system status page displays connectivity status information for the unit’s
WiMAX (WAN) and LAN interfaces, firmware and hardware version numbers, and
the number of clients connected to your network.
Figure 4-2 System Status – Internet
INTERNET – Displays WAN (WiMAX) connection status:
• WAN IP – Displays the IP address assigned by the service provider.
• Subnet Mask – Displays the WAN subnet mask assigned by the service provider.
• Gateway – Displays the WAN gateway address assigned by the service provider.
• Primary DNS – Displays the WAN primary Domain Name System server address.
• Secondary DNS – Displays the WAN secondary Domain Name System server
address.
• Connection Type – Displays the connection type for the WAN. Either FIXED for a
static IP setting, or DHCPC for dynamic IP assignment.
Figure 4-3 System Status – Gateway
GATEWAY – Display system IP settings, as well as DHCP, NAT and firewall status:
• IP Address – Displays the unit’s IP address.
• Subnet Mask – Displays the subnet mask.
4-2
Page 35
Administrator Settings
• DHCP Server – Displays the DHCP server status.
• Firewall – Displays the firewall status.
Figure 4-4 System Status – Information
INFORMATION – Displays the number of connected clients, as well as the unit’s
LAN and WAN MAC addresses:
• Connected Clients – Displays the number of connected clients, if any.
• Runtime Code Version – Displays the runtime code version.
• LAN MAC Address – Displays the LAN MAC address.
• WAN MAC Address – Displays WAN MAC address.
Administrator Settings
The Administrator Settings page enables you to change the default password for
management access to the gateway.
4
Figure 4-5 Setting a Password
Current Password – You need to first enter your current administrator password to
be able to configure a new one. (Default: admin)
New Password – Enter a new administrator password. (Range: 3~12 characters)
4-3
Page 36
System Settings
4
Confirm New Password – Enter the new password again for verification.
(Range: 3~12 characters)
Auto-Logout Time – The time of inactivity after which the unit terminates a web
management session. (Default: 30 minutes; Range: 1~99 minutes)
NMS IP Address – The IP address of a network management station on the
operator’s network. The unit will send SNMP trap messages to a management
station when the operator’s DHCP server does not return an IP address to the
gateway.
Firmware Update
The Firmware Update page enables you to download new software to the unit.
Figure 4-6 Firmware Update
Firmware Update – Downloads an operation code file from the web management
station to the gateway using HTTP. Use the Browse button to locate the code file
locally on the management station and click Apply to proceed.
Configuration Tools
The Configurations Tools page allows you to restore factory default settings, or save
and restore the unit’s configuration settings to or from a file on the management
station.
Figure 4-7 Configuration Tools
4-4
Page 37
Configuration Tools
Restore Factory Default Configuration – Resets the unit to its factory default
settings.
Backup Settings/Restore Settings – When selected, prompts either to backup the
current configuration to a file, or select a previously backed up file to restore to the
unit.
When you select “Restore Factory Default Configuration” and click Apply, a
confirmation page displays. Click the Restore button to continue.
Figure 4-8 Restore Factory Default Configuration
When you select “Backup Settings/Restore Settings” and click Apply, The following
page displays.
4
Figure 4-9 Backup/Restore Settings
Backup Settings – Saves the current configuration settings to a file named
“config.bin” on the web management station.
Restore Settings – Restores a saved configuration file to the unit. You can use the
Browse button to locate the file on the web management station.
4-5
Page 38
System Settings
4
System Time
The gateway uses the Simple Network Time Protocol (SNTP) to set its internal clock
based on periodic updates from a time server. Maintaining an accurate time on the
device enables the system log to record meaningful dates and times for event
entries.
SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time,
or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude. To
display a time corresponding to your local time, you must select your time zone.
Figure 4-10 System Time
Time Protocol – Select SNTP to enable the unit to set its internal clock based on
periodic updates from a time server. The unit acts as an SNTP client, periodically
sending time synchronization requests to a specified time server. Alternatively, you
can select “None” and set the time and date manually. (Default: SNTP)
Time Server Address – The IP address of a time server that the unit attempts to
poll for a time update. (Default: 192.43.244.18)
Current Time (hh:mm:ss) – Displays the current time of the system clock.
New TIme (hh:mm:ss) – Sets the system clock to the time specified.
Current Date (yyyy:mm:dd) – Displays the current date of the system clock.
New Date (yyyy:mm:dd) – Sets the system clock to the date specified.
Set Time Zone – SNTP uses Coordinated Universal Time (or UTC, formerly
Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian,
zero degrees longitude. To display a time corresponding to your local time, you must
select your time zone from the pull-down list. (Default: (GMT+08:00) Taipei)
4-6
Page 39
System Log
System Log
The System Log page allows you to display system event messages. The logged
messages can serve as a valuable tool for isolating device and network problems,
and also indicate if any unauthorized attempts have been made to gain access to
your network.
4
Figure 4-11 System Log
Syslog Level – Sets the minimum severity level for event logging. The system
allows you to limit the messages that are logged by specifying a minimum severity
level. Error message levels range from the most severe (Emergency) to least severe
(Debug). The message levels that are logged include the specified minimum level
up to the Emergency level. (Default: Info)
Download – Downloads the current log file to the web management station.
Clear – Deletes all entries in the current log file.
Refresh – Updates the displayed log entries on the web page.
Note: Log messages saved in the unit’s memory are erased when the device is
rebooted.
4-7
Page 40
System Settings
4
Reset
The Reset page allows you to restart the device’s software. If the unit stops
responding correctly or in some way stops functioning, performing a reset can clear
the condition.
Figure 4-12 Reset Unit
Reset – Resets the unit. All current settings are retained.
4-8
Page 41
Chapter 5: Gateway Configuration
The information in this chapter covers the configuration options for the OD200’s
Internet gateway functions.
The OD200 provides comprehensive firewall features and NAT isolation for Internet
traffic passing from the WiMAX service provider to the local network connected to
the LAN ports. The DHCP server feature can assign IP addresses for up to 32 local
network PCs and wireless clients.
The Advanced Setup menu includes the following items for Internet gateway
configuration.
Table 5-1 Gateway Configuration
MenuDescriptionPage
WAN5-2
WAN SettingsSets the connection method of your Internet service provider5-2
DNSSpecifies DNS servers that you want to access5-6
SNMP IP SettingSets SNMP management IP filters5-7
LAN5-8
LAN SettingsSets the unit’s IP address and configures the DHCP server
for the local network
DHCP Client ListDisplays connected DHCP clients that have been assigned
IP addresses by the DHCP server
NAT5-9
Virtual ServerAllows the unit to be configured as a virtual server5-9
Port MappingEnables IP port mapping for special applications5-11
DMZAllows clients to connect to the unit directly bypassing the
firewall
Firewall5-12
Firewall SettingControls access to and from the local network5-12
Firewall OptionsBlocks scans of the network services from an outside hacker5-12
Client FilteringBlocks Internet access based on IP addresses5-14
MAC ControlBlocks internet access based on MAC addresses5-15
Route5-16
Routing Table ListDisplays the routing table5-16
UPnP5-17
SettingsProvides support for Universal Plug and Play devices5-17
5-8
5-9
5-12
5-1
Page 42
Gateway Configuration
5
WAN Settings
Select the WAN connection type used by your service provider and specify DNS
(Domain Name System) servers.
Figure 5-1 WAN Settings
The unit canbe connected to your ISP in one of the following ways:
Dynamic IP Address – Selects configuration for an Internet connection using
DHCP for IP address assignment. This is the default setting.
Static IP Address – Selects configuration for an Internet connection using a fixed IP
assignment.
L2TP – Selects configuration for an Internet connection using the Layer 2 Tunneling
Protocol, an access protocol often used for virtual private networks.
PPPoE – Selects configuration for an Internet connection using the Point-to-Point
Protocol over Ethernet (PPPoE), a common connection method used for DSL
access.
Note: For the Dynamic IP Address (DHCP) option, the unit requires no further
configuration. Selecting other WAN types displays the parameters that are
required for configuring the connection.
5-2
Page 43
WAN Settings
Dynamic IP Address
For dynamic IP assignment from the service provider, the unit functions as a
Dynamic Host Configuration Protocol (DHCP) client. When enabled, no other
settings are required.
Figure 5-2 Dynamic IP Address
Static IP Settings
Selecting Static IP Address for the WAN type enables you to enter static IP settings
as assigned by the service provider.
5
Figure 5-3 Static IP Settings
IP Address assigned by your ISP – The IP address provided by your service
provider. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by
periods.
Subnet Mask – Indicates the subnet mask, such as 255.255.255.0.
Gateway – The gateway IP address provided by your service provider.
5-3
Page 44
Gateway Configuration
5
L2TP Settings
If your service provider supports Layer 2 Tunneling Protocol (L2TP) for your Internet
connection, configure the settings described below.
Figure 5-4 L2TP Settings
User Name – Enter your user name for connecting to the L2TP service, as supplied
by the service provider. (Range: 1-32 characters)
Password – Specify the password for your connection, as supplied by the service
provider. (Default: No password)
L2TP Network Server – The IP address of the L2TP server, as specified by the
service provider.
Keep Alive – This option enables the unit to check periodically that the L2TP
connection is still operating. If the connection is found to be lost, the unit
automatically attempts to reconnect to the service provider. (Default: Enabled)
Keep Alive Time – The time period the unit waits before checking that the L2TP
connection is still operating. This parameter only applies when Keep Alive is
enabled. (Default: 60 seconds; Range: 10-180 seconds)
5-4
Page 45
WAN Settings
PPPoE Settings
If your service provider supports Point-to-Point Protocol over Ethernet (PPPoE) for
your Internet connection, configure the settings described below.
Figure 5-5 PPPoE Settings
PPPoE Network Server – The IP address of the PPPoE server, as specified by the
service provider.
5
Keep Alive – This option enables the unit to check periodically that the PPPoE
connection is still operating. If the connection is found to be lost, the unit
automatically attempts to reconnect to the service provider. (Default: Enabled)
Keep Alive Time – The time period the unit waits before checking that the PPPoE
connection is still operating. This parameter only applies when Keep Alive is
enabled. (Default: 60 seconds; Range: 10-180 seconds)
5-5
Page 46
Gateway Configuration
5
DNS
DNS (Domain Name System) server addresses are usually provided by service
providers, however if you want to specify certain servers, the DNS page enables you
to enter primary and secodary DNS addresses.
Figure 5-6 DNS Settings
Domain Name Server (DNS) Address – Address of the primary DNS server,
specified in the form of 0.0.0.0. (The default address 0.0.0.0 disables the manual
DNS setting.)
Secondary DNS Address (optional) – Optional address of a secondary DNS
server, specified in the form of 0.0.0.0.
5-6
Page 47
WAN Settings
SNMP IP Setting
Simple Network Management Protocol (SNMP) is a communication protocol
designed specifically for managing devices on a network. SNMP is typically used to
configure devices for proper operation in a network environment, as well as to
monitor them to evaluate performance or detect potential problems.
The gateway includes an agent that supports SNMP version 1 and 2c access. A
network management station can access the gateway using SNMP management
software. To implement SNMP management, the gateway must first have an
assigned IP address and subnet mask.
Access to the gateway using SNMP v1 and v2c is controlled by community strings.
To communicate with the gateway, the management station must first submit a valid
community string for authentication. In addition, the SNMP management station IP
must be configured on the gateway to permit SNMP access.
The default community strings for the gateway are “public” for read-only access, and
“private” for read/write access. The default community strings can be changed only
through SNMP management software.
5
Figure 5-7 SNMP IP Setting
SNMP Allowed IP – The list of management station IPs that are permitted SNMP
access to the gateway. Up to five IP addresses can be configured for management
access. Check the Enabled checkbox to enable a configured IP address.
5-7
Page 48
Gateway Configuration
5
LAN
The OD200 must have a valid IP address for management using a web browser and
to support other features. The unit has a default IP address of 192.168.1.1. You can
use this IP address or assign another address that is compatible with your existing
local network. The unit can also be enabled as a Dynamic Host Configuration
Protocol (DHCP) server to allocate IP addresses to local PCs.
LAN Settings
The OD200 includes a DHCP server that can assign temporary IP addresses to any
attached host requesting the service. Addresses are assigned to clients from a
common address pool configured on the unit. Configure an address pool by
specifying start and end IP addresses. Be sure not to include the unit's IP address in
the address pool range.
Figure 5-8 LAN Settings
IP Address – The IP address of the unit. Valid IP addresses consist of four decimal
numbers, 0 to 255, separated by periods.The default setting is 192.168.1.1.
Subnet Mask – Indicates the local subnet mask is fixed as 255.255.255.0.
The Gateway acts as DHCP Server – Check this box to enable the DHCP server.
IP Pool Starting/Ending Address – Specifies the start and end IP address of a
range that the DHCP server can allocate to DHCP clients. You can specify a single
address or an address range. Note that the address pool range is always in the
same subnet as the unit’s IP setting. (Default: 192.168.1.2 to 192.168.1.254)
5-8
Page 49
NAT
Lease Time – Selects a time limit for the use of an IP address form the IP pool.
When the time limit expires, the client has to request a new IP address.
(Default: Half hour; Options: Half hour, one hour, two hours, half day, one day,
two days, one week, two weeks)
Local Domain Name – This optional parameter specifies the name of the domain
the unit is attached to.
DHCP Client List
The DHCP Client List page enables you to see the MAC address of devices that are
currently connected to the unit and have been assigned an IP address by the DHCP
server.
Figure 5-9 DHCP Client List
NAT
5
Network Address Translation (NAT) is a standard method of mapping multiple
"internal" IP addresses to one "external" IP address on devices at the edge of a
network. For the OD200, the internal (local) IP addresses are the IP addresses
assigned to local PCs by the DHCP server, and the external IP address is the IP
address assigned to the WiMAX interface.
Virtual Server
Using the NAT Virtual Server feature, remote users can access different servers on
your local network using your single public IP address.
Remote users accessing services such as web or FTP at your local site thorugh
your public IP address, are redirected (mapped) to other local server IP addresses
and TCP/UDP port numbers. For example, if you set Type/Public Port to TCP/80
(HTTP or web) and the Private IP/Port to 192.168.7.9/80, then all HTTP requests
from outside users forwarded to 192.168.7.9 on port 80. Therefore, by just using
your external IP address provided by your ISP, Internet users can access the
services they need at the local addresses to which you redirect them.
5-9
Page 50
Gateway Configuration
5
The more common TCP service port numbers include: HTTP: 80, FTP: 21, Telnet:
23, and POP3: 110.
Figure 5-10 Virtual Server
Private IP – The IP address of the server on the local Ethernet network. The
specified address must be in the same subnet as the OD200 and its DHCP server
address pool. (Range: 192.168.1.1 to 192.168.1.254)
Private Port – Specifies the TCP/UDP port number used on the local server for the
service. (Range: 0-65535)
Typ e – Specifies the port type. (Options: TCP or UDP; Default: TCP)
Public Port – Specifies the public TCP/UDP port used for the service on the WAN
interface. (Range: 0-65535)
Enabled – Enables the virtual server mapping on the specified ports.
(Default: Disabled)
5-10
Page 51
NAT
Port Mapping
Some applications, such as Internet gaming, videoconferencing, Internet telephony
and others, require multiple connections. These applications cannot work with
Network Address Translation (NAT) enabled. If you need to run applications that
require multiple connections, use port mapping to specify the additional public ports
to be opened for each application.
Figure 5-11 Port Mapping
Server IP – The IP address of the local server. (Range: 192.168.1.1 to
192.168.1.254)
5
Mapping Ports – Specifies the TCP/UDP ports that the application requires. The
ports may be specified individually, in a range, or a combination of both. For
example, 7, 11, 57, 72-96. (Range: 0-65535)
Enabled – Enables port mapping for the specified IP address. (Default: Disabled)
5-11
Page 52
Gateway Configuration
5
DMZ
If you have a client PC that cannot run an Internet application properly from behind
the NAT firewall, you can open the client up to unrestricted two-way internet access
by defining a virtual-DMZ (virtual-demilitarized-zone) host.
Figure 5-12 DMZ Settings
Enable – Enables the feature. (Default: Disabled)
IP Address of Virtual DMZ Host – Specifies the IP address of the virtual DMZ host.
(Range: 192.168.1.1 to 192.168.1.254; Default: 0.0.0.0)
Note: Adding a host to the DMZ may expose your local network to a variety of security
risks, so only use this option as a last resort.
Firewall
The OD200 provides extensive firewall protection by restricting connection
parameters to limit the risk of intrusion and defending against a wide array of
common hacker attacks. You can also block access to the Internet from clients on
the local network based on IP addresses and TCP/UDP port numbers, or specific
MAC addresses.
Figure 5-13 Firewall Setting
Enable – Enables the feature.
Disable – Disables the feature. (This is the default.)
5-12
Page 53
Firewall
Firewall Options
The OD200’s firewall enables access control of client PCs, blocks common hacker
attacks, including IP Spoofing, Land Attack, Ping of Death, Smurf Attack, TCP null
scan, ICMP defect, and TCP SYN flooding. The firewall does not significantly affect
system performance and it is best to leave it enabled to protect your network.
Figure 5-14 Firewall Options
Enable Hacker Attack Protect – Network attacks that deny access to a network
device are called DoS attacks. DoS attacks are aimed at devices and networks with
a connection to the Internet. Their goal is not to steal information, but to disable a
device or network so users no longer have access to network resources. The Router
protects against the following DoS attacks: IP Spoofing, Land Attack, Ping of Death,
Smurf Attack, TCP null scan, ICMP defect, and TCP SYN flooding.
5
Discard PING from WAN side – Prevents pings on the unit’s WiMAX interface from
being routed to the network.
Discard to PING the Gateway – Prevents any response to a ping to the unit’s IP
address.
Drop Port Scan – Prevents outside hackers form testing the TCP/UDP port
numbers on the unit for any services.
5-13
Page 54
Gateway Configuration
5
Client Filtering
You can block access to the Internet from clients on the local network by specifying
IP addresses and TCP/UDP port numbers. You can configure up to five IP filters on
the unit.
Figure 5-15 Client Filtering Settings
Enable Client Filter – Enables client filtering for entries in the table.
(Default: Disabled)
IP – Specifies an IP address or range on the local network. (Range: 192.168.1.1 to
192.168.1.254)
Port – Specifies a TCP/UDP port number range to filter. (Range: 0-65535)
Typ e – Specifies the the port type. (Options: TCP or UDP; Default: TCP)
Enable – Enables filtering for the table entry. (Default: Disabled)
5-14
Page 55
Firewall
MAC Control
You can block access to the Internet from clients on the local network by MAC
addresses. You can configure up to 32 MAC address filters on the unit.
Figure 5-16 MAC Control
MAC Address Control – Enables the feature. (Default: Enabled)
Block Connect to Internet – Blocks Internet access for the scpecified MAC
address. (Default: Enabled)
5
MAC Address – Specifies a local PC MAC address.
Add – Adds a new MAC address to the filter table.
Delete – Removes a MAC address from the filter table.
5-15
Page 56
Gateway Configuration
5
Route
The
Routing Table displays the list of static routes on the unit.
Figure 5-17 Routing Table
Destination LAN IP – The IP address that identifies the IP subnet of the remote
network.
Subnet Mask – The mask that identifies the IP subnet of the remote network.
Gateway – The IP address of the router within the local IP subnet that forwards
traffic to the remote IP subnet.
Metric – Cost for the local interface. This cost is only used when routes are imported
by a dynamic routing protocol.
Interface – Indicates the local network interface on the unit.
5-16
Page 57
UPnP
UPnP
UPnP (Universal Plug and Play Forum) provides inter-connectivity between devices
supported by the same standard.
Figure 5-18 UPnP Setting
UPnP – Enables UpnP support on the unit. (Default: Enabled)
5
5-17
Page 58
Gateway Configuration
5
5-18
Page 59
Chapter 6: WiMAX Settings
The OD200’s WiMAX menu enables you to configure WiMAX connection profiles,
view subscriber station information, and select an operating antenna.
The WiMAX pages include the following options.
Table 6-1 WiMAX Settings
MenuDescriptionPage
ProfileConfigures WiMAX connection profiles6-1
SSinfoDisplays subscriber station information for the unit6-4
Antenna SettingConfigures use of internal or external antennas6-5
A profile allows a user to set specific details for connecting to various WiMAX
service providers. The OD200 must have at least one profile configured to be able to
connect to a WiMAX service.
Figure 6-1 WiMAX Profile Configuration
Operator ID – The ID number that identifies the WiMAX operator for this profile.
(Default: 00:00:02)
6-1
Page 60
WiMAX Settings
3.5
6
Operator name – The WiMAX operator name. (Default: AWB)
Operator Restriction – When enabled, the user can only connect to the service
provider specified in the profile. The user cannot roam to other networks. When
disabled, the operator specified in the profile will be used when base stations are
detected, otherwise the user can roam to other networks. (Default: Disabled)
Scan Frequency – Specifies a center frequency to scan. (Range: 2000-4000 MHz)
FCC 2.3 GHz: 2305-2320 MHz, 2345-2360 MHz
FCC 2.5 GHz: 2496-2690 MHz
Taiwan NCC 2.5 GHz: 2500-2690 MHz
ETSI 3.5 GHz: 3400-3600 MHz
Support for full scan and partial scan by software
Scan Bandwidth – Specifies the bandwidth of the scan channel. (Options: 5.00,
7.00, 8.75, 10.00 MHz; Default: 10.00 MHz)
2.3 GHz model: 5, 8.75, and 10 MHz
2.5 GHz model: 5 and 10 MHz
2.3 GHz model: 5, 7, and 10 MHz
Add/Remove – Use the Add button to add a new center frequency and channel
bandwidth to scan. Use the Remove button to delete a frequency from the scan list.
Authentication
Set user authentication for the WiMAX connection profile, as specified by the service
provider. Selecting EAP-TLS, EAP-TTLS-CHAP, or EAP-TTLS-MSCHAPV2 displays
the parameters that are required for configuring the authentication method.
Enable Authentication – Enables user authentication for connection to the
network. (Default: Disabled)
EAP Method – Selects the Extensible Authentication Protocol (EAP) method to use
for authentication. (Default: EAP-TTLS-MSCHAPV2)
• EAP-TLS – Transport Layer Security. Provides for certificate-based and mutual
authentication of the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically generate
user-based and session-based encryption keys to secure subsequent
communications between the user and the network. A unique X.509 authentication
certificate is included with the gateway firmware.
• EAP-TTLS-CHAP – Tunneled Transport Layer Security with
Challenge-Handshake Authentication Protocol (CHAP). This security method
provides for certificate-based, mutual authentication of the client and network
through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only
server-side certificates.
• EAP-TTLS-MSCHAPV2 – Tunneled Transport Layer Security with Microsoft’s
version 2 of CHAP.
6-3
Page 62
WiMAX Settings
6
EAP Mode – Selects if only a specific user is to be authenticated (user-only), the
subscriber device itself (device-only), or both a user and the device (user-device).
Select the option instructed by the WiMAX service operator.
User Name – The user name required for EAP-TTLS authentication.
(Default: pseudo@realm)
Password – The user password required for EAP-TTLS authentication.
(Default: hello)
MAC Address@domain – A text string that is used to identify the authentication
realm for device authentication. This identity is used to proxy an authentication
request to another remote server. The authentication is then performed using the
unique X.509 authentication certificate included with the device firmware. The
identitiy string consists of either the device MAC address (for EAP-TLS) or a random
generated number (for EAP-TTLS), together with an operator-specified domain
name. For example; 1f:20:30:10:4d:50@service-telecom.
Subscriber Station Information
The SSInfo page displays information about the software versions on the OD200
unit.
Figure 6-5 Subscriber Station Information
Firmware Version – The version of software code running on the unit.
Driver Version – The version of the WiMAX chip driver software.
Library Version – The version of WiMAX library software.
Baseband Chip Version – The version of the WiMAX baseband chip.
RF Chip Version – The version of the WiMAX radio chip.
6-4
Page 63
Antenna Setting
Antenna Setting
The OD200 does not have the option of using an external antenna instead of the
integrated antennas supplied with the unit. Be sure to always set the Antenna
Selection setting to “Omni.”
Figure 6-6 WiMAX Antenna Setting
Antenna Selection – Set to use the integrated (Omni) antennas for WiMAX
communications. (Default: Omni)
6
6-5
Page 64
WiMAX Settings
6
Advance Configure
The Advanced Configuration screen allows you to configure extended features for
the WiMAX connection.
Figure 6-7 WiMAX Advance Configure
Center Frequency – Configures the centre frequency used by the WiMAX service.
Bandwidth – Configures the channel bandwidth used by the WiMAX service.
Hand Over Enable – Enable handoffs when moving between base stations.
ARQ Enable – The Automatic Repeat reQuest (ARQ) mechanism is an optional part
of the WiMAX MAC layer and a protocol for error control in data transmission. When
a packet error is detected, the transmitter is automatically requested to resend the
packet.
HARQ Enable – Hybrid ARQ (HARQ) is a variation of the ARQ error control
method. In standard ARQ, error-detection information (ED) bits are added to data to
be transmitted (such as cyclic redundancy check, CRC). In Hybrid ARQ, forward
error correction (FEC) bits are also added to the existing Error Detection (ED) bits
(such as Reed-Solomon code or Turbo code).
PKMv2 Enable – PKMv2 (Privacy Key Management version 2) is the standard
security solution for WiMAX networks. The security protocol provides mutual
authentication of the subscriber station and base station, as well as distributing
traffic encryption keys. It is also used to transport EAP (Extensible Authentication
Protocol) messages.
6-6
Page 65
Advance Configure
Auto Linkup Enable – Enables automatic synchronization with the base station
signal.
Auto PHY Sync Enable – Enable automatic synchronization with the base station
PHY MAC address.
DL MIMO Enable – Enables the use of downlink multiple-input and multiple-output
(DL MIMO) antennas.
PHS Enable – Enables payloader header suppression (PHS) a feature that
conserves link layer bandwidth by suppressing unnecessary packet headers on
upstream and downstream traffic flows.
Min Grant Size Enable – Enables the WiMAX service to obtain performance
information and reports back that it can schedule the session using its Unsolicited
Grant Service, UGS, with a link delay of 5 msecs, or on its Real-Time Polling Service
with a link delay of 18 msecs.
6
6-7
Page 66
6
WiMAX Settings
6-8
Page 67
Chapter 7: VoIP Settings
Voice over Internet Protocol (VoIP) technology is a way of using the Internet to make
phone calls. Phone calls can be tranmitted over the Internet by encoding a voice call
into data packets at one end and then decoding it back into voice calls at the other
end. This encoding and decoding is from a analog signal (your voice) into a digital
signal (data packets) and then back into an analog signal.
The OD200 uses Session Initiation Protocol (SIP) as the control mechanism that
sets up, initiates, and terminates calls between a caller and a called party. The SIP
messaging makes use of “Proxy,” “Redirect,” and “Registration” servers to process
call requests and find the location of called parties across the Internet. When SIP
has set up a call between two parties, the actual voice communication is a direct
peer-to-peer connection using the standard Real-Time Protocol (RTP), which
streams the encoded voice data across the network.
You can make VoIP calls by connecting a regular phone to one of the OD200’s
RJ-11 Phone ports. You can also make VoIP calls from your computer using a VoIP
application with a simple microphone and computer speakers. Using either method,
VoIP provides an experience identical to normal telephoning.
Before using the VoIP Phone ports on the OD200, you must have an account with a
SIP service provider and configure the required parameters through the web
interface. The OD200 allows the two RJ-11 Phone ports to be configured separately
with different settings.
The VoIP configuration pages include the following options.
Table 7-1. VoIP Settings
MenuDescriptionPage
SIP AccountSets up basic SIP account details for Phone 1 and Phone 27-2
Dial PlanSets control strings for dialed phone numbers7-4
Call FeatureConfigures call forwarding options7-6
CodecsSelect coder/decoders (codecs) to use for phone traffic7-8
Call Block SettingSet incoming and outgoing numbers to block7-9
Phone SettingSets phone timeout parameters7-10
7-1
Page 68
VoIP Settings
7
SIP Account
From the VoIP SIP Account page, you can configure the basic SIP service
parameters for Phone 1 and Phone 2.
Figure 7-1 SIP Account Settings
Enable Proxy Outbound – Enables the use of proxy servers in the local network to
forward SIP requests. (Default: Disabled)
Always Proxy Outbound – Forces all SIP requests to be forwarded through local
proxy servers. (Default: Disabled)
Expire Time – The time the OD200 waits for a response from a proxy server before
a VoIP call fails. (Range: 61-65535 seconds; Default: 3600 seconds)
User Name – The SIP account user name.
Auth. User Name – An alphanumeric string that uniquely identifies the user to the
SIP server.
Auth. Password – An alphanumeric string that uniquely identifies the SIP user’s
permission rights.
Display Name – The name that is displayed to the other party during a call.
7-2
Page 69
SIP Setting
SIP Register – The IP address of the SIP registrar server. A registrar is a server that
accepts SIP register requests and places the information it receives in those
requests into the location service for the domain it handles.
SIP Register Port Number – The TCP port number used by the VoIP service
provider’s register server. (Range: 0-65535; Default: 5060)
Proxy Address – Address of the VoIP service provider SIP proxy server.
Proxy Port – The TCP port number used by the VoIP service provider’s SIP proxy
server. (Range: 0-65535; Default: 5060)
SIP Setting
From the VoIP SIP Setting page you can configure SIP parameter details.
7
Figure 7-2 SIP Setting
RTP Packetization Time – Specifies a maximum amount of time for transmission of
a RTP data packet. (Options: 10, 20, 30 ms; Default: 20 ms)
RTP Port Base/Limit – The Real-time Transport Protocol (RTP) and Real-time
Control Protocol (RTCP) do not use specified port numbers. You can specify a port
range that the RTP and RTCP traffic can use. Enter the port Base and Limit to define
the range. (Range: 1024-65535)
Stun Server – STUN (Simple Traversal of UDP through NAT (Network Address
Translation)) is a protocol that assists devices behind a NAT firewall or router with
7-3
Page 70
VoIP Settings
7
packet routing. The problem of NAT firewalls can also be solved using a proxy
server to control SIP traffic. Specify the IP address and TCP port used by the STUN
server. (Default: 0.0.0.0:3478, “0.0.0.0” means not available; Port Range: 0-65535)
DTMF – Enables the sending of dual-tone multi-frequency (touch tone) phone
signals over the VoIP connection. There are several methods to choose from:
• No DTMF: The DTMF signals are not sent over the VoIP connection.
• In-band Mode: The DTMF signals are sent over the RTP voice stream. In the case
when low-bandwidth codecs are used, the DTMF signals may be distorted.
• 2833 Relay: Uses the RFC 2833 method to relay the DTMF signals over the RTP
voice stream without any distortion. (This is the default.)
• Both In-band and 2833: Uses the best method depending on the codecs selected.
Invite Timeout – The time that the unit waits for a response to a SIP Invite message
before a call fails. If network connections are slow and many SIP calls fail, you may
need to increase this timeout value. (Range: 1-300 seconds; Default: 12 seconds)
T. 3 8 Op ti o n – Selects the method to use when sending fax messages over the VoIP
network from a fax machine connected to one of the RJ-11 Phone ports on the
OD200. (Default: Voice and T.38 Fax Relay)
• T.38 Fax Relay: The SIP protocol sets up the VoIP call, then the T.38 Fax Relay
protocol sends the fax data over the network.
• Voice and T.38 Fax Relay: Enables voice calls and faxes to be sent from the
Phone port connection. When a fax tone signal is detected on the port, the T.38
Fax Relay standard is used instead of the voice codec.
• Voice and Fax Pass Through: Enables voice calls and faxes to be sent from the
Phone port connection. For this option, fax signals are sent over the VoIP network
using the voice codec, just as if it were a voice call.
Dial Plan
A dial-plan string can be specified to control phone numbers dialed out through the
OD200. A dial plan describes the number and pattern of digits that a user dials to
reach a particular telephone number. Access codes, area codes, specialized codes,
and combinations of the number of digits dialed can all be part of a dial plan. This
enables a user to predefine dialling sequences that are permitted. It can help
transfer, check, limit phone numbers, and handle prefixes to certain numbers.
The dial-plan string consists of a single digit rule. A typical example of a dial-plan
string is: [0123]xxxxxx.t
Three standard dial plans are defined; Call Transfer Key, New Call Key, and 3-way
Conference. Up to 10 other dial plans can be defined by the user.
7-4
Page 71
Dial Plan
Figure 7-3 Dial Plan Settings
The function of elements allowed in a dial plan are described in the table below:
Table 7-1. Dial Plan Elements
ElementExampleDescription
xxxxxRepresents a digit of any value ( 0 to 9) that can be dialed on a
.xx.Indicates zero or more occurrences of the previous symbol. The
0-901xxIndicates dialed digits that must be matched. This example only
[ ][125-8]Limits a dialed digit to specified values or a range of values. The
txx.tThe timeout indicator that can placed after dialed digits or at the end
phone. This example has a rule with four digits of any number.
example acts like a wildcard, meaning any dialed phone number of
two or more digits is allowed.
allows four-digit numbers starting “01.”
example specifies that only digits 1, 2, 5, 6, 7, and 8 are permitted.
of the dial-plan string.
7
When a user dials a series of digits, the dial-plan rule is tested for a possible match.
If a match is made, the dialed sequence is transmitted. If no match is made, the
dialed number is blocked and the user will hear an error tone.
A dial-plan string cannot include spaces between elements. Dialed sequences that
are longer than specified in a dial-plan rule are truncated after the number of
specified digits. For example, if the dial-plan rule is “011x” and “0115678” is dialed,
only the digit sequence “0115” is transmitted.
7-5
Page 72
VoIP Settings
7
Call Feature
The OD200 allows you to configure several call features, such as call waiting and
call-forwarding. Other call features can be implemented by pressing specific phone
buttons or entering dial patterns.
The table below describes the various call features available.
Note: Some call features may be dependent on support at the SIP server. Check with
the SIP service provider.
Table 7-1. VoIP Call Features
Call FeatureDescriptionActivation
Call HoldPlaces an active call on hold for
an unlimited period of time.
Call WaitingIf during a call there is another
incoming call, an alert tone is
heard.
Call SwitchingCalls two numbers, then
switches between them.
Call TransferTransfers any received call to
another number you specify.
Call ForwardForwards an incoming call to
another number.
3-Way ConferenceCalls two numbers, then allows
all to talk together.
Press the “Flash,” “Flash Hook,” or “Hold”
button on the phone.
This feature must first be en abled using the web
interface. You can place the active call on hold
and switch to the incoming call. You can switch
between the two calls by placing the active call
on hold.
Dial the first number, then place it on hold. Dial
the key sequence “**” and wait until you hear
the dial tone, then dial the second number.
Placing the active call on hold switches to the
other call. If the active call is hung up, the phone
rings again to activate the other call.
First place the received call on hold, then dial
the transfer key sequence “*#”. When you hear
a dial tone, enter the transfer phone number,
then hang up.
This feature can be configured using the web
interface. You can specify forwarding numbers
for all calls, when busy, or for no answer.
Dial the first number, then place it on hold. Dial
the key sequence “**” and wait until you hear
the dial tone, then dial the second number.
When the second call is active, dial “*3” to
establish the three-way conference.
7-6
Page 73
Call Feature
Figure 7-4 Call Features
Call Waiting – Enables a call waiting alert. If during a call there is another incoming
call, an alert tone is heard. You can place the active call on hold (press the “Flash,”
“Flash Hook,” or “Hold” button on the phone) and switch to the incoming call.
(Default: Disabled)
Call Waiting Timeout – The time a second incoming call waits before a “no answer”
message is sent. (Range: 1-300 seconds; Default: 30 seconds)
Always Forward Phone Number – Another phone number to which all incoming
calls are forwarded.
7
On Busy Forward Phone Number – Another phone number to which incoming
calls are forwarded when the phone is busy.
No Answer Forward Phone Number – Another phone number to which incoming
calls are forwarded when there is no answer.
Call Forward No Answer Timeout – The time a call waits for an answer before
being forwarded to the No Answer Forward Phone Number. (Range: 1-300 seconds;
Default: 10 seconds)
7-7
Page 74
VoIP Settings
7
Codecs
A codec (coder/decoder) is the way a voice analog signal is converted into a digital
bitstream to send over the network, and how it is converted back into an analog
signal at the receiving end. Codecs differ in the type of data compression that is
used to save network bandwidth and in the time delay caused in the signal. This
results in different voice quality experienced by the user.
The voice codecs in common use today have been standardized by the International
Telecommunication Union Telecommunication Standardization Sector (ITU-T) and
are identified by a standard number, such as G.711 or G.726. The same codec must
be supported at each end of a VoIP call to be able to encode and decode the signal.
Since devices in other networks may want to use different codecs, the OD200
provides support for several common standards.
Figure 7-5 Codecs
Codec – Lists the codecs supported by the OD200. You can enable specific codecs
to use, or enable all. Alternatively, you may want to disable certain codecs, such as
high-bandwidth codecs, to preserve network bandwidth.
• PCMA (G711.aLaw): The ITU-T G.711 with A-law standard codec that uses Pulse
Code Modulation (PCM) to produce a 64 Kbps high-quality voice data stream. This
standard is used in Europe and most other countries around the world.
• PCMU (G711.uLaw): The ITU-T G.711 with mu-law standard codec that uses
Pulse Code Modulation (PCM) to produce a 64 Kbps high-quality voice data
stream. This standard is used in North America and Japan.
• G723.1: The ITU-T G.723.1 standard low bitrate codec that uses Multi-Pulse
Maximum Likelihood Quantization (MP-MLQ) and Algebraic Code Excited Linear
Prediction (ACELP) speech coding to produce data streams of 6300 and 5300 bps.
7-8
Page 75
Call Block Setting
• G729ab: The ITU-T G.729ab standard codec that uses Conjugate Structure
Algebraic-Code Excited Linear Prediction (CS-ACELP) with silence suppression to
produce a low-bandwidth data stream of 8 Kbps. Note that DTMF and fax tones do
not transport reliably with this codec, it is better to use G.711 for these signals.
• G726-16/24/32/40: The ITU-T G.726 standard codecs that use Adaptive
Differential Pulse Code Modulation (ADPCM) to produce good-quality,
low-bandwidth data streams of either 16, 24, 32, or 40 Kbps.
Priority Codec List – The OD200 automatically negotiates the codec to use for
each called party. You can specify a priority for the codecs that you prefer to use. For
example, you may want to use a low-bandwidth codec such as G729ab instead of a
high-bandwidth G711 codec. Select a codec in the list, then use the UP and DOWN
buttons to set the priority. The OD200 attempts to use the codec highest in the list
before trying the next lower one.
Call Block Setting
The OD200 can block certain incoming and outgoing phone numbers from making
calls through the unit. You can specify up to 15 incoming and 15 outgoing numbers
to block.
7
Figure 7-6 Call Block Setting
Phone – Selects either VoIP port PHONE1 or PHONE2.
Outgoing – Blocks outgoing calls from the listed numbers. (Valid characters 0-9)
Incoming – Blocks incoming calls from the listed numbers. (Valid characters 0-9)
7-9
Page 76
VoIP Settings
7
Phone Setting
The OD200 allows the timings for certain events on the VoIP phone ports to be
precisely configured. For example, you can specify how long a phone will ring and
how long a dial tone is heard on a phone.
The OD200 also enables the line delay to be specified for each phone so that the
caller’s voice echo is cancelled.
Figure 7-7 Phone Setting
National Profile – Choose the country of operation for phone setting compatibility.
Currently only France, Israel, Japan, Korea, Spain, Taiwan, UK, and the United
States are supported.
Caller ID – The compatible telecommunications caller ID standard that is supported
for the country of operation. (Default: Disabled)
Answer Timeout – The time after which a no answer message is sent to the caller.
(Range: 1-300 seconds; Default: 60 seconds)
Dial Tone Timeout – The length of time a dial tone is heard on a connected phone.
(Range: 1-300 seconds; Default: 16 seconds)
Inter Digit Timeout – The maximum time delay allowed between each dialed digit.
When the time is exceeded, a call is made using the dialed digits.
(Range: 1-300 seconds; Default: 2 seconds)
Attended Transfer Timeout – The time after which a held call that is being
transferred is terminated. (Range: 5-300 seconds; Default: 32 seconds)
7-10
Page 77
Phone Setting
Note: You can hold a call by pressing the “Flash,” “Flash Hook,” or “Hold” button on
the phone
Line Echo Cancellation – Enables a time delay for voice echo cancellation. A voice
echo can be created on some two-wire phone loops, which becomes increasingly
louder and annoying when there is a long delay. If voice echo is a problem during a
call, you can enable this parameter to try and reduce or remove it. (Default: Enabled)
VAD – Voice Activity Detection. Enables the detection of periods of silence in the
audio stream so that it is not transmitted over the network. (Default: Disabled)
, then dial a transfer number.
7
7-11
Page 78
7
VoIP Settings
7-12
Page 79
Chapter 8: Wi-Fi Settings
The OD200 model for the 3.5 GHz WiMAX band includes an IEEE 802.11g radio
interface for local Wi-Fi communications. The Wi-Fi set up pages include
configuration options for the radio signal characteristics and Wi-Fi security.
The Wi-Fi configuration pages include the following options.
Table 8-1 Wi-Fi Settings
MenuDescriptionPage
SettingsAllows you configure basic radio parameters.8-1
SecurityConfigures Wi-Fi security features.8-4
MAC AuthenticationConfigures a client MAC address control list.8-8
Wireless Settings
From the Wireless menu, click on Settings to configure the unit’s Wi-Fi radio
interface. The unit’s radio can operate in three modes, IEEE, 802.11b & g, 802.11g
only, and 802.11b only.
The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps.
Note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b
standard, it allows clients with 802.11b wireless network cards to associate to an
802.11g access point.
8-1
Page 80
Wi-Fi Settings
8
Figure 8-1. Wireless Settings
Interface Status – Enables the Wi-Fi radio.
Country Code – The country code restricts operation of the Wi-Fi radio to the
channels and transmit power levels permitted for Wi-Fi networks in the specified
region. You must set the correct Country Code to be sure the radio conforms to local
regulations. (Options: United States, Japan, Europe; Default: United States)
Note to US Model Owner: To comply with US FCC regulation, the country
selection function has been completely removed from all US models. The
above function is for non-US models only.
The availability of some specific channels and/or operational frequency
bands are country dependent and are firmware programmed at the factory to
match the intended destination. The firmware setting is not accessible by the
end user.
Network Name (SSID) – The Service Set ID (SSID) that identifies the Wi-Fi
network. The SSID is case sensitive and can consist of up to 32 alphanumeric
characters. (Default: default)
Radio Channel – The radio channel used by the unit and its clients to communicate
with each other. This channel must be the same on the unit and all of its wireless
clients. The available channel settings are limited by local regulations. (Default: 1;
Range: 1-11)
8-2
Page 81
Wireless Settings
Note: If you experience poor performance, you may be encountering interference from
another wireless device. Try changing the channel, as this may eliminate
interference and increase performance. Channels 1, 6, and 11, as the three
non-overlapping channels in the 2.4 GHz band, are preferred.
Auto ChannelSelect – Enables the unit to automatically select an available radio
channel. (Default: Enabled)
Working Mode – Selects the operating mode for the 802.11g radio.
(Default: B/G Mixed Mode)
• B/G Mixed Mode: Both 802.11b and 802.11g clients can communicate with the
unit (up to 54 Mbps).
• G Only Mode: Only 802.11g clients can communicate with the unit (up to
54 Mbps).
• B Only Mode: Both 802.11b and 802.11g clients can communicate with the unit,
but 802.11g clients can only transfer data at 802.11b standard rates (up to
11 Mbps).
Transmit Power – Adjusts the power of the radio signals transmitted from the unit.
The higher the transmission power, the farther the transmission range. Power
selection is not just a trade off between coverage area and maximum supported
clients. You also have to ensure that high-power signals do not interfere with the
operation of other radio devices in the service area. (Options: Auto, Full, Min;
Default: Auto)
8
Tx Data Rate – The maximum data rate at which the unit transmits unicast packets
on the Wi-Fi interface. The maximum transmission distance is affected by the data
rate. The lower the data rate, the longer the transmission distance. (Default: Auto)
RTS Threshold (256~2432) – Sets the packet size threshold at which a Request to
Send (RTS) signal must be sent to a receiving station prior to the sending the data
frame. The unit sends RTS frames to a receiving station to negotiate the sending of
a data frame. After receiving an RTS frame, the station sends a CTS (clear to send)
frame to notify the unit that it can start sending data. If a packet size equals or
exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send)
mechanism will be enabled. Units contending for the medium may not be aware of
each other, and the RTS/CTS mechanism can solve this “Hidden Node Problem.”
(Range: 256-2432 bytes: Default: 2432 bytes)
CTS Protection Mode – When 802.11g and 802.11b clients operate together in the
same Wi-Fi network, there needs to be a mechanism that prevents 802.11b clients
interferring with 802.11g transmissions. This is achieved by sending
802.11b-compatible CTS (Clear to Send) or RTS/CTS (Request to Send / Clear to
Send) frames before each transmission. This mechanism decreases the
performance of 802.11g clients, but ensures that 802.11b clients can communicate
with the OD200. (Default:CTS Only)
8-3
Page 82
Wi-Fi Settings
8
• Disable: If there are no 802.11b clients in the network, the protection mode can be
disabled.
• CTS Only: The transmitting client sends only a CTS frame to prevent others from
accessing the medium. This mechanism is effective for most neworks with mixed
802.11g and 802.11b clients.
• RTS/CTS: Both RTS and CTS frames must be exchanged before a client can send
data. There may be 802.11b clients in some networks that do not detect the CTS
frames from other stations. The full RTS/CTS exchange should solve most
connection problems, but it also has the greatest impact on network performance.
Preamble Length – All IEEE 802.11 frames begin with an alternating pattern of 1s
and 0s called the preamble, which tells receiving stations that a frame is arriving.
This provides time for the receiving station to synchronize to the incoming data
stream. This parameter sets the length of the signal preamble that is used at the
start of a data transmission. Using a short preamble (96 microseconds) instead of a
long preamble (192 microseconds) can increase data throughput on the unit, but
requires that all clients can support a short preamble. (Default: Short)
• Short: Sets the preamble to short for increased throughput.
• Long: Sets the preamble to long. Using a long preamble ensures the unit can
support all 802.11b and 802.11g clients.
SSID Suppress – When enabled, the OD200 stops broadcasting the configured
SSID in its beacon signal. The unit is configured by default as an “open system,”
which broadcasts a beacon signal including the configured SSID. Wireless clients
with a configured SSID of “ANY” can read the SSID from the beacon, and
automatically set their SSID for immediate connection to the OD200. When enabled,
the unit does not include its SSID in beacon messages. This provides a basic level
of security, since wireless clients must be configured with the SSID to connect to the
OD200.
Factory Default – Click the Reset button to set all the Wi-Fi settings to their factory
default values.
Wireless Security
The OD200’s Wi-Fi interface is configured by default as an “open system,” which
broadcasts a beacon signal including the configured SSID. Wireless clients with a
configured SSID of “ANY” can read the SSID from the beacon, and automatically set
their SSID to allow immediate connection to the wireless network.
To implement wireless network security, you have to employ two main functions:
• Authentication – It must be verified that clients attempting to connect to the network
are authorized users.
8-4
Page 83
Wireless Security
• Traffic Encryption – Data passing between the unit and clients must be protected
from interception and evesdropping.
For a more secure network, the OD200 can implement one of several security
mechanisms. The security mechanism employed depends on the level of security
required, the network and management resources available, and the software
support provided on wireless clients.
To configure wireless security click on Security.
Figure 8-2. Wireless Security
There are eight security options available. When you select the security type in the
table, the required settings are displayed. The option “Open System” together with
encryption disabled is equivalent to no security, all clients will be able to immediately
connect to the Wi-Fi network.
8
The following sections describe the security options available for the OD200 Wi-Fi
network.
WEP Shared Key Security
Wired Equivalent Privacy (WEP) provides a basic level of security, preventing
unauthorized access to the network and encrypting data transmitted between
wireless clients and the OD200. WEP uses static shared keys (fixed-length
hexadecimal or alphanumeric strings) that are manually distributed to all clients that
want to use the network.
When enabled, you must configure at least one WEP key for the Wi-Fi interface and
all its clients.
8-5
Page 84
Wi-Fi Settings
8
Figure 8-3. WEP Shared Key Security
Key 1 ~ Key 4 – Sets WEP key values. The user must first choose between ASCII
or Hexadecimal keys. At least one key must be specified. Each WEP key has an
index number. The selected key is used for authentication and encryption on the
Wi-Fi interface. Enter key values that match the key type and length settings.
(Default: Hex, 64 bits, no preset value)
• Key Type: Specifies keys as either ASCII or Hexadecimal values.
• Key Length: WEP keys can be set as 64, 128, or 152 bits in length.
• Key: Specify keys as either 5, 13, or 16 alphanumeric characters, or 10, 26, or 32
hexadecimal digits, depending on the selected key length.
Default Key Setting – Sets the WEP key used for authentication and encryption.
(Range: 1-4; Default: 1)
WPA/WPA2 Security
The WPA and WPA2 modes use IEEE 802.1X as their basic framework for user
authentication and dynamic key management. IEEE 802.1X access security uses
Extensible Authentication Protocol (EAP) and requires a configured Remote
Authentication Dial-in User Service (RADIUS) authentication server to be accessible
in the enterprise network. If you select WPA or WPA2 mode, be sure to configure the
RADIUS settings displayed on the page.
The WPA-WPA2-Mixed mode is a transitional mode of operation for networks
moving from WPA security to WPA2. WPA-WPA2-Mixed mode allows both WPA and
WPA2 clients to associate to a common Wi-Fi interface.
8-6
Page 85
Wireless Security
Figure 8-4. WPA/WPA2 Security
RADIUS Setting – Configures RADIUS server settings for WPA, WPA2, or
WPA-WPA2-Mixed security modes.
• IP Address/Server Name – Specifies the IP address or domain name of the
RADIUS server.
• Port Number – The User Datagram Protocol (UDP) port number used by the
RADIUS server for authentication messages. (Range: 1024-65535; Default: 1812)
• Secret – A shared text string used to encrypt messages between the unit and the
RADIUS server. Be sure that the same text string is specified on the RADIUS
server. Do not use blank spaces in the string. (Maximum length: 20 characters)
Note: This guide assumes that you have already configured a RADIUS server in the
attached wired network to support the unit. Configuration of RADIUS server
software is beyond the scope of this guide, refer to documentation provided with
the RADIUS server software.
8
WPA/WPA2 PSK Security
The WPA-PSK, WPA2-PSK, and WPA-WPA2-Mixed-PSK modes use a common
password phrase, called a Pre-Shared Key (PSK), that must be manually distributed
to all clients that want to connect to the network. The Pre-shared Key modes of
WPA/WPA2 remove the need for RADIUS server support in the attached network.
You can specify a key as an easy-to-remember form of letters and numbers. The
WPA Pre-shared Key can be input as ASCII string (8-63 characters) or Hexadecimal
8-7
Page 86
Wi-Fi Settings
8
format (length is 64). All wireless clients must be configured with the same key to
communicate with the VAP interface.
The WPA-WPA2-Mixed-PSK mode is a transitional mode of operation for networks
moving from WPA security to WPA2. WPA-WPA2-Mixed-PSK mode allows both
WPA and WPA2 clients to associate to a common Wi-Fi interface.
Figure 8-5. WPA/WPA2 PSK Security
WPA Pre-Shared Key – The key required for WPA-PSK, WPA2-PSK, and
WPA-WPA2-Mixed-PSK modes. There are.two methods for key entry: An ASCII
string of 8~63 characters in length (0~9, A~F, including spaces), or 64 hexadecimal
digits.
MAC Authentication
Wireless clients can be authenticated for network access by checking their MAC
address against a local database configured on the OD200. You can configure a list
of up to 32 wireless client MAC addresses in the filter list to either allow or deny
network access.
8-8
Page 87
MAC Authentication
Figure 8-6. MAC Authentication
System Default – Specifies the action for MAC addresses listed in the local MAC
Authentication Table.
• Deny: Blocks access for all MAC addresses listed in the MAC Authentication
Table. Clients with MAC addresses not listed in the table are permitted access.
• Allow: Permits access for all MAC addresses listed in the MAC Authentication
Table. Clients with MAC addresses not listed in the table are denied access.
Local MAC Filter Settings – Adds new MAC addresses to the MAC Authentication
Table, or removes addresses currently listed in the table.
8
• MAC Address: Physical address of a client. Enter six pairs of hexadecimal digits
separated by colons; for example, 00:90:D1:12:AB:89.
• Permission: Select Add to list a new specified MAC address in the MAC
Authentication Table. Select Delete to remove the specified MAC address from the
table.
• Update: Performs the Add or Delete action on the specified MAC address.
MAC Authentication Table – Displays current entries in the MAC filter database.
8-9
Page 88
8
Wi-Fi Settings
8-10
Page 89
Appendix A: Troubleshooting
Diagnosing LED Indicators
Table A-1 Troubleshooting Chart
SymptomAction
IDU Power LED is Off
IDU Power LED is Red• The unit has detected a system error. Reboot the unit to try and clear
IDU LAN link LED is Off• Verify that the unit and attached device are powered on.
Cannot Connect to the Internet
If you cannot access the Internet from the PC, check the following:
• If you cannot access the Internet, be sure your WIndows system is correctly
configured for TCP/IP. The IP settings should be set to “obtain an IP address
automatically.”
• The WAN Type settings for the service provider may not be configured correctly.
Use the web interface to check that the WAN settings match those provided by the
service provider.
• You may be out of the service area of the WiMAX network. Check with the WiMAX
service provider for service coverage information.
If you cannot resolve the problem, check the System Status page of the web interface
•
and contact your WiMAX service provider.
• AC power adapter may be disconnected. Check connections between
the unit, the AC power adapter, and the wall outlet.
the condition.
• If the condition does not clear, contact your local dealer for assistance.
• Be sure the cable is plugged into both the unit and corresponding
device.
• Verify that the proper cable type is used and its leng th does not exceed
specified limits.
• Check the cable connections for possible defects. Replace the
defective cable if necessary.
Cannot Access Web Management
If the management interface cannot be accessed using a web browser:
• Be sure the management station is correctly configured for TCP/IP. The IP settings
should be set to “obtain an IP address automatically.”
• Try a Ping command from the management station to the unit’s IP address to verify
that the entire network path between the two devices is functioning correctly.
A-1
Page 90
Troubleshooting
A
• Check that the management station has a valid network connection and that the
Ethernet port that you are using has not been disabled.
• Check the network cabling between the management station and the unit. If the
problem is not resolved, try using a different port or a different cable.
Forgot or Lost the Password
Set the unit to its default configuration by pressing the reset button on the back
panel for 5 seconds or more. Then use the default password “admin” to access the
management interface.
Resetting the Unit
If all other recovery measures fail and the unit is still not functioning properly, take
either of these steps:
• Reset the unit using the web interface, or through a power reset.
• Reset the unit to its factory default configuration by pressing the reset button on the
back panel for 5 seconds or more. Then use the default password “admin” to
access the management interface.
A-2
Page 91
Appendix B: Specifications
IDU Specifications
Physical Specifications
Ports
4 LAN ports, 10/100BASE-TX with auto-negotiation, RJ-45 connector
ODU port, 10/100BASE-TX with auto-negotiation, PoE, RJ-45 connnector
(Optional) 2 FXS ports (PHONE1, PHONE2), RJ-11 connector
Network Interface
RJ-45 connector, auto MDI/X:
10BASE-T: RJ-45 (100-ohm, UTP cable; Category 3 or better)
100BASE-TX: RJ-45 (100-ohm, UTP cable; Category 5 or better)
LED Indicators
System: Power, WiFi
Ports: Link/Activity
AC Power Adapter
Manufacturer: Asian Power Devices Inc.
Model: NB-65B19
Input: 100~240 VAC, 1.6 A, 50~60 Hz
Output: 19 VDC, 3.42 A
Unit Power Supply
DC Input: 19 VDC, 2 A maximum
Power Consumption: 38 W maximum
Physical Size
170 x 184 x 80 mm (6.69 x 7.24 x 3.15 in)
Weight
568 g (1.25 lbs)
Temperature
Operating: -5 to 40 °C (23 to 104 °F)
Storage: -40 to 75 °C (-40 to 167 °F)
Humidity
5% to 95% (non-condensing)
B-1
Page 92
Specifications
B
VoIP Specifications
Voice Signaling Protocol
SIP v2 (RFC 3261)
Voice Codec
G.711 (a-law and u-law)
G. 72 6
G.729ab
G.723.1
Voice Quality
VAD (Voice Activity Detection)
CNG (Comfortable Noise Generation)
Echo cancellation (G.165/G.168)
Adaptive jitter buffer, up to 200 milliseconds
DTMF tone detection and generation
Call Features
Call transfer
Call waiting/hold/retrieve
3-way conference call
Call blocking
T. 3 8 f ax r e l a y
Dial plan (E.164 dialing plan)
Call forwarding: No Answer/Busy/All
IEEE 802.3-2005 10BASE-T and 100BASE-TX
IEEE 802.11b and 802.11g
UPnP
IDU Specifications
B
B-3
Page 94
B
Specifications
B-4
Page 95
Appendix C: Cables and Pinouts
Twisted-Pair Cable Assignments
For 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires.
Each wire pair is identified by two different colors. For example, one wire might be
green and the other, green with white stripes. Also, an RJ-45 connector must be
attached to both ends of the cable.
Caution: Each wire pair must be attached to the RJ-45 connectors in a specific
orientation. (See “Straight-Through Wiring” on page C-2 and “Crossover
Wiring” on page C-2 for an explanation.)
Caution: DO NOT plug a phone jack connector into the RJ-45 port. Use only twisted-pair
The following figure illustrates how the pins on the RJ-45 connector are numbered.
Be sure to hold the connectors in the same orientation when attaching the wires to
the pins.
cables with RJ-45 connectors that conform with FCC standards.
8
1
Figure C-1 RJ-45 Connector
8
1
10/100BASE-TX Pin Assignments
Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45
connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or
100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure
length of any twisted-pair connection does not exceed 100 meters (328 feet).
The RJ-45 ports on the unit supports automatic MDI/MDI-X operation, so you can
use straight-through or crossover cables for all network connections to PCs,
switches, or hubs. In straight-through cable, pins 1, 2, 3, and 6, at one end of the
cable, are connected straight through to pins 1, 2, 3, and 6 at the other end of the
cable.
that the
C-1
Page 96
Cables and Pinouts
C
Table C-1. 10/100BASE-TX MDI and MDI-X Port Pinouts
PinMDI-X Signal NameMDI Signal Name
1Receive Data plus (RD+)Transmit Data plus (TD+)
2Receive Data minus (RD-)Transmit Data minus (TD-)
3Transmit Data plus (TD+)Receive Data plus (RD+)
4Positive V
5Positive V
port
port
Positive V
Positive V
port
port
6Transmit Data minus (TD-)Receive Data minus (RD-)
7Negative V
8Negative V
port
port
Negative V
Negative V
port
port
Note: The “+” and “-” signs represent the polarity of the wires that make
up each wire pair.
Straight-Through Wiring
If the twisted-pair cable is to join two ports and only one of the ports has an internal
crossover (MDI-X), the two pairs of wires must be straight-through.
EIA/TIA 568B RJ-45 WiringStandard
10/100BASE-TX Straight-through Cable
White/Orange Stripe
Orange
End A
1
2
3
4
5
6
7
8
White/Green Stripe
Blue
White/Blue Stripe
Green
White/Brown Stripe
Brown
1
2
3
4
5
6
7
8
End B
Figure C-2 Straight-Through Wiring
Crossover Wiring
If the twisted-pair cable is to join two ports and either both ports are labeled with an
“X” (MDI-X) or neither port is labeled with an “X” (MDI), a crossover must be
implemented in the wiring.
C-2
Page 97
RJ-11 Ports
EIA/TIA 568B RJ-45 Wiring Standard
10/100BASE-TX Crossover Cable
White/Orange Stripe
Orange
End A
1
2
3
4
5
6
7
8
White/Green Stripe
Blue
White/Blue Stripe
Green
White/Brown Stripe
Brown
1
2
3
4
5
6
7
8
End B
Figure C-3 Crossover Wiring
RJ-11 Ports
Standard telephone RJ-11 connectors and cabling can be found in several common
wiring patterns. These six-pin connectors can accommodate up to three wire pairs
(three telephone lines), but usually only one or two pairs of conductor pins and wires
are implemented.
The RJ-11 ports on this device contain only one wire pair on the inner pins (3 and 4).
C
Red or
Blue/White
Green or
White/Blue
RT
123456
R = RingT = Tip
Figure C-4 RJ-11 Port Pinout
Table C-2. RJ-11 Port Pinout
PinSignal NameWire Color
1Not used
2Not used
3Line 1 RingRed or Blue/White
C-3
Page 98
Cables and Pinouts
C
Table C-2. RJ-11 Port Pinout
PinSignal NameWire Color
4Line 1 TipGreen or White/Blue
5Not used
6Not used
C-4
Page 99
Appendix D: License Information
This product includes copyrighted third-party software subject to the terms of the
GNU General Public License (GPL), GNU Lesser General Public License (LGPL), or
other related free software licences. The GPL code used in this product is distributed
WITHOUT ANY WARRANTY and is subject to the copyrights of one or more
authors. For details, refer to the section “The GNU General Public License” below, or
refer to the applicable licence as included in the source-code archive.
The GNU General Public License
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share
and change it. By contrast, the GNU General Public License is intended to
guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the
Free Software Foundation's software and to any other program whose authors
commit to using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to your
programs, too.
When we speak of free software, we are referring to freedom, not price. Our
General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish), that you
receive source code or can get it if you want it, that you can change the software or
use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you
these rights or to ask you to surrender the rights. These restrictions translate to
certain responsibilities for you if you distribute copies of the software, or if you
modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee,
you must give the recipients all the rights that you have. You must make sure that
they, too, receive or can get the source code. And you must show them these terms
so they know their rights.
D-1
Page 100
License Information
D
We protect your rights with two steps: (1) copyright the software, and (2) offer you
this license which gives you legal permission to copy, distribute and/or modify the
software.
Also, for each author's protection and ours, we want to make certain that everyone
understands that there is no warranty for this free software. If the software is
modified by someone else and passed on, we want its recipients to know that what
they have is not the original, so that any problems introduced by others will not
reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to
avoid the danger that redistributors of a free program will individually obtain patent
licenses, in effect making the program proprietary. To prevent this, we have made it
clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING,
DISTRIBUTION AND MODIFICATION
0.This License applies to any program or other work which contains a notice
placed by the copyright holder saying it may be distributed under the terms of
this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the
Program or a portion of it, either verbatim or with modifications and/or
translated into another language. (Hereinafter, translation is included without
limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by
this License; they are outside its scope. The act of running the Program is not
restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by
running the Program). Whether that is true depends on what the Program does.
1.You may copy and distribute verbatim copies of the Program's source code as
you receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License and
to the absence of any warranty; and give any other recipients of the Program a
copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at
your option offer warranty protection in exchange for a fee.
2.You may modify your copy or copies of the Program or any portion of it, thus
forming a work based on the Program, and copy and distribute such
modifications or work under the terms of Section 1 above, provided that you
also meet all of these conditions:
D-2
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.