No part of this document may be reproduced, republished, or retransmitted in any form or by any means
whatsoever, whether electronically or mechanically, including, but not limited to, by way of photocopying,
recording, information recording, or through retrieval systems without the express written permission of
the owner. Product specifications contained in this document are subject to change without notice. All
other company or product names mentioned are used for identification purposes only and may be
trademarks of their respective owners.
Page 2of 118
User Manual
Contents
About this Manual ......................................................... 6
Scope and Purpose...................................................................................6
Ping Test ............................................................................................................................... 116
Full Modem Test ................................................................................................................... 117
Updating the Firmware ........................................................................117
Restoring the Default Settings.............................................................118
Page 5of 118
User Manual
About this Manual
This manual provides a description of the components, basic operation, and advanced
configuration options of the router.
Scope and Purpose
This manual provides the following:
Installation instructions
Description of the router components and the web interface
Operating instructions of the router and the web interface
Target Audience
This manual is designed and developed for users who are required to install and maintain
the router. It assumes the user of this manual has basic knowledge and experience in
configuring routers, computer networks, and computer systems.
Document Structure
The manual is divided into the following sections:
Chapter About
1 About the router
2 Understanding the web interface
3 Basic setup
4 Advanced settings
5 Diagnostics
Page 6of 118
User Manual
About the Router
Congratulations on the purchase of your router. This router provides advanced features
that allow you to converge your phone, Internet, and other network appliances into a
single network either through wired or wireless connection.
Requirements
Your computer must meet the following minimum requirements.
Software
Operating System:
Any operating system can be used
Browser:
Internet Explorer 4.0
Netscape Navigator 3.02
Hardware
233MHz processor
CD-ROM Drive
Ethernet network adapter
Page 7of 118
User Manual
Package Contents
For any missing items, please contact your dealer immediately. Product contents vary for
different models.
Package Contents
Page 8of 118
User Manual
Device Design
Front Panel
The LEDs on the front panel gives you an idea about the power and connection status.
Label Action Description
POWER Off No power is supplied to the device
Steady light Connected to an AC power supply
ETHERNET Off No Ethernet connection
Steady light Connected to an Ethernet port
Blinking light Transmitting/Receiving data
WiFi Off Access point is disabled
Steady light Access point is enabled
Page 9of 118
User Manual
Blinking light Transmitting/Receiving data
DSL Off No DSL signal
Blinking light Establishing DSL signal
Steady light DSL signal is established
INTERNET Off No Internet connection
Steady light Connected to the Internet
Blinking light Transmitting/Receiving data
Back Panel
The back panel provides ports to power up and connect the router into the network.
Back Panel
Label Used for…
DSL Connecting the telephone cable
ETHERNET 1-4 Connecting with computers/devices through Ethernet cable
RESET Resetting the device. Press for 10 seconds to reset.
9V DC Connecting with the 9V power adapter
ON/OFF Switching the device on/off
Antenna Sending/receiving wireless signals
Page 10of 118
User Manual
Planning Your Network
Before moving ahead to setup your network, it is a good idea to draw out a network
diagram to help identify the devices and plan out how to connect these devices. The
illustration below is an example of a network diagram.
Sample network diagram
To create a network diagram:
For wireless devices, identify the wireless devices you want to include in the
network
For wired devices, identify which router port you want to use for each device.
Page 11of 118
User Manual
Installing the Router
When installing the router, the common practice is to have the router, the main
computer, and phone jack in the same room. The room should also have enough
electrical outlets to match your needs.
Connecting with the POTS Splitter
A phone line can carry phone call and Internet signals. When you enable the phone line
for high speed Internet, the connection produces high-pitched tones when using the
phone. Installing a Plain Old Telephone Service (POTS) splitter separates the two signals
and eliminates the noise.
Note: Consult your service provider what type of POTS Splitter should be used.
The POTS Splitter separates the connection for the router and telephone
To connect with the POTS Splitter:
1. Locate the phone jack in your house.
2. Insert the POTS Splitter into the phone jack.
3. Plug one end of the telephone cable from the POTS Splitter’s ADSL port and then
plug the other end into the router’s DSL port.
4. Plug one end of the telephone cable from the POTS Splitter’s TEL port and then
plug the other end into the telephone.
Page 12of 118
User Manual
Connecting with the Computer
You need to connect the router with the computer before connecting with other devices.
The computer will be used to configure the router settings.
Connecting the router with the computer
To connect with the computer:
1. Plug one end of the Ethernet cable from the router’s ETHERNET port and then plug
the other end into the Ethernet port in your computer.
2. Connect the power adapter from the router’s 9V DC port into the electrical outlet.
3. Use the web interface to configure the device settings. Please refer to
Using the
Setup Menu.
Page 13of 118
User Manual
Connecting Other Ethernet Devices
Aside from the main computer, you can grow your network by adding devices with
Ethernet ports. Connect these devices into available Ethernet ports on the router.
Connecting other devices
To the connect with other devices:
1. Plug one end of the Ethernet cable from computer’s Ethernet port and then plug
the other end into the router’s vacant E port.
2. Use the web interface to configure the settings for the newly added device.
Page 14of 118
User Manual
Connecting Wireless Devices
After you setup the device settings through the main computer, you can connect other
devices with wireless capabilities. Wireless devices relieve you from the task of laying
out cables and allow you to use the Internet connection from your router.
Your router allows you to connect with several wireless devices
To the connect with wireless devices:
1. Turn on your wireless device.
2. Open the software you use to detect a wireless connection. This opens a window
to ask for the connection settings.
3. Enter the connection settings. These settings are defined in your router during
setup. For more details about wireless connections, please refer to Wireless Menu.
Page 15of 118
User Manual
Understanding the Web Interface
Web Interface Components
Buttons, commands, and menus make up the browser-based user interface.
Buttons
Apply
Click to implement the configuration changes. Clicking Apply will not implement
the changes when the router is restarted.
Cancel
Click to revert to the last saved configuration.
Commands
Save Setting
Click to permanently apply configuration changes.
Restart Router
Restarts the router
Restart Access Point
Restarts the wireless connection
Menus
The web interface includes the following menus:
Setup Menu
Basic Menu
Advanced Menu
Page 16of 118
Wireless Menu
Security Menu
Status Menu
Help Menu
Setup Menu
The Setup menu is used to complete the initial device configuration.
User Manual
Setup Menu
Page 17of 118
User Manual
Basic Menu
The Basic Menu provides the Home, Quick Start, LAN Configuration, and Diagnostics links.
Basic Menu
Page 18of 118
User Manual
Advanced Menu
The Advanced mode provides advanced configuration settings for existing connections. At
least one WAN connection must be configured before implementing advanced WAN
configuration features. At least one LAN group must be defined before implementing
advanced LAN configuration features.
Advanced Menu
Page 19of 118
User Manual
Wireless Menu
Wireless Menu allows you to configure the wireless settings.
Page 20of 118
User Manual
Security Menu
Security Menu allows you to configure security tools like IP Filters and LAN Isolation.
Security Menu
Page 21of 118
User Manual
Status Menu
The Status Menu provides the status for different connections or interfaces.
Status Menu
Page 22of 118
Help Menu
The Help Menu provides documentation about various router features.
User Manual
Help Menu
Page 23of 118
User Manual
Setup
This chapter provides information about removing conflicts and configuring device
settings.
Remove or Disable Conflicts
To make sure the router installation moves on smoothly, you need to remove or disable
conflicts that may interfere the installation. Probable conflicts may include:
Internet sharing applications
Proxy software
Security software
TCP/IP settings
Internet properties
Temporary Internet files
Internet Sharing, Proxy, and Security Applications
Internet sharing, proxy software, and firewall applications may interfere with the router
installation. These should be removed or disabled before you install and configure the
router.
If you have any of the following or similar applications installed on your computer,
remove or disable them according to the manufacturer’s instructions.
Internet Sharing Applications Proxy Software Security Software
Microsoft Internet Sharing WinGate Symantec
WinProxy Zone Alarm
Page 24of 118
User Manual
Configuring TCP/IP Settings
After connecting the device, you need to set the TCP/IP Properties in your computer.
Note: These instructions apply to connections made using the Ethernet port.
To set the TCP/IP properties:
1. Select Start > Run. This opens the Run dialog box.
2. Enter control ncpa.cpl and then click OK. This opens the Network Connections in
your computer.
3. Right-click LAN and then select Properties. This opens the Local Area Connection
Properties dialog box.
4. Select Internet Protocol (TCP/IP) and then click Properties. This opens the Internet
Protocol (TCP/IP) dialog box.
5. Select Obtain an IP address automatically.
6. Click OK to close the Internet Protocol (TCP/IP) dialog box.
7. Click OK to close the Local Area Connection Properties dialog box.
Configuring Internet Properties
To set the Internet Properties:
1. Select Start > Run. This opens the Run dialog box.
2. Enter control inetcpl.cpl and then click OK. This opens the Internet Properties
dialog box.
3. Click Connections tab.
4. In the Dial-up and Virtual Private Network settings pane, select Never dial a
connection.
5. Click OK to close the Internet Properties dialog box.
Page 25of 118
User Manual
Removing Temporary Internet Files
To remove temporary Internet files:
1. Select Start > Run. This opens the Run dialog box.
2. Enter control and then click OK. This opens the Control Panel.
3. Double-click Internet Options. This opens the Internet Options dialog box.
4. In the Temporary Internet Files pane, click Delete Cookies.
5. Click Delete Files.
6. Click OK to close the Internet Properties dialog box.
Page 26of 118
User Manual
Using the Setup Menu
After connecting the devices, you need to configure the router settings via the web
interface.
To open the web interface:
1. Open your browser.
2. Enter 192.168.1.1 in the address field and then press Enter. This opens the Setup
page of the web interface.
Setup Page
Page 27of 118
User Manual
3. Click Step 1: Internet Login Account Setting. This opens the Internet Login Account
Setting page.
Internet Login Account Setting page
4. Enter the User ID, Password, Protocol, VP1, and VCI for your account. These are the
account information from your service provider.
5. Click Next. This opens the Wireless LAN Configuration page.
Page 28of 118
User Manual
Wireless LAN Configuration page
6. Enter an SSID, Country Standard, and Wireless Channel.
7. Select Yes or No to specify if you want to hide your wireless network name or not.
8. Click Next. This opens the Wireless LAN Security page.
Wireless LAN Security
9. Select Enable Wireless Security.
Page 29of 118
User Manual
10. Enter an Encryption Key or click Generate to allow the router to create an
alphanumeric encryption key for you. The Encryption key will be used to establish
the wireless network connection of wireless devices.
Page 30of 118
11. Click Next. This opens the System Password page.
System Password page
User Manual
12. Select Enable Authentication.
13. Enter User Name, Password, and Confirm Password.
14. Enter the number of minutes for Idle Timeout.
15. Click Next. This opens the Summary page.
16. Click Finish.
Page 31of 118
User Manual
17. This opens a dialog box asking if you want to save and restart the router. Click OK.
The router will take about two minutes to save the settings and establish a
connection with your Internet service provider. Afterwards, the Basic Home page
opens to give you a summary of the account settings.
Basic Home page
Setting Up Via the Utility Wizard
The Setup Wizard can also be used to configure your router. However, this only runs on
Windows operating systems.
Notes: Microsoft Windows 2000 users may be asked to confirm the installation. To confirm,
click Yes.
Microsoft Windows XP users may be asked to confirm the installation. To confirm, click
Continue Anyway.
To use the Setup Wizard:
1. Insert the Utility CD into your CD-ROM.
2. If the utility does not launch automatically, select Start > Run, enter D:\Setup.exe
(where D: is your CD-ROM drive), and then click OK. This opens the Setup Utility.
3. Select your router model and then follow the installation procedure.
4. After a successful connection, on the router’s front panel, INTERNET lights up.
Page 32of 118
User Manual
Setting the Administrator Account
Anyone who can access the web interface can be considered an Administrator. To restrict
access to the web interface, you need to set the System Password.
Changing the System Password
To change the System Password:
1. Select Advanced Menu
2. Click System Password. This opens the System Password page.
3. Select Enable Authentication.
4. Enter your password.
5. Reenter your password in the Confirm Password text box.
6. To temporarily implement the settings, click Apply.
7. To make changes permanent, click Save Settings.
Note: Remember your account information. If you forget the User Name and System Password, you
will need to reset the router to its default settings. To reset, press RESET at the router’s back
panel for 10 seconds.
Changing the Timeout Settings
To change the timeout settings:
1. Select Advanced Menu
2. Click System Password.
3. Select Enable Authentication.
4. Enter the number of minutes in the Idle Timeout text field.
5. To temporarily implement the settings, click Apply.
Page 33of 118
User Manual
6. To make changes permanent, click Save Settings.
Network Setup
There are two types of network configuration for your router: WAN setup and LAN setup.
WAN Setup
Wide Area Network (WAN) is also referred to as the broadband connection.
Connection settings differ for every service provider. Most of the configuration you
perform is for the WAN connection.
LAN Setup
The router is preconfigured to automatically provide an IP address to all the
computers in the Local Area Network (LAN). However, if you are familiar with
your network setup, you can manually configure the LAN settings.
WAN Setup
Wide Area Network refers to the configurations you perform to establish an Internet
connection. There are several types of WAN connections that require different settings.
New Connection
Your router supports the creation of new connections. If you have multiple virtual
connections, you may need to utilize the static routing capabilities of the modem to pass
data correctly.
WAN connections types include:
PPPoE Connection
PPPoA Connection
Static Connection
DHCP Connection
Page 34of 118
User Manual
Bridge Connection
CLIP Connection
PPPoE Connection
PPP, or point-to-point protocol, is a method of establishing a network connection/session
between network hosts. PPPoE is a protocol for encapsulating PPP frames in Ethernet
frames and is described in RFC 2516. PPPoE provides the ability to connect to a network
of hosts over a simple bridging access device to a remote access concentrator. With this
model, each router uses its own PPP stack. Access control, billing, and type of service
control can all be done on a per-user rather than per-site basis.
New PPPoE Connection Setup
Page 35of 118
User Manual
PPPoA Connection
PPPoA is also known as RFC 2364. It is a method of encapsulating PPP packets in ATM
cells that are carried over the DSL line. PPP, or point-to-point protocol, is a method of
establishing a network connection/session between network hosts. It usually provides a
mechanism of authenticating users. Logical link control (LLC) and virtual circuit (VC) are
two different methods of encapsulating the PPP packet. Contact your service provider to
determine which encapsulation is being used on your Internet connection.
New PPPoA Connection Setup
Page 36of 118
User Manual
Static Connection
Static connection type is used whenever a known static IP address is assigned to the
router. Additional addressing information such as the subnet mask and the default
gateway must also be specified. Up to three domain name server (DNS) addresses can be
identified. These servers resolve the name of the computer to the IP address mapped to
it and thus enable you to access other web servers by typing the symbolic name (host
name).
New Static Connection Setup
Page 37of 118
User Manual
DHCP Connection
DHCP allows the router to automatically obtain the IP address from the server. This option
is commonly used in when the IP is dynamically assigned and is not known prior to
assignment.
New DHCP Connection Setup
Page 38of 118
User Manual
Bridge Connection
A pure bridged connection does not assign any IP address to the WAN interface. NAT and
firewall rules are not enabled. This connection method makes the router act as a bridge
for passing packets between the WAN interface and the LAN interface.
New Bridge Connection Setup
Page 39of 118
User Manual
CLIP Connection
Classical IP over ATM (CLIP) Connection Setup page (CLIP) provides the ability to transmit
IP packets over an ATM network. CLIP support encapsulates an IP datagram in an AAL5
PDU frame using RFC 2225 and it uses an ATM-aware version of the address resolution
protocol (ATMARP).
CLIP Connection Setup
Page 40of 118
User Manual
ADSL Modulation
ADSL Modulation allows you to select any combination of DSL training modes. Leave the
default value if you are unsure or the service provider did not provide this information. In
most cases, this screen should not be modified.
ADSL Modulation
Page 41of 118
User Manual
Connection Scan
This feature helps users to detect the PVC settings provided by the service provider.
Before the router can begin scanning the connection, the telephone line has to be
plugged into the router.
Connection Scan
To perform connections scan:
1. Select the Advanced Menu.
2. Select WAN > Connection Scan.
3. Click Scan.
Page 42of 118
User Manual
LAN Setup
The router is preconfigured to automatically provide IP addresses to all the computers in
the Local Area Network (LAN). Your router allows you to create and configure LAN
groups.
LAN Configuration
Your router’s default IP address and subnet mask are 192.168.1.1 and 255.255.255.0,
respectively. This subnet mask allows the router to support 254 users. If you want to
support more users, you need to edit the subnet mask but remember that the DHCP
server is defaulted to only give out 255 IP addresses. If you change your gateways’ IP
address and you have DHCP enabled, the DHCP configuration must reside within the
same subnet. The default gateway is the routing device used to forward all traffic that is
not addressed to a station within the local subnet. Your ISP will provide you with the
default gateway Address.
LAN Configuration
Page 43of 118
User Manual
To configure the LAN groupings:
1. Select the Advanced Menu.
2. Select LAN > LAN Configuration.
3. Select ETHERNET in LAN group 1 and then click < Remove. No packets will be sent
to the ETHERNET interface because it does not belong to any LAN group.
4. Select ETHERNET from Interfaces and then click Add > under LAN group 2. Just like
in LAN group 1, Configure will appear in LAN group 2 to allow the definition of
additional configurations.
5. To temporarily activate the settings, click Apply.
6. To make changes permanent, click Save Settings.
Page 44of 118
User Manual
LAN Group Configuration
LAN Group Configuration allows you to configure settings for each LAN group. Notice that
you can also view the status of advanced services that can be applied to a LAN group.
Green indicates that the service is enabled, while red indicates that the service is
disabled.
LAN Group Configuration
Category Field Description
Unmanaged Unmanaged is a state when the LAN group is not
configured and no IP address has been assigned to the
bridge.
Obtain an IP address
automatically
IP Address You can retrieve/renew an IP address from the DHCP
Netmask The subnet mask of your router.
When this function is enabled, your router acts like a
client and requests an IP address from the DHCP server
on the LAN side.
server using the Release and Renew buttons.
Page 45of 118
User Manual
PPP IP Address Enables/disables PPP unnumbered feature.
IP Address The IP address should be different but within the same
subnet as the WAN-side IP address.
Use the following Static IP
address
This field enables you to change the IP address of the
router.
IP Address The default IP address of the router (as shown) is
192.168.1.1.
Netmask The default subnet mask of your router is 255.255.255.0.
This subnet allows the router to support 254 users. If you
want to support a larger number of users you can
change the subnet mask.
Default Gateway The default gateway is the routing device used to
forward all traffic that is not addressed to a station
within the local subnet. Your ISP provides you with the
IP address of the default gateway.
Host Name The host name is used in conjunction with the domain
name to uniquely identify the router. It can be any
alphanumeric word that does not contain spaces.
Domain The domain name is used in conjunction with the host
name to uniquely identify the router. To access the web
pages of the router you can type 192.168.1.1 (the IP
address) or mygateway1.ar7 (Host Name.Domain).
Enable DHCP Server Enables/disables DHCP. By default, your router has the
DHCP server (LAN side) enabled. If you already have a
DHCP server running on your network, you must disable
one of the two DHCP servers.
Assign ISP DNS,
SNTP
Enable/disables the Assign ISP DNS, SNTP feature when
the DHCP server of your router has been enabled. To
learn more, please refer to
Assign ISP DNS, SNTP.
Start IP The Start IP Address is where the DHCP server starts
issuing IP addresses. This value must be greater than the
IP address value of the router. For example, if the IP
address of the router is 192.168.1.1 (default), then the
starting IP address must be 192.168.1.2 (or higher).
Note: If you change the start or end values, make sure
the values are still within the same subnet as the router.
In other words, if the IP address of the router is
192.168.1.1 (default) and you change the DHCP
start/end IP addresses to be
192.168.1.2/192.168.1.100, you cannot communicate
Page 46of 118
User Manual
with the router if your host has DHCP enabled.
End IP The End IP Address is where the DHCP server stops
issuing IP addresses. The ending address cannot exceed
a subnet limit of 254; hence the max value for the
default gateway is 192.168.1.254. If the DHCP server
runs out of DHCP addresses, users do not get access to
network resources. If this happens, you can increase the
Ending IP address (to the limit of 254) or reduce the
lease time.
Note: If you change the start or end values, make sure
the values are still within the same subnet as the IP
address of the router. In other words, if the IP address of
the router is 192.168.1.1 (default) and you change the
DHCP start/end IP addresses to be
192.168.1.2/192.168.1.100, you cannot communicate
with the router if your host has DHCP enabled.
Lease Time The Lease Time is the amount of time that a network
user is allowed to maintain a network connection to the
router using the current dynamic IP address. At the end
of the Lease Time, the lease is either renewed or the
DHCP server issues a new IP. The amount of time is in
units of seconds. The default value is 3600 seconds (1
hour). The maximum value is 999999 seconds
(About 278 hours).
Enable DHCP Relay In addition to the DHCP server feature, the router
supports the DHCP relay function. When the router is
configured as DHCP server, it assigns the IP addresses to
the LAN clients. When the gateway is configured as
DHCP relay, it is responsible for forwarding the requests
and responses negotiated between the DHCP clients and
the server.
Relay IP The IP address of the DHCP relay server.
Server and Relay Off When the DHCP server and relay functions are turned
off, the network administrator must carefully configure
the IP address, Subnet Mask, and DNS settings of every
host on your network. Do not assign the same IP address
to more than one host. Also, your router must reside on
the same subnet as all the other hosts.
Page 47of 118
User Manual
Assign ISP DNS, SNTP
When you enable the DHCP server, the router dynamically assigns IP addresses to
computers in the local network. The router provides its own LAN IP address (192.168.1.1)
as both the gateway and the DNS server.
The router has a choice of advertising its own IP address (192.168.1.1) as the DNS server
or providing the DNS that was received from the WAN. This can be configured by
enabling/disabling Assign ISP DNS SNTP on the LAN Group Configuration page.
Note: ISP DNS, SNTP only applies when the DHCP server is enabled on the LAN Group Configuration
page.
LAN Clients
LAN Clients allows you to view and add computers in a LAN group. Each computer either
has a dynamic or static (manually-configured) IP address.
You can add a static IP address (belonging to the router’s LAN subnet) using the LAN
Clients page. Any existing static entry falling within the DHCP server's range can be
deleted.
LAN Clients
Page 48of 118
User Manual
To add LAN Clients:
1. Select Advanced Menu.
2. Select LAN > LAN Clients. This opens the LAN Clients page.
3. Select a LAN Connection, and enter IP Address, Hostname, and MAC Address.
4. Click Apply.
5. You can convert the dynamic into a static entry by clicking Reserve, and then click
Apply.
6. To temporarily implement the settings, click Apply.
7. To make changes permanent, click Save Settings.
Page 49of 118
User Manual
Wireless Setup
The SSID default is yournetworkname. SSID is wireless network name for the wireless
router. Your wireless client needs this name to establish wireless connection. The
wireless setup allows the user to enable or disable the Access Point (AP). Disabling
Access Point will prevent the wireless router from emitting any wireless signal.
Wireless Setup
To access Wireless Setup:
1. Select the Wireless Menu.
2. Select Setup.
Page 50of 118
User Manual
Wireless Configuration
For users who want to explore the advanced features, you can click on the Advanced
button. The options listed can be changed to cater for advance users.
Wireless Configuration
To access Wireless Setup:
1. Select the Wireless Menu.
2. Select Configuration.
Page 51of 118
User Manual
Multiple SSID
Multiple SSID allows you to use a primary and a secondary SSID. The SSID field takes up
to 32 alphanumeric characters. Change the VLAN ID to a number different from zero
(between 1 to 4095).
Multiple SSID
To access Wireless Setup:
1. Select the Wireless Menu.
2. Select Multiple SSID.
Page 52of 118
User Manual
Wireless Security
It is important for user to enforce security in wireless LAN environment. This is to prevent
unauthorized wireless users from accessing your router. By default, None is selected.
Wireless Security
WEP
WEP is a security protocol for WLAN. WEP provides security by encrypting the data that is
sent over the WLAN. You can configure up to 4 sets of keys for your wireless client.
The router supports three levels of WEP encryption:
64-bit encryption
128-bit encryption
256-bit encryption
Page 53of 118
User Manual
With WEP, the receiving station must use the same key for decryption. Each radio
network interface card (NIC) and router must be manually to use the same key.
Wireless Security - WEP
To configure WEP:
1. Select the Wireless Menu.
2. Select Security. This opens the Wireless Security page.
3. Select WEP.
4. Select Enable WEP Wireless Security.
5. Enter an Encryption Key.
6. Select a Cipher option.
7. To temporarily implement changes, click Apply.
8. To make changes permanent, click Save Settings.
Page 54of 118
User Manual
802.1x
802.1x is a security protocol for WLAN. It is a port-based network access control that
keeps the network port disconnected until authentication is completed. 802.1x is based
on extensible authentication protocol (EAP). EAP messages from the authenticator to the
authentication server typically use the remote authentication dial-in user service
(RADIUS) protocol.
Wireless Security – 802.1x
To configure 802.1z:
1. Select the Wireless Menu.
2. Select Security. This opens the Wireless Security page.
3. Select 802.1x.
4. Enter the IP address of your RADIUS server.
5. To temporarily implement changes, click Apply.
6. To make changes permanent, click Save Settings.
Page 55of 118
User Manual
WPA
WPA is the short term for WiFi Protected Access. WPA is an industry-supported, pre-
standard version of 802.11i that utilizes the Temporal Key Integrity Protocol (TKIP), which
fixes the problems of WEP, which includes using dynamic keys. WPA uses a sophisticated
key hierarchy that generates new encryption keys each time a mobile device establishes
itself with an Access Point. Protocols including 802.1X, EAP, and RADIUS are used for
strong authentication. Like WEP, keys can still be entered manually (pre-shared keys);
however, using a RADIUS authentication server provides automatic key generation and
enterprise-wide authentication. WPA uses temporal key integrity protocol (TKIP) for data
encryption. WPA2, also known as 802.11i, uses advanced encryption standard counter
mode CBC-MAC protocol (AES-CCMP) for data encryption.
Wireless Security – WPA
To access Wireless Setup:
1. Select the Wireless Menu.
2. Select Security.
3. Select WPA.
Page 56of 118
User Manual
Wireless Management
The wireless management function gives another level of security to your router. It
allows you to permit or ban devices by entering the MAC address or selecting devices
that are currently connected.
Access List
This feature permits you to permit or ban wireless clients by using the MAC address.
Wireless Management – Access List
To permit or ban a client through the Access List page:
1. Select the Wireless Menu.
2. Select Wireless Management. This opens the Wireless Management page.
3. Select Enable Access List.
4. Enter the MAC address.
5. Select Allow or Ban.
6. To temporarily implement the settings, click Apply.
7. To make changes permanent, click Save Settings.
Page 57of 118
User Manual
Associated Stations
Clients connected to the wireless router are displayed in this page.
Wireless Management – Associated Stations
To permit or ban a client through the Access List page:
1. Select the Wireless Menu.
2. Select Wireless Management. This opens the Wireless Management page.
3. Select Associated Stations.
4. Select Allow or Ban beside the wireless client.
5. To temporarily implement the settings, click Apply.
6. To make changes permanent, click Save Settings.
Page 58of 118
User Manual
Wireless Distribution System
Wireless distribution system (WDS) is a system that interconnects BSS to build a premise
wide network. WDS network allows users of mobile equipment to roam and stay
connected to the available network resources.
Wireless Distribution System
Field Description
WDS Mode The following WDS mode are available:
Bridge: In Bridge mode, the Access Point basic service set (BSS) service is enabled.
Repeater: In Repeater mode, the Access Point BSS is disabled when connection to
the upper layer Access Point is established
Crude: In Crude mode, the Access Point BSS is always enabled; however the links
between Router are configured statically and are not maintained.
Disabled (Default): WDS inactive.
In both Bridge and Repeater modes, WDS uses management protocol to establish
and maintain links between Router.
WDS Name The WDS name is used to identify WDS network. The field takes up to eight
characters. Two or more WDS networks may exist in the same area.
Activate as Root This field must be checked for the root device in WDS hierarchy. Only one WDS root
device may exist in WDS network. This field is not applicable for Crude mode.
WDS Privacy Checking this field commands WDS manager to use a secured connection between
Router in the WDS network. Security settings must be the same in all Router in the
WDS network.
Note: WDS privacy is not supported in Crude mode.
Page 59of 118
User Manual
Secret The 32-character alphanumeric privacy key.
Auto Channel
Selection
Auto
Configuration
Uplink
Connection
Downlink
Connection
Auto channel selection is not supported in the current version.
Auto configuration is not supported in the current version.
The BSS ID of the upper device in the WDS hierarchy. This uplink cannot be
configured if root is enabled.
The BSS ID of the lower device in the WDS hierarchy connected to this Access Point.
Up to four downlinks can be configured.
Page 60of 118
User Manual
Security Settings
Configuring IP Filters
IP filtering allows you to block specific applications/services based on the IP address of
the LAN device. In this page, you can block specific traffic (for example, block web
access) or any traffic from a host on your local network.
A database of predefined IP filters allows you to apply one or more filtering rules to one
or more members of a defined LAN group. You can view the rules associated with a
predefined filter and add the available rules for a given category. You can also create,
edit, or delete your own IP filter rules.
IP Filters
To configure IP Filters:
1. Select the Security Menu and then click IP Filters.
2. On the IP Filters page, select LAN Group and LAN IP. If the desired LAN IP is not
available in the LAN IP drop-down menu, you can add it using the LAN Client
page, which is accessed by clicking New IP.
3. Select the available rules for a given category. Click View to view the rule
associated with a predefined filter. Click Add to apply the rule for this category.
Page 61of 118
User Manual
4. If a rule is not in the list, you can create your own rule in the User category. Select
User, and then click New.
5. The Rule Management page opens for you to create new rules. Enter Rule Name,
Protocol, Port Start, Port End, and Port Map, and then click Apply.
The rules you create will appear in the Available Rules pane in the User category.
You can view or delete the rules you create.
6. Continue to add rules as they apply from each category using the Add button.
7. To temporarily implement the changes, click Apply.
8. To make the change permanent, click Save Settings.
LAN Isolation
LAN isolation allows you to disable the flow of packets between two LAN groups. This
allows you to secure information in private portions of the LAN from other publicly
accessible LAN segments.
LAN Isolation
To enable LAN Isolation:
1. Select the Security Menu and then click LAN Isolation.
Page 62of 118
User Manual
2. On the LAN Isolation page, select the checkbox for Disable traffic between LAN
group 1 and LAN group 2.
3. To temporarily implement the changes, click Apply.
4. To make changes permanent, click Save Settings.
URL Filters
URL Filtering allows the router to block access to certain websites by examining its URL, a
text string describing a unique location on the Internet. If the URL contains a blocked
keyword, then access to that website will be denied.
To apply URL filters:
1. Select the Security Menu and then click URL Filters.
2. In the URL Filters page, select Enable.
3. Enter the keyword and then click Add.
4. To remove keywords, select the keyword and then click Remove.
5. To temporarily implement the changes, click Apply.
6. To make changes permanent, click Save Settings.
Page 63of 118
User Manual
Help
The Help page provides documentation for various topics like Firewall, Bridge Filters, LAN
Clients, LAN Group Configuration, PPP Configuration, UPnP, IP QoS, and Routing
Information Protocol. To access Help, select the Help Menu.
Help
Page 64of 118
Advanced Settings
This chapter provides advanced configuration options for your router.
Applications
Applications include:
Universal Plug and Play (UPnP)
Simple Network Timing Protocol (SNTP)
Simple Network Management Protocol
User Manual
Internet Group Management Protocol (IGMP) Proxy
TR-068 WAN Access
TR-069
NAT Services
DNS Proxy
Dynamic DNS Client
Easy Connect Configuration
Prot Triggering
Port Forwarding
Bridge Filters
Web Access Control
SSH Access Control
Page 65of 118
User Manual
Universal Plug and Play
Universal plug and play (UPnP), NAT, and firewall traversal allow traffic to pass through
the router for applications using the UPnP protocol. This feature requires one active WAN
connection. In addition, the computer should support this feature. In the presence of
multiple WAN connections, select a connection on which the incoming traffic is present,
for example, the default WAN connection.
UPnP
To configure UPnP:
1. Select Advanced.
2. Select Application > Enable UPnP.
3. Select the WAN Connection and LAN Connection that will use UPnP from the drop-
down lists.
4. Click Apply to temporarily apply the settings.
5. To make changes permanent, click Save Settings.
Page 66of 118
User Manual
Simple Network Timing Protocol
Simple network timing protocol (SNTP) is a protocol used to synchronize the system time
to the public SNTP servers. It uses the UDP protocol on port 123 to communicate between
clients and servers.
SNTP
To enable SNTP:
1. Check Enable SNTP.
2. Configure the following fields:
Primary SNTP Server The IP address or the host name of the primary SNTP
server. This can be provided by ISP or defined by user.
Secondary SNTP Server The IP address or the host name of the secondary
SNTP server. This can be provided by ISP or defined by user.
Tertiary SNTP Server The IP address or the host name of the tertiary SNTP
server. This can be provided by ISP or defined by user.
Timeout If the router failed to connect to an SNTP server within the
Timeout period, it retries the connection.
Page 67of 118
User Manual
Polling Interval The amount of time between a successful connection with
a SNTP server and a new attempt to connect to an SNTP server.
Retry Count The number of times the router tries to connect to an SNTP
server before it tries to connect to the next server in line.
Time Zone The time zone in which the router resides.
Day Light Select this option to enable/disable daylight saving time (DST).
DST is not automatically enabled or disabled. You need to manually enable
and disable it.
3. Click Apply to temporarily apply the settings.
4. To make changes permanent, click Save Settings.
Page 68of 118
User Manual
Simple Network Management Protocol
SNMP (Simple Network Management Protocol) is a troubleshooting and management
protocol, which uses the UDP protocol on port 161 to communicate between clients and
servers. SNMP uses a manager MIB (management information base) agent solution to
fulfill the network management needs. The agent is a separate station that can request
data from an SNMP agent in each of the different system in the network. The agent uses
MIBs as dictionaries of manageable objects. Each SNMP-managed device has at least one
agent that can respond to the queries from the NMS. The SNMP agent supports GETS,
SETS, and TRAPS for 4 groups with MIB-II: System, Interface, IP, and ICMP. The SNMP
Port triggering is a specialized form of port forwarding which enables computers behind
NAT to be accessed. It triggers open an incoming port when a client on the LAN makes an
outgoing connection to a predetermined port on a server.
Port Trigegering
Page 78of 118
User Manual
To access port triggering:
1. Select Advanced Menu.
2. Select Application > Port Triggering.
Port Forwarding
Port forwarding (or virtual server) allows you to direct incoming traffic to specific LAN
hosts based on a protocol port number and protocol. Using the Port Forwarding page, you
can provide local services (for example, web hosting) for people on the Internet or play
Internet games. Port forwarding is configurable per LAN group.
Port Forwarding
A database of predefined port forwarding rules allows you to apply one or more rules to
one or more members of a defined LAN group. You can view the rules associated with a
predefined category and add the available rules for a given category. You can also
create, edit, or delete your own port forwarding rules.
To configure port forwarding:
1. Select Advanced.
2. Select Application > Port Forwarding.
Page 79of 118
User Manual
3. Select WAN Connection, LAN Group, and LAN IP. If the desired LAN IP is not
available in the LAN IP drop-down menu, you can add it using the LAN Client
page, which is accessed by clicking New IP.
4. Select the available rules for a given category and click Add to apply the rule for
this category. If a rule is not in the list, you can create your own rule in the User
category. Select User, and then click New.
5. The Rule Management page opens for you to create new rules. Enter Rule Name,
Protocol, Port Start, Port End, and Port Map, and then click Apply.
6. Continue to add rules as they apply from each category.
7. Click Apply to temporarily activate the settings.
8. To make changes permanent, click Save Settings.
DMZ Settings
Setting a host on your local network as demilitarized zone (DMZ) forwards any network
traffic that is not redirected to another host via the port forwarding feature to the IP
address of the host. This opens the access to the DMZ host from the Internet. This
function is disabled by default. By enabling DMZ, you add an extra layer of security
protection for hosts behind the firewall.
To enable DMZ Settings:
1. On the Port Forwarding page, select Enable DMZ. This opens the DMZ Settings
page.
2. Select the WAN Connection, LAN Group, and LAN IP Address.
3. Click Apply to temporarily apply the settings.
4. To make changes permanent, click Save Settings.
Page 80of 118
User Manual
Custom Port Forwarding
The Custom Port Forwarding page allows you to create up to 15 custom port forwarding
entries to support specific services or applications, such as concurrent NAT/NAPT
operation.
Bridge Filters
The Bridge Filters allows you to enable, add, edit, or delete the filter rules. When bridge
filtering is enabled, each frame is examined against every defined filter rule in sequence.
When a match is found, the appropriate filtering action (allow or deny) is performed. Up
to 20 filter rules are supported with bridge filtering.
Bridge Filters
To configure Bridge Filters:
1. Select Advanced.
2. Select Application > Bridge Filters. This opens the Bridge Filters page.
3. Select Enable Bridge Filters.
4. To add a rule, enter the source MAC address, Destination MAC address, and
Protocol with desired filtering type, then click Add.
Note: You can also edit a rule that you created using the Edit checkbox. You can delete using Delete.
Page 81of 118
User Manual
5. Click Apply to temporarily activate the settings.
6. To make changes permanent, click Save Settings.
Web Access Control
The Web Access Control page allows you to access the router via the web from a remote
location like your home or office.
Web Access Control
To configure Web Access:
1. Select Advanced Menu.
2. Select Application > Web Access Control.
3. Select Enable.
4. Select the connection used in Choose a connection.
5. Configure the following fields:
Remote Host IP
Remote Netmask
Page 82of 118
User Manual
Redirect Port
6. Click Apply to temporarily activate the settings on the page. The WAN address is
now added into the IP Access List. This allows you to access you router remotely.
7. To make changes permanent, click Save Settings.
SSH Access Control
SSH Access control allows you to access the router remotely via SSH from the WAN side.
SSH Access Control
To configure SSH Access Control:
1. Select Advanced Menu.
2. Select Application > SSH Access Control. This opens the SSH Access Control page.
3. Select Enable.
4. Enter the IP address of the remote computer you want to use in Remote Host IP.
5. Enter the Remote Netmask.
6. To temporarily implement the settings, click Apply.
7. To make changes permanent, click Save Settings.
Page 83of 118
User Manual
Quality of Service
Quality of service allows network administrators to configure the routers to meet the real
time requirements for voice and video.
Different networks use different QoS markings like:
ToS network: ToS bits in the IP header
VLAN network: priority bits in the VLAN header
DSCP network: uses only 5 bits of the CoS
WLAN: WLAN QoS header.
The QoS framework is supported on all the above domains. How do you make them talk
to each other? How can you make sure the priority from one network is carried over to
another network? Class of service (CoS) is introduced as the common language for the
QoS mappings. When QoS is enabled, the router has full control over packets from the
time they enter the router till they leave the router. This is how it works: The domain
mapping (ToS bits, priority bits, etc.) of a packet needs to be translated to CoS when the
packet enter the router, and vice versa, the CoS of a packet needs to be translated back
to the domain mapping when the packet leaves the router.
There are 6 types of CoS (in descending priority):
CoS1
CoS2
CoS3
CoS4
CoS5
CoS6
Page 84of 118
User Manual
The rules are:
1. CoS1 has absolute priority and is used for expedited forwarding (EF) traffic. This is
always serviced till completion.
2. CoS2-CoS5 are used for assured forwarding (AF) classes. They are serviced in a
strict round robin manner using the following priority scheme:
CoS2 > CoS3 > CoS4 > CoS5
3. CoS6 is for best effort (BE) traffic. This is only serviced when there is no other class
of service. If QoS is not enabled on your router, all traffic will be treated as best
effort.
There are some additional terms you should get familiarize with:
Ingress: Packets arriving into the router from a WAN/LAN interface.
Egress: Packets sent from the router to a WAN/LAN interface.
Trusted mode: Honors the domain mapping (ToS byte, WME, WLAN user priority).
Untrusted mode: Does not honor domain mapping. This is the default QoS setting.
Traffic Conditioning Agreement (TCA): The TCA needs to be defined for each
interface:
o Ingress mappings (Domain =>CoS)
o Egress Mappings (CoS => Domain)
o Untrusted mode (default)
Shaper
Page 85of 118
User Manual
Egress
For packets going out of the router, the markings (CoS) need to be translated to the
mappings understood by the network domains. The reverse CoS and domain mapping is
configured using the Egress. To access Egress, select the Advanced Menu and then select
QoS > Egress.
There are three Egress modes:
No Egress mode
Layer 2
Layer 3
No Egress Mode
The default Egress page setting for all interfaces is No Egress. In this mode, the domain
mappings of the packets are untouched.
Egress
Page 86of 118
User Manual
Layer 2
The Egress Layer 2 page allows you to map the CoS of an outgoing packet to user priority
bits, which is honored by the VLAN network. Again, this feature is only configurable on
the WAN interfaces as VLAN is only supported on the WAN side in the current release.
Layer 2
Field Description
Interface Select the WAN interface to configure the QoS for outgoing packets; LAN interface
cannot be selected as VLAN is currently supported on the WAN side only.
Unclassified
Packet
Class of Service The selections are (in the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5,
User Priority The selections are 0, 1, 2, 3, 4, 5, 6, 7.
Some locally generated packets might not have been classified and thus do not have
a CoS value, such as PPP control packet and ARP packet. You can define the CoS for
all unclassified outgoing packets on layer 2 using this field, which will then pick up
the user priority bits based on the mapping rules you create. The selections are (in
the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5, and CoS6. The
default value is CoS1 (recommended).
and CoS6.
Page 87of 118
User Manual
Layer 3
Egress Layer 3 enables you to map CoS to ToS so that the priority marking of outgoing
packets can be carried over to the IP network.
Layer 3
Field Description
Interface Select the WAN interface to configure the QoS for outgoing packets, LAN interface
cannot be selected as VLAN is currently supported on the WAN side only.
Default Non-IP Locally generated packets (such as ARP packets) do not have a CoS marking. You can
define the CoS for all unclassified outgoing packets on layer 3 using this field. The
selections are in the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5, and
CoS6. The default value is CoS1 (recommended).
Class of Service The selections are (in the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5,
and CoS6.
Translated TOS The Type of Service field takes values from 1 to 255. The selections are 0, 1, 2, 3, 4,
5, 6, 7.
Page 88of 118
User Manual
Ingress
Ingress enables you to configure QoS for packets as soon as they come into the router.
The domain mappings are converted to CoS (the common language) so that the priority
marking is carried over.
There are four Ingress modes:
Untrusted mode
Layer 2
Layer 3
Static
Untrusted Mode
Untrusted is the default Ingress page setting for all interfaces. In this mode, no domain
mapping is honored in the router. All packets are treated as CoS6 (best effort).
Untrusted mode
Page 89of 118
User Manual
Layer 2
Layer 2 allows you to map an incoming packet with VLAN priority to CoS. This feature is
only configurable on the WAN interfaces as VLAN is only supported on the WAN side in
the current software release.
Layer 2
Field Description
Interface Select the WAN interface here to configure the CoS for incoming traffic. Only WAN
interface can be selected as VLAN is currently supported only on the WAN side.
Class of Service The selections are (in the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5,
and CoS6.
User Priority The selections are 0, 1, 2, 3, 4, 5, 6, 7.
To configure Ingress Layer 2:
1. Select Advanced Menu.
2. Select QoS > Ingress.
3. Select the quickstart interface.
4. Select Layer 2.
Page 90of 118
User Manual
5. Select CoS1 in Class of Service and enter 5 in Priority Bits. Any packet with priority
marking 5 is mapped to CoS1, the highest priority that is normally given to the
voice packets.
6. Click Apply to temporarily the settings.
7. Select CoS2 in the Class of Service and 1 in Priority Bits. Any packet that has a
priority bit of 1 is mapped to CoS2, which is the second highest priority. This is
given to the high priority packets such as video.
8. Click Apply to temporarily activate the settings.
9. Repeat steps 5-7 to add more rules. Up to eight rules can be configured for each
interface.
10. To make changes permanent, click Save Settings.
Notes: Any priority bits that have not been mapped to a CoS default to CoS6, the lowest
priority.
Any WAN interface that is not configured has the default Untrusted mode.
Page 91of 118
User Manual
Layer 3
The Layer 3 page allows you to map ToS bits of incoming packets from the IP network to
CoS for each WAN/LAN interface.
Layer 3
Field Description
Interface For both WAN and LAN interfaces, you can configure QoS for layer 3 (IP) data traffic.
Class of Service This CoS field allows you to map incoming layer 3 WAN/LAN packets to one of the
following CoS (in the order of descending priority): CoS1, CoS2, CoS3, CoS4, CoS5, and
CoS6.
ToS The Type of Service field takes values from 0 to 255.
Default Non-IP A static CoS can be assigned to all layer 3 incoming packets (per interface) that do
not have an IP header, such as PPP control packets and ARP packets. The default is
CoS1 (recommended).
To configure Ingress Layer 3:
1. Select Advanced Menu.
2. Select QoS > Ingress.
3. Select the quickstart interface.
4. Select Layer 3.
Page 92of 118
User Manual
5. Select CoS1 in Class of Service and enter 22 in Type of Service (ToS). Any incoming
packet from LAN Group 1 (layer 3) with a ToS of 22 is mapped to CoS1, the
highest priority, which is normally given to the voice packets.
6. Leave the default value CoS1 in Default Non-IP. Any incoming packet from LAN
Group 1 without an IP is mapped to CoS1, the highest priority.
7. Click Apply to temporarily activate the settings.
8. Repeat step 5-7 to add more rules to LAN Group 1. Up to 255 rules can be
configured for each interface.
9. To make changes permanent, click Save Settings.
Notes: Any priority bits that have not been mapped to a CoS default to CoS6, the lowest
priority.
Any WAN interface that is not configured has the default Untrusted mode.
Static
The Ingress - Static page enables you to configure a static CoS for all packets received on
a WAN or LAN interface.
Static
Page 93of 118
User Manual
To configure Ingress Layer 3:
1. Select Advanced Menu.
2. Select QoS > Ingress.
3. Select the quickstart interface.
4. Select Static.
5. At the ETHERNET Interface. You are configuring QoS on this interface only. Any
WAN/LAN interface that is not configured has the default Untrusted mode.
6. Select CoS1 in Class of Service. All incoming traffic from the ETHERNET interface
receives CoS1, the highest priority.
7. Click Apply to temporarily activate the settings.
8. To make changes permanent, click Save Settings.
Page 94of 118
User Manual
QoS Shaper Configuration
The Shaper Configuration page is accessed by selecting Shaper on the Advanced main
page. Three shaper algorithms are supported:
HTB
Low Latency Queue Discipline
PRIOWRR
QoS Shaper Configuration
Note: Egress TCA is required if shaper is configured for that interface.
Field Description
Interface The selections are WAN/LAN interfaces except WLAN, which does not support Shaper
feature. This field needs to be selected before shaper configuration.
Max Rate This field is applicable for the HTB Queue Discipline and Low Latency Queue
Discipline, both are rate-based shaping algorithms.
HTB Queue
Discipline
The hierarchical token bucket queue discipline is a rate-based shaping algorithm. This
algorithm rate shapes the traffic of a class over a specific interface. All CoSx traffic
uses a specific rate to which data will be shaped. For example: If CoS1 is configured
to 100Kbps then even if 300Kbps of CoS1 data is being transmitted to the interface
only 100Kbps will be sent out.
Page 95of 118
User Manual
Low Latency
Queue Discipline
PRIOWRR This is a priority based weighted round robin algorithm operating on CoS2-CoS6. CoS1
This is similar to the above algorithm except that CoS1 is not rate limited. So in the
example above CoS1 data is not rate limited to 100Kbps but instead all 300Kbps is
transmitted. The side effect is that a misconfigured stream can potentially take all
bandwidth.
queues have the highest priority and are not controlled by the WRR algorithm.
Of the three shaping algorithms available on the Shaper Configuration page, only one can
be enabled at a time. An example of each configuration is given as follows.
Example 1: HTB Queue Discipline Enabled
In the example below, HTB Queue Discipline is enabled. The PPPoE1 connection has a
total of 300 Kbps of bandwidth, of which 100 Kbps is given to CoS1 and another 100 Kbps
is given to CoS2. When there is no CoS1 or CoS2 packets, CoS6 packets have the whole
300 Kbps of bandwidth.
HTB Queue Discipline enabled
Page 96of 118
User Manual
Example 2: Low Latency Queue Discipline Enabled
In this second example, Low Latency Queue Discipline is enabled. CoS1 is not rate
controlled (hence the field is disabled). CoS2 takes 100 Kbps when there is no CoS1
packets. CoS6 has 300 Kbps when there is no CoS1 or CoS2 packets. This is similar to the
HTB queue discipline as they are both rate-based algorithm, except that CoS1 is handled
differently.
Low Latency Queue Discipline enabled
Page 97of 118
User Manual
Example 3: PRIOWRR Enabled
In this third example, PRIOWRR is enabled. Since PRIOWRR operates only on the number
of packets being transmitted, the max rate field has been disabled. Only percentage can
be assigned to the CoS2 - CoS6. CoS1 is not rate controlled (hence the field is not
displayed). When there is no CoS1 packets, CoS2, CoS3, CoS4 each has 10 percent, and
CoS6 has 70 percent. This is similarly to the Low Latency Queue discipline, except that
one is packet-based, and the other is rate-based.
PRIOWRR enabled
Page 98of 118
Policy Routing Configuration
The Policy Routing Configuration enables you to configure policy routing and QoS.
User Manual
Policy Routing Configuration
Field Description
Ingress Inter
face
Destination
Interface
DiffServ Code
Point
Class of Service The selections are (in the order of priority): CoS1, CoS2, CoS3, CoS4, CoS5, CoS6, and
Source IP The IP address of the traffic source.
Mask The source IP Netmask. This field is required if the source IP has been entered.
The incoming traffic interface for a Policy Routing rule. Selections include LAN
interfaces, WAN interfaces, Locally generated (traffic), and not applicable. Examples
of Locally generated traffic are: voice packets, packets generated by applications
such as DNS, DHCP, etc.
The outgoing traffic interfaces for a Policy Routing rule. Selections include LAN
Interfaces and WAN interfaces.
The diffServ code point (DSCP) field value ranges from 1 to 255. This field cannot be
configured alone, additional fields like IP, Source MAC, and/or Ingress Interface
should be configured.
N/A.
Destination IP The IP address of the traffic destination.
Mask The Netmask of the destination. This field is required if the destination IP has been
entered.
Page 99of 118
User Manual
Protocol The selections are TCP, UDP, ICMP, Specify, and none. If you choose Specify, you need
to enter the protocol number in the box next to the Protocol field. This field cannot
be configured alone, additional fields like IP, Source MAC, and/or Ingress Interface
should be configured. This field is also required if the source port or destination port
has been entered.
Source Port The source protocol port. You cannot configure this field without entering the
protocol first.
Destination Port The destination protocol port or port range. You cannot configure this field without
entering the protocol first.
Source MAC The MAC address of the traffic source.
Local Routing
MAC
This field is enabled only when Locally Generated is selected in the Ingress Interface
field. The mark for DNS traffic generated by different applications are described
below:
Dynamic DNS: 0xE1
Dynamic Proxy: 0xE2
Web Server: 0xE3
MSNTP: 0xE4
DHCP Server: 0xE5
IP tables Utility: 0xE6
PPP Deamon: 0xE7
IP Route: 0xE8
ATM Library: 0xE9
NET Tools: 0xEA
RIP: 0xEB
RIP v2: 0xEC
UPNP: 0xEE
Busybox Utility: 0xEF
Configuration Manager: 0xF0
DropBear Utility: 0xF1
Voice: 0
Currently routing algorithms make decision based on destination address, i.e. only
Destination IP address and subnet mask is supported. The Policy Routing page enables
you to route packets on the basis of various fields in the packet.
Page 100of 118
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.