
6401 Rugged ADSL Router
PWR Eth4 Eth3
Eth2
Eth1 NC ACT LINK
PWR Eth0 Eth1 Eth2 Eth3 NC ACT LINK
ETH4 PWR
12-72V
+
-
ETH3
ETH2
ETH1DSL
RESET
RS232
PWR
LINK
ALR ACT
ETH3 ETH2
ETH1 ETH0
6401 RUGGED ADSL ROUTER
Revision 1.5
June 2013

CE Mark Warning
The Case Communications 6401 Rugged ADSL Router is an Industrial product which may
cause radio interference in a domestic environment. In which case the user may be required to
take adequate measures.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
Copyright
Copyright C 2012 Case Communications Ltd. All rights reserved
This document contains information that is the property of Case Communications Ltd.
All or part of this document may not be copied, reproduced reduced to any electronic medium or
machine readable form, or otherwise duplicated, and information herein may not be used,
disseminated or otherwise disclosed, expect with the prior written consent of Case
Communications Ltd
Version Date Notes
Rev 1.2 March 2012 First release of manual
Rev 1.3 June 2012 Removed Print Server and duplicate entries
Rev 1.4 July 2012 Note of Ethernet labelling error
Rev 1.5 June 2013 Appendix B – removal of Known Issues
Case Communications
www.casecomms.com
0845 643 0800

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
Contents Page i
CONTENTS
SECTION TITLE PAGE
1 6401 RUGGED ADSL ROUTER HARDWARE 1.1
2 GETTING STARTED 2.1
2.1 Connecting a PC to the Case 6401 2.1
3 DEVICE INFORMATION 3.1
3.1 SUMMARY INFORMATION 3.1
3.2 WAN INFORMATION 3.2
3.3 STATISTICS 3.2
3.3.1 STATISTICS LAN 3.2
3.3.2 STATISTCS WAN 3.2
3.3.3 STATISTICS xTM 3.3
3.3.4 STATISTICS xDSL 3.4
3.4 DEVICE ROUTE 3.6
3.5 DEVIVE INFO ARP 3.7
4 QUICK START GUIDE 4.1
4.1.1. EQUIPMENT REQUIRED 4.1
4.1.2 STEP ONE A LAYER TWO INTERFACE 4.2
4.1.3. STEP 2 – SELECT WAN SERVICE 4.2
4.1.4 CONFIGURING THE LAN 4.4
5 ADVANCED SET UP 5.1
5.1.1 INTRODUCTION 5.1
5.1.2 CONFIGURING A LAYER TWO ATM INTERFACE 5.2
5.1.3 CONFIGURING AN ATM INTERFACE 5.3
5.1.4 CONFIGURING AN ETHERNET INTERFACE 5.4
5.1.5 EXPLANATION OF OPTIONS 5.5
5.2 WAN SERVICES 5.7
5.2.1 INTRODUCTION 5.7
5.2.2 WAN SERVICE OPTIONS 5.7
5.2.2.1 CONFIGURING PPPoA 5.8
5.2.2.2 CONFIGURING IPoA 5.11
5.2.2.3 CONFIGURING PPP Over Ethernet 5.13
5.2.2.4 CONFIGURING IPoE 5.16
5.2.2.5 CONFIGURING BRIDGING 5.17
5.2.3 EXPLANATION OF WAN SERVICE OPTION 5.18
5.3 VPN 5.20
5.3.1 INTRODUCTION 5.20
5.3.2 L2TP CONFIGURATION 5.21
5.4 LAN CONFIGURATION 5.23
5.4.1 LAN SETUP 5.23

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
Contents Page ii
5.5 NETWORK ADDRESS TRANSLATION 5.25
5.5.1 NAT-VIRTUAL SERVER CONFIGURATION 5.25
5.5.2 NAT – PORT TRIGGERING 5.27
5.5.3 NAT – DMZ HOST 5.29
5.6 SECURITY 5.30
5.6.1 IP FILTERING 5.30
5.6.2 PORT FORWARDING 5.3.2
5.6.3 MAC FILTERING 5.32
5.7 PARENTAL CONTROL 5.34
5.7.1 TIME RESTRICTIONS 5.34
5.7.2 URL FILTER 5.35
5.8 QUALITY OF SERVICE 5.36
5.8.1 INTRODUCTION 5.36
5.8.2 CONFIGURING A LAYER TWO INTERFACE 5.37
5.8.2 QOS – QUEUE MANAGEMENT CONFIGURATION 5.37
5.8.4 QOS – QUEUE CONFIGURATION SETUP 5.38
5.8.5 CONFIGURING QOS CLASSIFICATION 5.39
5.8.7 DSCP OVERVIEW 5.42
5.8.8 CONFIGURATION EXAMPLES 5.43
5.9 ROUTING 5.45
5.9.1 DEFAULT GATEWAY 5.45
5.9.2 STATIC ROUTES 5.45
5.9.3 POLICY ROUTING 5.46
5.9.4 RIP 5.47
5.10 DNS 5.50
5.10.1 CONFIGURING A DNS SERVER 5.50
5.10.2 CONFIGURING DYNAMIC DNS 5.51
5.11 DSL CONFIGURATION 5.52
5.12 UPNP 5.54
5.12.1 INTRODUCTION TO UPnP 5.54
5.12.2 CONFIGURING UPnP ON THE 6401 RUGGED ROUTER 5.54
5.12.3 CONFIGURING UPnP ON A WINDOWS XP PC 5.54
5.12.4 CONFIGURING UPnP ON A WINDOWS 7 PC 5.55
5.13 DNS PROXY 5.56
5.15 INTERFACE GROUPING 5.57
5.16 IP SEC 5.59
5.16.1 HOW TO SET UP AN IP SEC TUNNEL 5.59
5.16.2 TESTING THE IP SEC TUNNEL 5.63
5.16.3 ADVANCED SETTINGS 5.64
5.16.4 CONFIGURATION EXAMPLES 5.65
5.16.5 HOW IP SEC WORKS 5.66
5.16.6 ADVANCED IKE SETTINGS 5.67

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
Contents Page iii
5.17 CERTIFICATES 5.69
5.17.1 INTRODUCTION 5.69
5.17.2 CONFIGURING A CERTIFICATE OF AUTHORITY 5.69
5.18 MULTICAST 5.71
5.18.1 INTRODUCTION 5.71
5.18.2 CONFIGURING IGMP 5.72
6 DIAGNOSTICS 6.1
6.1 INTRODUCTION 6.1
7 MANAGEMENT 7.1
7.1 SETTINGS 7.1
7.1.1 BACKUP 7.1
7.1.2 UPDATE 7.1
7.1.3 RESTORE DEFAULT 7.1
7.2 SYSTEM LOG 7.2
7.3 SECURITY LOG 7.3
7.4 SNMP AGENT 7.3
7.5 TR069 CLIENT 7.4
7.6 INTERNET TIME 7.5
7.7 ACCESS CONTROL 7.6
7.8 UPDATE SOFTWARE 7.6
7.9 REBOOT ROUTER 7.6
APPENDIX A PRODUCT SPECIFICATION
APPENDIX B KNOWN ISSUES
APPENDIX C SAFETY INFORMATION
APPENDIX D TECHNICAL ASSISTANCE

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 1 – 6401 HARDWARE Page 1.1
1 6401 RUGGED ADSL ROUTER HARDWARE
In the 6401 packing materials will contain the following items
The 6401 Rugged Router as shown below
External Power Supply with mains lead.
ADSL Line cord
Option - manual – either CD or Hardcopy (NB. PDF versions of the 6401 manual are
available from our web site on www.casecomms.com)
The indications on the front are
1. PWR – Indicates power is attached to the router and its powered on.
2. Eth0 to Eth3- Ethernet ports 0 to 3. When a device is attached the port glows steady red with
a slight flicker
3. NC – Reserved for future options
4. ACT - Link is Active when running PPPoE
5. Link –When flashing the 6401 is handshaking when steady the ADSL link is up.
The Back Panel has the following ports and functions
1. DSL – DSL port – attach line cord here.
2. Eth0 – Eth 3 – Ethernet ports
3. Cut outs for pwr – Link – ALR – ACT not used at this time.
4. Green strip 12v – 72v – DC power input. Attach DC supply here or use the AC to DC
adapter with a plug to fit the PWR socket
5. PWR – Alternative DC power input source for use with alternate Power Adapter.
6. Reset – Reset switch to be operated via a pen or pin.
6401 Rugged ADSL Router
PWR Eth4 Eth3
Eth2
Eth1 NC ACT LINK
PWR Eth0 Eth1 Eth2 Eth3 NC ACT LINK
ETH4 PWR
12-72V
+
-
ETH3
ETH2
ETH1DSL
RESET
RS232
PWR
LINK
ALR ACT
ETH3 ETH2
ETH1 ETH0

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 2 – GETTING STARTED Page 2.1
2 GETTING STARTED
2.1 CONNECTING A PC TO THE CASE 6401
Use a standard UTP Patch lead to connect a PC to the 6401 via any of the 4 Ethernet ports on the rear
of the 6401. Using a standard browser (i.e. Firefox, Google Chrome, Internet Explorer etc.), enter the
IP address of the router. It’s possible some restrictions may have been configured within the router,
therefore if one port does not allow access then move your PC to one of the other ports until the logon
screen is retrieved.
If it’s not possible to get a response from any of the Ethernet ports, press the ‘reset’ switch on the rear
of the 6401 router in for 10 seconds which returns the 6401 to its default configuration.
The default IP Address of the Case 6401 router is 192.168.1.1
There are three operational modes, each with its own user ‘Logon’ name and password as shown
below. The menu options available will vary depending on the logon status of the user
If you enter an incorrect user name or password three times, the 6401 Router will close down
your login session

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 2 – GETTING STARTED Page 2.2
Welcome Screen
When you first connect to the 6401 router you should see the following screen displayed on
your PC. This is the ‘Device Information’ summary information page.
The ‘device Information’ page is explained below
The identification of the hardware used in this router
The date (Year- Month-Day and time) the board was built
Software revision of the board
Bootloader (CFE) Version:
The boot loader used by this board
DSL PHY and Driver Version:
The DSL PHY and Driver version
This information reflects the current status of your WAN connection.
Line Rate - Upstream (Kbps):
Upstream operating rate of the ADSL part of this router
Line Rate - Downstream (Kbps):
Downstream operating rate of the ADSL part of this router
IP v4 Address of the router
Default Gateway out of the subnet
Secondary Data Name Server
To configure any parameters select from Advanced Set up (only showing if you have logged on as
Admin or Support) and select from the menu tabs.
Device Info
Advanced SetUp
Diagnostics
Management
6401 Rugged Router
Board ID 96328avng
Build timestamp 120217_1616
Software Version 4.06L.03
Bootloader (CFE) version 4.06L.03
DSL PHY and Driver Version A2pD035g.d23K
Line Rate- Upstream Kbps 2048
Line rate – Downstream (Kbps) 24,000,000
LAN IPv4 Address 192.168.1.1
Default gateway 192.168.1.200
Primary DNS Server 192.168.1.50
Secondary DNS Server 192.168.1.60
Device Info
This information reflects the current status of your WAN connection

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.1
3 DEVICE INFORMATION
3.1. DEVICE INFO >SUMMARY INFORMATION
This page provides a quick summary of the 6401 Rugged ADSL routers status, and is divided into two
parts, the first part being the hardware and software versions and the second part the operational status
of the unit.
Bootloader (CFE) Version:
DSL PHY and Driver Version:
Board ID – The Hardware version used in this model
Build Timestamp – The time and date this board was manufactured
Software Version – The software version of the board
The Boot loader used for this router –
DSL PHY and Driver Version – used for this board
The second table reflects the current status of your WAN connection.
Line Rate - Upstream (Kbps):
Line Rate - Downstream (Kbps):
Line Rate Upstream (Kbps) Max 3.3Mbps (Annex M), Max 1.2Mbps standards ADSL2+)
Line Rate Downstream (KBPS) Up to a maximum of 24Mbps
LAN IPv4 Address 192.168.25.81
Default Gateway The port description of this routers Gateway. In this example
we only have a single PPPoA WAN port going to the Internet
therefore the Gateway is that port ID
Primary DSN Server 62.6.40.162
Secondary DNS 192.74.65.49

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.2
3.2. DEVICE INFO >WAN INFORMATION
This section provides an overview of the Wide Area Network information
Interface pppoa This is the WAN interface being used
Description Description given to the WAN Interface
Type Reflects if this is IPoA, PPPoE, PPPoA etc.
VLAN Mux ID Shows if enabled or disabled
IGMP Shows if enabled or disabled
NAT Shows if enabled or disabled (NB.for some protocols it cant be disabled)
Firewall Shows if enabled or disabled. (NB. for some protocols this cant be disabled)
Status Connected, shows that the link is up
IPv4 Address This is the WAN IP Address provided to you by your ISP
3.3. DEVICE INFO >STATISTICS
3.3.1. DEVICE INFO >STATISTICS > LAN
This option displays the Ethernet Interface statistics on the 6401 Rugged Router
3.3.2. DEVICE INFO >STATISTICS > WAN
This option displays the Wide Area Network Interface statistics on the 6401 Rugged Router
Select the ‘reset statistics’ to set the statistics back to zero

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.3
3.3.3. DEVICE INFO >STATISTICS > xTM (ATM)
This table shows the xTM statics for the 6401
The Extended Task manager provides additional information on the ports on the 6401 Rugged Router
Port Number: Shows the xTM (ATM) Port number
In Octets: Number of received octets over the interface.
Out Octets: Number of transmitted octets over the interface.
In Packets: Number of received packets over the interface.
Out Packets: Number of transmitted packets over the interface.
In OAM Cells: Number of OAM cells received. . (Operational and Management)
Out OAM Cells: Number of OAM cells transmitted. (Operational and Management)
In ASM Cells: Number of ASM cells received. (Autonomous Status Messages)
Out ASM Cells: Number of ASM cells transmitted. (Autonomous Status Messages)
In Packet Errors: Number of received packets with errors.
In Cell Errors: Number of received cells with errors.
Reset: Click to reset the statistics.
OAM Cells
If a communication problem occurs on a PVC (no traffic going one way or the other), the permanent
virtual circuit (PVC) remains UP on the end-devices. Therefore, routing entries that were pointing to
that PVC remain in the routing table for a certain time and as a result, packets will be lost. The
solution to this problem is to use Operation and Maintenance (OAM) to detect such failures and allow
the PVC to disconnect if it is disrupted along its path. At regular intervals, end-devices (such as
routers) configured for OAM send loopback cells which must be looped in the network. This looping
point can be the machine at the end of the PVC (end-to-end loopback cells) or equipment on the path
(segment loopback cells)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.4
3.3.4. DEVICE INFO >STATISTICS > xDSL
Displays status of the link ( Disabled – Establishing- Linkup)
Attainable Rate (Kbps): (Max you can obtain)
Rate (Kbps): (Current Sync rate)
MSGc (#of bytes in overhead channel
message
B# (of bytes in mux data frame)
M#(of Mux Data Frames in FEC Data Frame)
T (Mux data frames over sync bytes)
R# ( of check bytes in FEC data frame)
S (Ratio of FEC over PMD Data Frame
Length)
L (# of bits in PMD Data Frame):
Status
This indicates the status of the connection. The link can be up but your not connected to a service, in
which case the Link Light on the front will be ‘off’, but the link will show up in the statistics.
The status goes through – Three stages – disabled – Establishing – Link up.
Link Power Status- The ADSL (G.992.3) and ADSL2+ (G.992.5) recommendations define a power
management feature. Its primary application is to reduce the power consumption and the thermal
dissipation of ADSL chip sets.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.5
When there is no user traffic, the ADSL links can switch from a high power mode to a low power
mode. If there is no user data for a long period of time, the link can switch further to a very low
power, idle state. Once there is user data, the link will quickly return to the full power state.
The recommendations define three power states: L0, L2, and L3.
This is the normal operating state. The system must be in this state in order to achieve
the maximum data rate.
The ADSL link is active, but a low-power signal conveying background data is sent from
the CO unit to the remote unit. Normal data is transmitted from the remote unit to the CO
unit. This state is entered when there is little data to be transmitted. The reduced rate
reduces the power consumption.
When there is no user data to be transmitted, the system may enter the idle state. In this
state there is no signal transmitted on the link. The unit may be without power.
SNR Margin
SNR Margin could be thought of as a "buffer zone" which is there to protect your connection against
normal SNR fluctuations that can and do occur on a daily basis.
Once your SNR Margin starts to drop below 10dB on a traditional fixed rate line then you can
experience problems.
Attenuation (0.1 dB):
Line attenuation is in relation to the "loop loss" on your line. The lower this figure the better, and the
better chance you have of getting the faster speeds.
Attenuation is a term used to describe the reduction of the adsl signal strength that occurs on the
copper pair over distance and is measured in dB decibels. The further you are away from the
exchange the higher your attenuation figure will be as the signal loss increases.
Output Power (0.1 dBm):
This is the upstream power used by your 6401 Rugged ADSL router on the copper circuit.
Super Frames: Total number of super frames.
Super Frame Errors: Number of super frames received with errors.
RS Words: Total number of Reed-Solomon code errors.
RS Correctable Errors: Total number of RS with correctable errors.
RS Uncorrectable Errors: Total number of RS words with uncorrectable errors.
HEC Errors: Total number of Header Error Checksum errors.
OCD Errors: Total number of out-of-cell Delineation errors.
LCD Errors: Total number of Loss of Cell Delineation.
Total Cells: Total number of cells.
Data Cells: Total number of data cells.
Bit Errors: Total number of bit errors.
Total ES: Total Number of Errored Seconds.
Total SES: Total Number of Severely Errored Seconds.
Total UAS: Total Number of Unavailable Seconds.
xDSL BER Test: Click this button to start a bit Error Rate Test.
Reset Statistics: Click this button to reset the statistics.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.6
3.4. DEVICE INFO >ROUTE
Device Info -- Route
This page displays the routes currently in use within the router
The following symbols are used.
U This link is up
G This link is rejecting - Means that some other service incompatible with DSL is provisioned
on the line.
H This link is the host
R Reinstate this link
D Dynamic (redirect) Dynamically re-directs requests for URL’s
M Modified Redirect –What it does is break some TCP/IP utilities and it serves Search Pages
with Ads on them if you mis-type a Domain Name
6401 Rugged Router
Summary
Advanced Setp
Device Info
Device Info - - DHCP Leases
WAN
Statistics
Route
ARP
DHCP
Diagnostics
Management
Destination Gateway Subnet Mask Flag
81.134.80.1 0.0.0.0 255.255.255.255
Service
UH
Metric
0 pppoa_0_0_38
Interface
pppoa0
192.168.25.80 0.0.0.0 255.255.255.248 U 0 br0
81.142.20.34 0.0.0.0 255.255.255.248 U 0 pppoa0pppoa_0_0_38

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 3- DEVICE INFORMATION Page 3.7
3.5. DEVICE INFO >ARP
The Address Resolution Protocol displays the MAC address of devices and their IP Addresses
3.6. DEVICE INFO >DHCP
The DHCP page displays the devices that the 6401 Rugged Router has issued with IP
Addresses
Host name Name of the devices connected
MAC Address MAC Address of the device with the name ‘Andy_Vostro_375’
IP Address The IP Address given to that device
Expires in The time that this IP Address will expire.
6401 Rugged Router
Summary
Advanced Setp
Device Info
Device Info - - DHCP Leases
WAN
Statistics
Route
ARP
DHCP
Diagnostics
Management
Host name MAC Address IP Address Expires In
Andy_Vostro_375 84:8F:69:b0:03:81 192.168.1.2 23 Hours, 43 minutes, 49 seconds
6401 Rugged Router
Summary
Advanced Setp
Device Info
Device Info - - ARP
IP Address
192.168.1.2
WAN
Statistics
Route
ARP
DHCP
Diagnostics
Management
Flags
Complete
HW Address
84:8F:69:b0:03:81
Devices
br0

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 4 QUICK START Page 4.1
4 QUICK START GUIDE
This Quick Start Guide gives you the minimum of information to allow you to get the router up
and running quickly. It assumes that the 6401 Rugged Router is running default configuration.
4.1.1 EQUIPMENT REQUIRED
PC - with web browser and an IP address within the subnet of 192.168.1.xx (where xx is any
address in the range apart from 1, which is the routers default address) use a subnet with a net mask
of 255.255.255.0 or /24.
Standard Ethernet cable – straight or crossover (The Case 6401 router will auto-detect)
Login On the PC use the web browser to connect to IP 192.168.1.1
You should see the following screen
Note: If you’re not able to obtain the logon screen try other Ethernet ports. If none of the Ethernet
ports display the Logon screen you may find the router has been configured with a different IP
Address. To ensure you have a connection to the port of the 6401 ‘Ping’ the routers default IP
address of 192.168.1.1. If no reply is received then use the reset switch on the rear of the router to
‘default’ the router back to its default settings.
On being asked for a login and password use admin (or support) for both entries
Having logged on the following page will displayed
On the left side select Advanced Setup to enter the configuration menu options.
Device Info
Advanced SetUp
Diagnostics
Management
6401 Rugged Router
Board ID 96328avng
Build timestamp 120217_1616
Software Version 4.06L.03
Bootloader (CFE) version 4.06L.03
DSL PHY and Driver Version A2pD035g.d23K
Line Rate- Upstream Kbps 2048
Line rate – Downstream (Kbps) 24,000,000
LAN IPv4 Address 192.168.1.1
Default gateway 192.168.1.200
Primary DNS Server 192.168.1.50
Secondary DNS Server 192.168.1.60
Device Info
This information reflects the current status of your WAN connection

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 4 QUICK START Page 4.2
4.1.2 STEP ONE CONFIGURE A LAYER TWO INTERFACE
1. Select Layer 2 Interface
2. Next you need to add an ‘ATM’ interface so select ‘ Add’
You will then be presented with the following page
ATM PVC Configuration
This screen allows you to configure an ATM PVC identifier (VPI and VCI), select DSL latency,
select a service category. Otherwise choose an existing interface by selecting the checkbox to
enable it.
Usual default for UK (This value will be used by the router
to identify this path. This path will appear later as an
option)
The 6401 only has a single DSL path - select path 0
Select the service your ISP has provided, most common in
the UK is PPPoA
Select the mode of operation provided by your ISP, the
most common is VC Mux in the UK
Unless a specific service has been selected use UBR
without PCR
Select IP QoS Scheduler Algorithm
Unless the router is on a network with QoS this option can
be left as defaulted
4.1.3 STEP 2 – SELECT WAN SERVICE
1. Select on WAN Service
2. Click Add
3. The following page is displayed
WAN Service Interface Configuration
Select a layer 2 interface for this service
Note: For ATM interface, the descriptor string is (portId_vpi_vci)
For PTM interface, the descriptor string is (portId_high_low)
Where portId=0 --> DSL Latency PATH0
portId=1 --> DSL Latency PATH1
portId=4 --> DSL Latency PATH0&1
low =0 --> Low PTM Priority not set
low =1 --> Low PTM Priority set
high =0 --> High PTM Priority not set
high =1 --> High PTM Priority set

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 4 QUICK START Page 4.3
SELECT THE WAN INTERFACE
Select the interface from the drop down menu. As its likely your going to connect to an ADSL
WAN Service the interface is the likely to be described by the VCI configured earlier (eg 38)
Atm0/0_0_38
If running PPPoA the link type (pppoa) and VPI / VCI will be displayed in the field. This can be
changed to reflect a more meaningful name.
Enter Service Configuration
4. Click Next
You will then see the following options
PPP Username and Password
PPP usually requires that you have a user name and password to establish your connection. In the
boxes below, enter the user name and password provided by your ISP .
Enter the username provided by your ISP
Enter the password supplied by your ISP
Select from drop down menu
Dial on demand (with idle timeout timer
Enable IGMP Multicast Proxy

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 4 QUICK START Page 4.4
4.1.4 CONFIGURING THE LAN
In almost all circumstances the LAN IP address will have to be changed to suit the network. Please
note that changing the LAN IP address of the router will result in loss of communication to the
router until the PC can have its IP address set to match the new subnet and the new connection
even run.
Select LAN from the Advanced Config menu. The following options will appear
Local Area Network (LAN) Setup
Configure the Broadband Router IP Address and Subnet Mask for LAN interface.
GroupName. [Default]
Configure the IP Address of the router on
the LAN
Enter an appropriate sub network mask for
the IP Address
Leave unchecked unless required
Leave unchecked unless required
Select to disable unless DHCP is required
1. Enter the required IP address and subnet mask for the Ethernet interface
2. Click Disable DHCP Server (Unless DHCP is required)
3. Click on Apply/Save
4. Change the IP address of the PC so that it is within the same subnet as the router
5. Log onto the router using its new IP address and enter the default admin username and
password
6. Select Advanced Setup
You should now be able to connect to the Internet.
If not please go back over your settings to check they are correct. Here is a list of possible
diagnostics.
Check IP address, check cable – if unable to connect
use reset button to default unit
Check Statistics xDSL to see if ‘up’
If not check rate
Please refer to the diagnostics section of this manual.
Check ISP user name and password is as given

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.1
5. ADVANCED SET UP
5.1 LAYER TWO CONFIGURATION OPTIONS
5.1.1. INTRODUCTION
ADVANCED SETUP > LAYER2 INTERFACE
There are a maximum of two WAN paths out of the 6401, one via the ADSL /
ATM interface and the other via one of the four the Ethernet Interfaces.
On entering the Layer 2 Interface screen a table showing any existing layer 2
interfaces is displayed, as shown below.
DSL ATM INTERFACE CONFIGURATION
Choose, Add, or Remove to configure DSL ATM interfaces.
Interface Shows the Interface configured
VPI Virtual Path Identifier (In UK usually 0)
VCI Virtual Circuit Identifier (In UK usually 38)
DSL Latency Shows the DSL path, the 6401 only has a single DSL link = path0
Category Traffic class for the interface here we see Unspecified Bit Rate
Link Type Shows link type EoA (for PPPoE, IPoE & Bridging) or PPPoA, IPoA
Connection Mode Single VC or VLAN Mux mode
IP QoS Shows enabled or disabled
Scheduler Strict priority or Weighted Fair Queuing
Queue Weight 1 to 64
Group or precedence Select 1 - 8
ETH WAN INTERFACE DISPLAY
To View the Ethernet WAN ports Select Advanced Setup >Layer 2 Interface > Eth Interface
The following summary table is displayed.
Note Only one Ethernet port can be configured as a layer 2 WAN Port
WAN Service
Layer 2 Interface
Advanced Setp
ATM Interface
Eth Interface

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.2
5.1.2. CONFIGURING A LAYER TWO ATM INTERFACE
ADVANCED SETUP > LAYER 2 INTERFACE>ATM INTERFACE
Layer2 Interface and you can select WAN Service Interface (layer2 interface)
over ATM interfaces or ETH interface.
ATM Interface: This configures a WAN port on the ADSL Link. ISP
provides you VPI (Virtual Path Identifier), VCI (Virtual Channel Identifier)
settings and the DSL Interface with RJ11 connector. (Figure 2-1)
ETH Interface: This configures a WAN Interface over an Ethernet port
5.1.3 CONFIGURING AN ATM INTERFACE
ADVANCED SETUP >LAYER 2 INTERFACE> ATM INTERFACE
From layer 2 summary page, select ATM Interface and then ‘add’ the following page will be
displayed. Note this can be used as a reference configuration for most PPPoA ADSL connections.
Note;
If the interface is used by the WAN Service, you need to remove the corresponding WAN Service
entry first before you can remove it here at layer 2.
The Table below explains the configuration options
6401 Rugged Router
IP Sec
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Certificate
Multicast
Diagnostics
Management
Device Info
ATM PVC Configuration
This screen allows you to configure an ATM PVC identifier (VPI and VCI), select DSL latency, select a
service categoryS. Otherwise choose an existing interface by selecting the checkbox to enable it.
VPI [ 0-255]
VCI [32 -65535]
0
38
Select DSL Latency
Path 0
Path 1
Select DSL Link Type (EoA is for PPPoE, IPoE, and Bridge.)
EOA
PPPoA
IPoA
Select Connection Mode
Default Mode – Single Service over one connection
VLAN Mux Mode – Multiple VLAN Service over one connection
Encapsulation Mode
LLC / SNAP-Bridging
q
Service Category
UBR without PCR
q
Select IP QoS Scheduler Algorithm
Strict Priority
Precedence of the default queue 8 (lowest)
Weight FAIR Queue
Weight value of the default queue (1-63)
MPAAL Group precedence
8
q
1
Layer 2 Interface
Advanced Setp
Device Info
ATM Interface
Eth Interface

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.3
LAYER 2 CONFIGURATION OPTIONS
On selecting add, a Layer 2 Interface the following page is presented. Here we see the option
to configure 3 different layer 2 interfaces with the page appearing slightly different according
to which of the three options has been selected;
1. Ethernet Over ATM
2. Point to Point Protocol Over ATM
3. IP Over ATM
Set according to ISP requirements
VCI 0 [0 – 65535] (UK =38)
Set according to ISP requirements
(1-31 is generally reserved)
Select a Path0 or Path 1(6401 only has 1 path=0)
Select DSL Link Type (EoA is for PPPoE, IPoE, and Bridge.)
Select for PPPoE, IPoE or Bridging
Select for PPPoA – if that’s ISP Service
EOA CONFIGURATION OPTIONS
Single Service over one connection or Multiple
VLAN Services over one connection.
Configure in accordance with ISP service.
See note at end of this section for explanation
Service Categories see Service Category Table below
PPPoA CONFIGURATION OPTIONS
Configure in accordance with ISP service.
See note at end of this section for explanation
Service Categories see Service Category Table below
IPoA CONFIGURATION OPTIONS
Configure in accordance with ISP service.
See note at end of this section for explanation
Service Categories see Service Category Table below

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.4
5.1.4 CONFIGURING AN ETHERNET INTERFACE
ADVANCED SETUP >LAYER2 INTERFACE>ETH INTERFACE
Its possible to configure one of the Ethernet ports on the router to work as a WAN port
Having selected ‘Apply / Save’ a page showing the configuration is displayed as shown below
6401 Rugged Router
ETH WAN Interface Configuration
Choose Add, or Remove to configure ETH WAN interfaces.
Allow one ETH as layer 2 wan interface.
Interface (Name) Connection Mode
Remove
Add Remove
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
6401 Rugged Router
Back Apply / Save
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
ETH WAN Configuration
This screen allows you to configure a ETH port .
Select a ETH port:
eth3 / eth3 q
Select Connection Mode
Default Mode - Single service over one connection
VLAN MUX Mode - Multiple Vlan service over one connection
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
Interface Name
ETH WAN Interface Configuration
Choose Add, or Remove to configure ETH WAN interfaces.
Allow one ETH as layer 2 wan interface.
Connection Mode Remove
eth0 / eth0 Default Mode
Select Ethernet Interface’ to enter the
Ethernet WAN port configuration.
Existing Ethernet ports that have been
configured as WAN ports are
displayed.
Select ‘Add’ to configure a WAN
interface via an Ethernet port.
Select an Ethernet port from the drop
down menu
Then Select Connection Mode
Default Mode – Single Service over one
connection
VLAN MUX Mode – Multiple VLAN
Service over one connection

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.5
5.1.5. EXPLANATION OF OPTIONS
ATM WAN INTERFACE OPTIONS
Under the ATM Interface we have the following options
EoA – Ethernet over ATM
Used for Point to Point Protocol over Ethernet, IP Over Ethernet or Bridging.
PPPoA – Point to Point Protocol Over ATM.
The Point-to-Point Protocol over ATM (PPPoA) is a network protocol for encapsulating PPP frames
in AAL5. For more details on PPPoA please refer to PPPoA within the WAN Configuration
IPoA – IP over ATM
The use of Asynchronous Transfer Mode (ATM) technology and services creates the need for an
adaptation layer in order to support information transfer protocols, which are not based on ATM. This
adaptation layer defines how to segment and reassemble higher-layer packets into ATM cells, and
how to handle various transmission aspects in the ATM layer.For more information on IPoA please
refer to IPoA within the WAN Configuration part of this manual.
SERVICE CATEGORY TABLE
UBR Without PCR (Default)
Select IP QoS Scheduler Algorithm
Select strict or weighted
Precedence of the default queue
Weight Value of the default queue: [1-63]
Enter value 1 to 63 (Default 1)
Select value 1 to 8 (Default 8)
Peak Cell Rate: [cells/s]
Enter Peak Cell Rate Value (0 – 4095)
Peak Cell Rate: [cells/s]
Enter Peak Cell Rate Value (0-4095)
Peak Cell Rate: [cells/s]
Enter Peak Cell Rate Value (0-4095)
Sustainable Cell Rate: [cells/s]
Enter Sustainable Cell Rate Value (0-4095)
Maximum Burst Size: [cells]
Enter Maximum Burst Size Value (0-4095)
Peak Cell Rate: [cells/s]
Enter Peak Cell Rate Value (0-4095)
Sustainable Cell Rate: [cells/s]
Enter Sustainable Cell Rate Value (0-4095)
Maximum Burst Size: [cells]
Enter Maximum Burst Size Value (0-4095)
ENCAPSULATION MODES.
There are two main methods of Virtual circuit multiplexing.
VC-MUX is one of the two (the other being LLC encapsulation) mechanisms for identifying the
protocol carried in ATM Adaptation Layer 5 (AAL5) frames specified by RFC 2684, Multiprotocol
Encapsulation over ATM.
VC MUX
With virtual circuit multiplexing, the communicating hosts agree on the high-level protocol for a
given circuit. It has the advantage of not requiring additional information in a packet, which
minimizes the overhead. For example, if the hosts agree to transfer IP, a sender can pass each
datagram directly to AAL5 to transfer, nothing needs to be sent besides the datagram and the AAL5

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.6
trailer. This tends to reduce fragmentation overhead (e.g., an IPv4 datagram containing a TCP ACKonly packet with neither IP nor TCP options exactly fits into a single cell). The chief disadvantage of
such a scheme lies in duplication of virtual circuits: a host must create a separate virtual circuit for
each high-level protocol if more than one protocol is used. Because most carriers charge for each
virtual circuit, customers try to avoid using multiple circuits because it adds unnecessary cost.
It is commonly used in conjunction with PPPoE and PPPoA which are used in various xDSL
implementations
LLC/SNAP Encapsulation—The user multiplexes multiple protocols over a single ATM VC. The
protocol of a carried protocol data unit (PDU) is identified by prefixing the PDU with a Logical Link
Control (LLC)/Sub network Access Protocol (SNAP) header.
ATM Service Categories:
Enabling packet level QoS for PVC improves performance for selected classes of
applications. QoS cannot be set for CBR and Real-time VBR. QoS consumes system
resources; therefore the number of PVCs will be reduced. Use Advanced Setup/Quality of
Service to assign priorities for the applications
Within ATM traffic contracts form part of the mechanism by which "quality of service" (QoS) is
ensured. There are four basic types (and several variants) which each have a set of parameters
describing the connection.
1. UBR - Unspecified bit rate: traffic is allocated to all remaining transmission capacity.
2. CBR - Constant bit rate: a Peak Cell Rate (PCR) is specified, which is constant.
3. VBR - Variable bit rate: an average cell rate is specified, which can peak at a certain level for
a maximum interval before being problematic. VBR has real-time and non-real-time variants,
and serves for "bursty" traffic. Non-real-time is sometimes abbreviated to vbr-nrt.
4. ABR - Available bit rate: a minimum guaranteed rate is specified
Most traffic classes also introduce the concept of Cell Delay Variation Tolerance (CDVT), which
defines the "clumping" of cells in time.
To maintain traffic contracts, networks usually use "shaping", a combination of queuing and marking
of cells. "Traffic policing" generally enforces traffic contracts.
Traffic Parameters (Cell Rates)
Each ATM connection contains a set of parameters that describes the traffic characteristics of the
source. These parameters are called source traffic parameters. They are :
Peak Cell Rate (PCR). The maximum allowable rate at which cells can be transported along a
connection in the ATM network. The PCR is the determining factor in how often cells are sent in
relation to time in an effort to minimize jitter. PCR generally is coupled with the CDVT (Cell Delay
Variation Tolerance), which indicates how much jitter is allowable.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.7
5.2 WAN SERVICES
5.2.1 INTRODUCTION
ADVANCED SETUP >WAN SERVICE
Having configured the layer 2 interfaces we now configure the Wide Area Network Interfaces from
these menus. The configuration options are explained at the end of this section.
5.2.2 WAN SERVICE OPTIONS
The Layer 2 Configuration you have configured determines which WAN Services can be selected.
PPPoA – Point to Point Over ATM Only
IPoA – IP Over ATM
EOA WAN Options
Select WAN Service Type
PPP over Ethernet (PPPoE)
IP Over Ethernet
Bridging
Ethernet-
IPoE
PPPoE
The table below shows which services can be configured with which layer two services;
PPP over Ethernet (PPPoE)
Having selected the WAN service then the sub services also provide different options, as shown
below.
Full cone NAT (enable/disable)
Dial on demand (idle timer)
Use PPP with IP Extension
Bridge PPPoE Frames between
WAN and Local ports
Enable IGMP Multicast Proxy

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.8
5.2.2.1 CONFIGURING PPPoA (Layer 2 PPPoA)
Advanced setup>WAN Service
Select ‘WAN set up’ and you will be presented with the following table showing any existing WAN
interfaces already configured. To add a new Interface select the ‘ADD’ button underneath the table
Select ‘add’ to add a new WAN Interface, the following screen will appear, with a drop down menu to
select the Layer 2 interface.
Select the interface from the drop down menu. In our example we have configured a layer 2 interface
running VPI 0 and VCI 38, and this appears in our drop down box. This is the interface we want to
use, so we leave this in place.
Select ‘next’ and the following page appears
WAN Service Configuration
Enter Service description eg pppoA 0_0_38
Enter a description for the service or simply leave it as shown, and select ‘Next’
You will then be presented with a series of forms to fill in these are explained below.
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
Interface Description Type VLAN8021d IGMP NAT Firewall Remove Edit
Add Remove
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
WAN Service Interface Configuration
Select a layer 2 interface for this service
Note: For ATM interface, the descriptor string is (portId_vpi_vci)
For PTM interface, the descriptor string is (portId_high_low)
Where portId=0 --> DSL Latency PATH0
portId=1 --> DSL Latency PATH1
portId=4 --> DSL Latency PATH0&1
low =0 --> Low PTM Priority not set
low =1 --> Low PTM Priority set
high =0 --> High PTM Priority not set
high =1 --> High PTM Priority set
Atm0/(0_0_38) q

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.9
PPP Username and Password
PPP requires that you have a user name and password to establish your connection. In the boxes
below, enter the user name and password that your ISP has provided to you.
PPP Configuration Options
Enter the username provided by your ISP
Enter the Password provided by your ISP
Select form the drop down menu
Auto
PAP
CHAP
MS Chap
Enable full cone Nat (by default not enabled)
Dial on demand (with idle timeout timer)
Note this option only appears if ‘dial on demand is selected. Inactivity Timeout in
minutes [1-4320) (default is 0)
PPP IP Extension (not enabled by default)
NB. option below only appears if Static IP Address is selected.
IPv4 Address (enter your static IP Address if option selected)
Enable PPP Debug Mode (not selected by default)
Enable IGMP Multicast Proxy (not selected by default)
Having selected your options select ‘ Next’ and the following page appears.
Routing -- Default Gateway
The Default Interface list can have multiple WAN Interfaces served as system default gateways but
only one will be used according to the priority with the first being the highest, and the last one the
lowest priority if the WAN is connected. The priority order can be changed by removing and readding the interfaces.
Select Default Gateway Interfaces
Available Routed WAN Interfaces
Note if only one interface has been configured
it will be automatically added to the default
gateway
Select Next to proceed to the DNS Server configuration

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.10
DNS Server Configuration
.
Select DNS Server Interface from available WAN interfaces OR enter static DNS server
IP addresses for the system. In ATM mode, if only a single PVC with IPoA or static
IPoE protocol is configured, a Static DNS server IP addresses must be entered.
DNS Server Interfaces can have multiple WAN interfaces served as system DNS servers
but only one will be used according to the priority with the first being the highest and the
last one the lowest priority if the WAN interface is connected. Priority order can be
changed by removing all and adding them back in again
Select DNS Server Interface from available WAN interfaces
Selected DNS Server Interfaces
Use the following Static DNS IP address
Enter IP Address of Primary Server
Enter IP Address of Secondary Server
Select ‘Next’ to see the WAN set up Summary
WAN Setup - Summary
Make sure that the settings below match the settings provided by your ISP.
Click "Apply/Save" to have this interface to be effective. Click "Back"
to make any modifications.
Click "Apply/Save" to have this interface to be effective. Click "Back" to make any modifications.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.11
5.2.2.2 CONFIGURING IPoA (Layer 2 IPoA)
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.
Select Add to start configuring an IPoA Service, and then select the interface from the following drop
down menu; The menu displays previously configured layer 2 interfaces.
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
WAN Service Interface Configuration
Select a layer 2 interface for this service
Note: For ATM interface, the descriptor string is (portId_vpi_vci)
For PTM interface, the descriptor string is (portId_high_low)
Where portId=0 --> DSL Latency PATH0
portId=1 --> DSL Latency PATH1
portId=4 --> DSL Latency PATH0&1
low =0 --> Low PTM Priority not set
low =1 --> Low PTM Priority set
high =0 --> High PTM Priority not set
high =1 --> High PTM Priority set
IPoA0/(0_0_40) q
WAN Service Configuration
Enter Service Description
Either leave the description at the default or give the service a more meaningful description
Select next and the next page appears where the destination configuration is configured.
Enter information provided to you by your ISP to configure the WAN IP settings.
Add WAN IP Address of destination
Add subnet mask for IP Address
Select Next and the following page appears
Select the options required, there are details on the meanings of these options at the end of
this section.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.12
Network Address Translation Settings
Network Address Translation (NAT) allows you to share one Wide Area Network (WAN) IP
address for multiple computers on your Local Area Network (LAN).
Enable NAT (Default not enabled)
Enable Full Cone NAT (Default not enabled)
Enable Firewall (Default not enabled)
Enable IGMP Multicast (Default not enabled)
Select Next to be shown the ‘Routing Default Gateway.
The Default gateway interface list can have multiple WAN interfaces served as system default
gateways but only one will be used according to the priority with the first being the higest and the last
one the lowest priority if the WAN interface is connected. Priority order can be changed by removing
all and adding them back in again.
Select Default Gateway Interfaces
Available Routed WAN Interfaces
Note if only one interface has been configured
it will be automatically added to the default
gateway
Select Next to go to the DNS Server configuration
Select DNS Server Interface from available WAN interfaces
Selected DNS Server
Interfaces
Use the following Static DNS IP address
Enter IP Address of Primary Server
Enter IP Address of Secondary Server
Select next
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.13
5.2.2.3 CONFIGURING PPP Over Ethernet (PPPoE - layer 2 EOA)
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.
Select Add to start configuring a PPPoE Service, and then select the interface from the following
drop down menu;
WAN Service Configuration
X PPP over Ethernet (PPPoE) (Select this as we are configuring PPPoE)
Enter Service Description
Select next to configure your ISP settings
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
WAN Service Interface Configuration
Select a layer 2 interface for this service
Note: For ATM interface, the descriptor string is (portId_vpi_vci)
For PTM interface, the descriptor string is (portId_high_low)
Where portId=0 --> DSL Latency PATH0
portId=1 --> DSL Latency PATH1
portId=4 --> DSL Latency PATH0&1
low =0 --> Low PTM Priority not set
low =1 --> Low PTM Priority set
high =0 --> High PTM Priority not set
high =1 --> High PTM Priority set
Atm1/(0_0_45) q

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.14
Enter a free form name for this service or
keep the default provided
Enter the name provided by your ISP
Enter the password provided by your ISP
Select from drop down menu
(Auto, PAP, CHAP, MSCHAP)
Default (for explanations please see
end of this section)
Dial on demand with idle timer
Use Static IPv4 Address (If selected field below opens)
Enter your static IPv4 Address
Bridge PPPoE frame between WAN and Local ports
Enable Multicast IGMP Proxy
Select Next to be shown the ‘Routing Default Gateway.
Default gateway interface list can have multiple WAN interfaces served as system default gateways
but only one will be used according to the priority with the first being the higest and the last one the
lowest priority if the WAN interface is connected. Priority order can be changed by removing all and
adding them back in again.
Select Default Gateway Interfaces
Available Routed WAN Interfaces
Note if only one interface has been configured
it will be automatically added to the default
gateway

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.15
Select Next to go to the DNS Server configuration
Select DNS Server Interface from available WAN interfaces
Selected DNS Server
Interfaces
Use the following Static DNS IP address
Enter IP Address of Primary Server if not using
option above
Enter IP Address of Secondary Server if not
using the option above
Select next Wide Area Network (WAN) Service Setup
WAN Setup - Summary
Make sure that the settings below match the settings provided by your ISP.
Click "Apply/Save" to have this interface to be effective. Click "Back" to make any modifications.
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.16
5.2.2.4 CONFIGURING IPoE (IP Over Ethernet – layer 2 EOA )
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.
Select Add to start configuring an IPoE Service, and then select the interface from the following drop
down menu;
WAN IP Settings
Enter information provided to you by your ISP to configure the WAN IP settings.
Notice: If "Obtain an IP address automatically" is chosen, DHCP will be enabled for PVC in IPoE
mode. If "Use the following Static IP address" is chosen, enter the WAN IP address, subnet mask and
interface gateway
Obtain and IP Address Automatically (Default)
Use the following Static IP Address (Select if using a static IP Address)
6401 Rugged Router
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
ATM Interface
Eth Interface
WAN Service Interface Configuration
Select a layer 2 interface for this service
Note: For ATM interface, the descriptor string is (portId_vpi_vci)
For PTM interface, the descriptor string is (portId_high_low)
Where portId=0 --> DSL Latency PATH0
portId=1 --> DSL Latency PATH1
portId=4 --> DSL Latency PATH0&1
low =0 --> Low PTM Priority not set
low =1 --> Low PTM Priority set
high =0 --> High PTM Priority not set
high =1 --> High PTM Priority set
Atm1/(0_0_45) q

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.17
Network Address Translation Settings
Network Address Translation (NAT) allows you to share one Wide Area Network (WAN) IP address
for multiple computers on your Local Area Network (LAN).
NB. Configure the Routing Default Gateway and DNS Server as per PPPoA
Make sure that the settings below match the settings provided by your ISP.
5.2.2.5 CONFIGURING BRIDGING – (layer 2 EOA)
There is very little configuration for Bridging, its only necessary to select an interface and provide it
with a name, then the summary configuration table will be displayed as shown below.
Enter Service Description (example br_0_0_35)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.18
5.2.3 EXPLANATION OF WAN SERVICE OPTIONS
PPPoA – Point to Point over ATM
Point-to-Point Protocol over ATM (PPPoA) is a network protocol for encapsulating PPP frames in
AAL5. It is used mainly with DOCSIS and DSL carriers.
It offers standard PPP features such as authentication, encryption, and compression. If it is used as the
connection encapsulation method on an ATM based network it can reduce overhead slightly (around
0.58%) in comparison to PPPoE. It also avoids the issues that PPPoE suffers from, related to having a
MTU lower than that of standard Ethernet transmission protocols. It also supports the encapsulation
types: VC-MUX and LLC based (as does PPPoE)
IPoA – IP over ATM
The use of Asynchronous Transfer Mode (ATM) technology and services creates the need for an
adaptation layer in order to support information transfer protocols, which are not based on ATM. This
adaptation layer defines how to segment and reassemble higher-layer packets into ATM cells, and
how to handle various transmission aspects in the ATM layer.
The following ATM Adaptation Layer protocols (AALs) have been defined by the ITU-T. It is meant
that these AALs will meet a variety of needs. The classification is based on whether a timing
relationship must be maintained between source and destination, whether the application requires a
constant bit rate, and whether the transfer is connection oriented or connectionless.
AAL Type 1- supports constant bit rate (CBR), synchronous, connection oriented traffic. Examples
include T1 (DS1), E1, and x64 kbit/s emulation.
AAL Type 2 - supports time-dependent Variable Bit Rate (VBR-RT) of connection-oriented,
synchronous traffic. Examples include Voice over ATM. AAL2 is also widely used in wireless
applications due to the capability of multiplexing voice packets from different users on a single ATM
connection.
AAL Type 3/4 - supports VBR, data traffic, connection-oriented, asynchronous traffic (e.g. X.25
data) or connectionless packet data (e.g. SMDS traffic) with an additional 4-byte header in the
information payload of the cell. Examples include Frame Relay and X.25.
AAL Type 5 - is similar to AAL 3/4 with a simplified information header scheme. This AAL
assumes that the data is sequential from the end user and uses the Payload Type Indicator (PTI) bit to
indicate the last cell in a transmission. Examples of services that use AAL 5 are classic IP over ATM.
Ethernet Over ATM Services.
PPPoE – Point-to-Point Protocol over Ethernet
The Point-to-Point Protocol over Ethernet is a network protocol for encapsulating Point-to-Point
Protocol (PPP) frames inside Ethernet frames. It is used mainly with DSL services where individual
users connect to the DSL modem over Ethernet and in plain Metro Ethernet networks.
IPoE – IP Over Ethernet
The most commonly used link layer protocol for Local Area Networks (LANs) is Ethernet and this is
frequently used to support a range of network layer protocols, including IP. The IP datagrams are
transmitted by encapsulation in Medium Access Control (MAC) frames (or LLC frames using MAC
encapsulation). IPoE is also sometimes referred to as “DHCP” since that protocol plays a key role in
the overall IPoE session.
Bridging
Bridging allows the network to appear as one flat network with devices at the remote site appearing
on the local LAN.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.19
NAT - Network Address Translation
The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical
configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A
router on that network has a private address in that address space. The router is also connected to the
Internet with a "public" address assigned by an Internet service provider. As traffic passes from the
local network to the Internet, the source address in each packet is translated on the fly from a private
address to the public address. The router tracks basic data about each active connection (particularly
the destination address and port). When a reply returns to the router, it uses the connection tracking
data it stored during the outbound phase to determine the private address on the internal network to
which to forward the reply
Full-cone NAT, also known as one-to-one NAT
Once an internal address (iAddr:iPort) is mapped to an external address (eAddr:ePort), any
packets from iAddr:iPort will be sent through eAddr:ePort.
Any external host can send packets to iAddr:iPort by sending packets to eAddr:ePort
IGMP snooping - is the process of listening to Internet Group Management Protocol, maintains a
map of which links need which IP multicast streams.
IGMP snooping with proxy - reporting or report suppression actively filters IGMP packets in order
to reduce load on the multicast router. Packets join and leave heading upstream to the router are
filtered so that only the minimal quantity of information is sent.
Routing -- Default Gateway
Default gateway interface list can have multiple WAN interfaces served as system default gateways
but only one will be used according to the priority with the first being the highest and the last one the
lowest priority if the WAN interface is connected. Priority order can be changed by removing all and
adding them back in again.
(Default is the configured interface)
DNS Server Configuration
Select DNS Server Interface from available WAN interfaces OR enter static DNS server IP addresses
for the system. In ATM mode, if only a single PVC with IPoA or static IPoE protocol is configured,
Static DNS server IP addresses must be entered. DNS Server Interfaces can have multiple WAN
interfaces served as system DNS servers but only one will be used according to the priority with the
first being the highest and the last one the lowest priority if the WAN interface is connected. Priority
order can be changed by removing all and adding them back in again

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.20
5.3 VPN
5.3.1 L2TP INTRODUCTION
ADVANCED SETUP >VPN>L2TP
Layer 2 Tunnelling Protocol (L2TP) is a tunnelling protocol used to support virtual private networks
(VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption
protocol that it passes within the tunnel to provide privacy.
The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is
common to carry Point-to-Point Protocol (PPP) sessions within an L2TP tunnel. L2TP does not
provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets
by providing confidentiality, authentication and integrity. The combination of these two protocols is
generally known as L2TP/IPsec.
The two endpoints of an L2TP tunnel are called the LAC (L2TP Access Concentrator) and the LNS
(L2TP Network Server). The LAC is the initiator of the tunnel while the LNS is the server, which
waits for new tunnels. Once a tunnel is established, the network traffic between the peers is
bidirectional. To be useful for networking, higher-level protocols are then run through the L2TP
tunnel. To facilitate this, an L2TP session (or call) is established within the tunnel for each higherlevel protocol such as PPP. Either the LAC or LNS may initiate sessions. The traffic for each session
is isolated by L2TP, so it is possible to set up multiple virtual networks across a single tunnel.
The packets exchanged within an L2TP tunnel are categorised as either control packets or data
packets. L2TP provides reliability features for the control packets, but no reliability for data packets.
DiagramL2TP Packet Exchange

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.21
5.3.2 L2TP CONFIGURATION
ADVANCED SETUP > VPN>L2TP
This menu option allows you to configure an L2TP (Level 2 Tunnelling protocol) service.
On selecting the option the following page appears
L2TP Client Side PPP Connection
Choose Add, Remove to configure a PPP over L2TP WAN Service)
Select ‘Add’ to add a new tunnel, this produces the following menu options.
Add a L2TP Client Side PPP Connection (PPPoL2TP WAN Service)
Enter the IP Address of the remote server
PPP Username and Password
PPP usually requires that you have a user name and password to establish your connection. In the
boxes below, enter the user name and password that your ISP has provided to you
Enter the name provided by your ISP
Enter the password provided by your ISP
Select from drop down menu
(Auto, PAP, CHAP, MSCHAP)
Dial on demand with idle timer
Use Static IPv4 Address (If selected field below opens)
Enter your static IPv4 Address
Enable Multicast IGMP Proxy
Select Next to see the WAN Set up Summary
Make sure that the settings below match the settings provided by your ISP.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.22
Click "Apply/Save" to have this interface to be effective. Click "Back" to make any modifications.
Having selected ‘Apply / save’ we are taken back to the following Wide Area Service SetUp
overview.
Wide Area Network (WAN) Service Setup
Choose Add, Remove or Edit to configure a WAN service over a selected interface.
To Check the L2TP configuration return to the L2TP menu option and now you will see the following
tunnel configured.
L2TP Client Side PPP Connection
Choose Add, Remove to configure a PPP over L2TP WAN Service)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.23
5.4 LAN CONFIGURATION
5.4.1 LAN SETUP
ADVANCED SETUP >LAN
This part of the menu allows the network manager to configure the LAN interfaces on the router. On
entering this option we are presented with the following page.
Configure the Broadband Router IP Address and Subnet Mask for LAN interface. (Default )
(Ethernet 1)
IP Address: Configure an IP address for this routers MMI e.g. 192.168.1.1
(The default IP Address is 192.168.1.1)
Subnet Mask: Configure the sub network mask for the port e.g. 255.255.255.0
(The default sub network mask is 255.255.255.0)
Enable IGMP Snooping: Enable or disable IGMP Snooping. If you enable IGMP its necessary to
select one of the follow modes
Standard Mode – In standard mode the multicast traffic, will flood to all bridge ports when no client
subscribes to a multicast group – even if IGMP snooping is enabled.
Blocking Mode – In blocking mode multi-cast data traffic will be blocked and not flood to all bridge
ports when there are no client subscriptions to any multicast groups.
Enable LAN side firewall; enable the routers firewall on the LAN ports.
6401 Rugged Router
IP Sec
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Certificate
Multicast
Diagnostics
Management
Device Info
Local Area Network (LAN) Setup
Configure the Broadband Router IP Address and Subnet Mask for LAN Interface. Group Name
Default q
IP Address
Subnet Mask
192.168.1.1
255.255.255.0
Enable IGMP Snooping
Enable LAN Side Firewall
Disable DHCP Server
Enable DHCP Server
Start IP Address 192.168.1.2
End IP Address
192.168.1.204
Lease Time (hour) 2
Static IP LeaseList: A maximum of 32 entries can be configured
MAC Address IP Address Remove
Add Entries Remove Entries
Configure the second IP Address and subnet mask for LAN Interface

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.24
Disable DHCP Server: Stop the router from issuing IP addresses to users connected to its LAN ports
Enable DHCP Server: Allows the router to issue IP Addresses to users connecting to its LAN ports.
Enabling this option allows you to configure the Router‘s Dynamic Host Configuration Protocol
(DHCP) server function. The DHCP server is enabled by default for the Router’s Ethernet LAN
interface.
The DHCP service will supply IP settings to computers which are configured to automatically obtain
IP settings that are connected to the Router through the Ethernet port. When the Router is set for
DHCP, it becomes the default gateway for DHCP client connected to it. Keep in mind that if you
change the IP address of the Router, you must change the range of IP addresses in the pool used for
DHCP on the LAN.
Start IP Address. Enter a value for the DHCP server to start with when issuing IP addresses. Because
the default IP address for the Router is 192.168.1.1, the default Start IP Address is 192.168.1.2, and
the Start IP Address must be 192.168.1.2 or greater, but be equal to or smaller than 192.168.1.254.
End IP Address: End IP Address: Enter a value for the DHCP server to end with when issuing IP
addresses. The End IP Address must be smaller than 192.168.1.254. The default End IP Address is
192.168.1.254.
Leased Time (hour): The Leased Time is the amount of time in which a network user will be
allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in
hours, then the user will be “leased” this dynamic IP address. After the dynamic IP address has
expired, the user will be automatically assigned a new dynamic IP address. The default is 24 hours.
Static IP Lease List: The function allows you to specify a reserved IP address for a PC on the LAN,
that PC will always obtain the assigned IP address each time it accesses the DHCP server. Reserved
IP addresses should be assigned to servers that require permanent IP settings. Click the Add Entries
button, and then you will set the rule in the screen as shown below
Enter the MAC address and Static IP address then click “ Apply/Save”. Up to 32 addresses ca be
configured .
The MAC address of the computer on the LAN
for which you want to reserve an IP Address
The IP address you want to reserve for this
computer
The addresses are displayed in a table as shown below

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.25
5.5 NETWORK ADDRESS TRANSLATION (NAT)
5.5.1 NAT – VIRTUAL SERVER CONFIGURATION
ADVANCED SETUP >NAT
Advanced Set up>NAT
Virtual Server allows you to direct incoming traffic from the WAN side (identified
by Protocol and External port) to the internal server with private IP address on the
LAN side. The Internal port is required only if the external port needs to be
converted to a different port number used by the server on the LAN side.
A maximum of 32 entries can be configured
On entering the menu option there is a table showing any existing virtual servers, inviting the
network manager to ‘Add’ a new service. Here we can see a configuration for an X-Windows terminal
going out via WAN Interface ppp0
To Add a new Interface select ‘Add’ and the following screen appears.
Adding a service
Select the service name, and enter the server IP address and click "Apply/Save" to forward IP packets
for this service to the specified server. NOTE: The "Internal Port End" cannot be modified directly.
Normally, it is set to the same value as "External Port End". However, if you modify "Internal Port
Start", then "Internal Port End" will be set to the same value as "Internal Port Start".
Remaining number of entries that can be configured: 32
WAN Service
VPN
LAN
NAT
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.26
NAT – Virtual Server Setup Options
A drop down menu shows the interfaces available. These are the interfaces
previously configured under the WAN Interface.
Select a service name from the drop down list.
You can add your own service in this field
The IP Address of the server on the LAN side
The table below provides an example of a Virtual Server Configuration.
NAT – Virtual Server Setup Example – X-Windows
Select an interface from the drop down list
Service Name:
Select a service
Select a pre-defined name form the drop down list or select ‘custom
service’ and configure your own parameters
Use a free form name and configure your parameters.
The following table can allow mapping of internal to external ports and allows the network manager
to configure whether the protocol should be TCP and UDP, TCP only or UDP only
Having configured your options select ‘Next’ and the following summary display will be shown,
allowing the network manager to view the options configured.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.27
5.5.2 NAT – PORT TRIGGERING
Some applications require that specific ports in the Router's firewall be opened for access by the
remote parties. Port Trigger dynamically opens up the 'Open Ports' in the firewall when an application
on the LAN initiates a TCP/UDP connection to a remote party using the 'Triggering Ports'. The
Router allows the remote party from the WAN side to establish new connections back to the
application on the LAN side using the 'Open Ports'. A maximum 32 entries can be configured.
On entering the NAT - Port Triggering option the following screen appears.
To add ports select the ‘Add’ button and the following options can be configured.
On selecting ‘Add’ a new screen with the configuration parameters appears, this is shown below.
6401 Rugged Router
NAT – Port Triggering
Some applications such as games, video conferencing, remote access applications and others require that specific ports in the Router's
firewall be opened for access by the applications. You can configure the port settings from this screen by selecting an existing
application or creating your own (Custom application)and click "Save/Apply" to add it.
Remaining number of entries that can be configured:32
Use Interface
pppoe_eth0/ppp0 q
Application name
Select an Application
Custom Application
Select One q
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Virtual Servers
Port Triggering
DMZ Host
IP Sec
Certificate
Multicast
Diagnostics
Management
Trigger Port Start Trigger Port End Trigger Protocol Open Port Start Open Port End
q
q
q
UDP
TCP
TCP/UDP
9000
9013
9000 9013

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.28
NAT -- Port Triggering – explanation of the options.
Some applications such as games, video conferencing, remote access applications and others require
that specific ports in the Router's firewall be opened for access by the applications. You can configure
the port settings from this screen by selecting an existing application or creating your own (Custom
application) and click "Save/Apply" to add it.
Remaining number of entries that can be configured: 32
Use Interface: A drop down menu shows the interfaces available. These are the interfaces
previously configured under the WAN Interface.
Service Name: Select a service name from the drop down list. If selecting a pre-defined
service the 6401 will automatically complete the port and protocol values.
Custom Service. You can add your own service in this field
Trigger Port Start Enter the port range from wish to trigger to open the firewall. For example
we may want to open the firewall for an application which uses ports 5400
to 5500, so we enter 5400 in this first column.
Trigger Port End Enter the last port in the range, for example 5400 to 5500.
Trigger Protocol: Enter the protocol that is to be operated via the port, the options are TCP
and UDP, TCP only UDP only.
Open Port Start This is the protocol Start Value used to open the port. For example open
port on 200000
Open Port End This is the protocol End Value used to close the port. For example close port
on 20059
Open protocol Enter the protocol that is to open the port, the options are TCP and UDP,
TCP only UDP only.
Having selected apply a summary of the configuration is provided as shown below
Note: If you select an application from the drop-down list, the fields will be automatically added for
you.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.29
5.5.3 NAT – DMZ HOST.
The Case Communications 6401 Rugged Router will forward IP packets from the WAN that do not
belong to any of the applications configured in the Virtual Servers table to a DMZ host computer.
Enter the computer's IP address and click 'Apply' to activate the DMZ host.
Clear the IP address field and click 'Apply' to deactivate the DMZ host.
DMZ Host IP Address: Enter the IP Address of your DMX host
To add a new DMZ Host:
You can enter the computer's IP address and then click Save/Apply to activate the DMZ host
you set on this page.
Note:
DMZ host forwards all the ports at the same time. Any PC whose port is being forwarded must have
its DHCP client function disabled and should have a new static IP Address assigned to it because its
IP Address may change while using the DHCP function.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.30
5.6 SECURITY
5.6.1 IP FILTERING
ADVANCED SETUP > SECURITY>IP FILTERING
Outgoing IP Filtering Setup
By default, all outgoing IP traffic from LAN is allowed, but some IP traffic can be
BLOCKED by setting up filters.
On selecting this option the following table is displayed.
Choose Add or Remove to configure outgoing IP filters
Add IP Filter -- Outgoing
This screen allows you to create a filter rule to identify outgoing IP traffic by specifying a new filter
name and at least one condition below. All of the specified conditions in this filter rule must be
satisfied for the rule to take effect. Click 'Apply/Save' to save and activate the filter.
Filter name: Select a name for this filter
IP Version Select IP v 4 or IP v 6
Protocol Select the protocol this filter will apply to: TCP &UDP,
TCP, UDP or ICMP only.
Source IP address [/prefix length]: Enter the IP Address
Source Port (port or port:port): Enter source the port number
Destination IP address [/prefix length]: Enter the IP Address of the destination
Destination Port (port or port:port): Enter the destination port details.
Select ‘save’ and the following screen appears, giving a summary of the configuration.
Outgoing IP Filtering Setup
By default, all outgoing IP traffic from LAN is allowed, but some IP traffic can be BLOCKED by
setting up filters.
WAN Service
VPN
LAN
NAT
Security
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.31
Incoming IP Filtering Setup
When the When the firewall is enabled on a WAN or LAN interface, all incoming
IP traffic is BLOCKED. However, some IP traffic can be accepted by setting up
filters.
On selecting this option the following table is displayed.
Choose Add or Remove to configure incoming IP filters
Add IP Filter -- Incoming
This screen allows you to create a filter rule to identify incoming IP traffic by specifying a new filter
name and at least one condition below. All of the specified conditions in this filter rule must be
satisfied for the rule to take effect. Click 'Apply/Save' to save and activate the filter.
Filter name: Select a name for this filter
IP Version Select IP v 4 or IP v 6
Protocol Select the protocol this filter will apply to: TCP &UDP,
TCP, UDP or ICMP only.
Source IP address [/prefix length]: Enter the IP Address
Source Port (port or port:port): Enter source the port number
Destination IP address [/prefix length]: Enter the IP Address of the destination
Destination Port (port or port:port): Enter the destination port details.
WAN Interfaces Tick the interfaces that the filter needs to be applied to
Select ‘save’ and the following screen appears, giving a summary of the configuration.
WAN Service
VPN
LAN
NAT
Security
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.32
5.6.2 PORT FILTERING
In some instances it is necessary to configure Port Forwarding on the router. IP Filtering allows this
function, but the port that is going to be forwarded does need to be opened as shown in Section 5.5.2
Port Forwarding is configured on the Incoming IP Filtering screen.
By default the 6401 will allow devices connected to its Ethernet ports to go out to the Internet, and by
default it will block most incoming ports such as port 23 Telnet etc.
To allow incoming services such as Telnet / FTP to pass through the router to specific hosts, its
necessary to configure port forwarding.
Port forwarding is a way of allowing known TCP/UDP port to go to known IP Addresses.
Here we list a port number that we want to pass through the router, and also configure the IP
Addresses that we will send those ports to. So for example we may want to allow FTP (Port 20) to go
to IP address 192.168.25.2, so against that IP address we add the various TCP/IP ports we want to
access that IP Address.
A list of port numbers and services can be found in the appendix at the back of this manual
5.6.3 MAC FILTERING
Before the network manager can configure MAC Filtering Bridging must be configured.
MAC Filtering Setup
MAC Filtering is only effective on ATM PVCs configured in Bridge mode. FORWARDED means
that all MAC layer frames will be FORWARDED except those matching with any of the specified
rules in the following table. BLOCKED means that all MAC layer frames will be BLOCKED except
those matching with any of the specified rules in the following table.
MAC Filtering Policy For Each Interface:
WARNING: Changing from one policy to another on an interface will cause all defined rules for that
interface to be REMOVED AUTOMATICALLY! You will need to create new rules for the new
policy.
On entering the MAC Filtering page, if the 6401 Rugged ADSL Router has Bridging configured the
following table will appear
Choose ‘Add’ or ‘remove’ to configure MAC Filtering rules.
Select ‘Add’ to display the following table
Add MAC Filter
Create a filter to identify the MAC layer frames by specifying at least one condition below. If multiple
conditions are specified, all of them take effect. Click "Apply" to save and activate the filter

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.33
Select from drop down menu (PPoE, IPv4,
IPv6, Apple Talk, IPX, NetBEUI, IGMP)
Enter MAC Address of destination device
Enter MAC address of source device
Select from drop down menu, LAN>=<WAN,
WAN=>LAN, LAN=>WAN
WAN Interfaces (Configured in Bridge mode only)
Select from drop down menu
Select from drop down menu,
(pppoe_eth0/ppp0, pppoe_eth4/ppp2 etc.)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.34
5.7 PARENTAL CONTROL
5.7.1 TIME RESTRICTIONS
ADVANCED SETUP > PARENTAL CONTROL> TIME RESTRICTIONS
Choose - Advanced Setup>Parental Control>
Parental control provides two ways to control access to the Internet using Time
Restrictions and a Url Filter. These are explained below.
Time Restriction allows you to control the Internet activities on the router by
restricting the time of surfing. URL Filter limits every computer connected to
the router to access certain websites. These two features work independently.
User Name Enter the PC’s user name
Browser's MAC Address 84:8f:69:b0:03:81
Other MAC Address Enter other MAC Addresses to be restricted.
Select the days of the week the restrictions should apply.
Select ADD and a page is displayed which allows you to add restrictions as shown below/
This page adds time of day restriction to a special LAN device connected to the Router. The
'Browser's MAC Address' automatically displays the MAC address of the LAN device where the
browser is running. To restrict other LAN devices, click the "Other MAC Address" button and enter
the MAC address of the other LAN device. To find out the MAC address of a Windows based PC, go
to command window and type "ipconfig /all".
User Name Enter the PC’s user name
Browser's MAC Address 84:8f:69:b0:03:81
(NB the router will detect a connected PC’s MAC address)
Other MAC Address Enter other MAC Addresses to be restricted.
Select the times the restrictions should apply.
Note if the routers time has not been set this option will not be set and a warning given. To set the
time go to Management>Internet Time and configure the region and time.
Start Blocking Time (hh:mm)
End Blocking Time (hh:mm)
Having configured time restriction click save and the following table will be displayed.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.35
5.7.2 URL FILTER
This feature allows you to configure the filter rules based on URL’s to control all the computers in
the LAN to access the specified port. This operates independently of the Time Restriction feature.
On entering this option a table is displayed showing any filters than have been configured and the rule
applied to the filter
Note its necessary to select the list type before entering the URL’s of the sites. A Maximum of 100
entries can be configured..
If the port number is left blank the 6401 router will use port 80 by default.
URL List Type. Exclude Include
There are two policies for the URL Filter.
Exclude: Block the PCs to access the specified URL.
Include: Only allow the PCs to access the specified URL.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.36
5.8 QUALITY OF SERVICE
5.8.1 INTRODUCTION
ADVANCED SETUP > QUALITY OF SERVICE
Choose - Advanced Setup>Quality of Service – To enable Quality of Service.
Quality of Service helps to prioritise data as it enters your router. By attaching
special identification marks or headers to incoming packets, QoS determines
which queue the packets enter, based on priority. This is useful when there are
certain types of data you want to give higher priority, such as voice data packets
give higher priority than Web data packets. This option will provide better service
of selected network traffic over various technologies.
With the 6401 Rugged Router traffic will generally enter the router from the Ethernet ports and will
be marked for transmission over the WAN port or via other Ethernet ports. The order of configuration
for Quality of Service should be;
1. Configure the interfaces – Ethernet and ATM
2. Enable - QoS Queue Management and Configuration
3. Configure the queues – QoS setup
4. Configure Traffic rules to match traffic and assign to the Queues.
Quality of Service is set up on three screens in the Quality of Service menu
Step 1
Layer 2
Setup
Interfaces
If not already
configured.
Step 2
Queue
Management
Configuration
Tick menu option
to Enable QoS
and assign default
DSCP from drop
down box
Step 3
Queue
Configuration
Configure a QoS
queue and assign
it to a specific
layer 2 interface.
The scheduler
algorithm is
defined by the
layer 2 interface
Step 4
QoS
Classification
Create traffic class rules
to classify upstream
traffic, assign a queue
which defines the
precedence and interface
and optionally
overwrites the DSCP
header.
A rule consists of
1. Class Name
2. One condition
matching the
configuration
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.37
5.8.2. CONFIGURING A LAYER TWO INTERFACE
Generally these will have been configured before in the layer two interfaces settings.
It’s possible to configure an Ethernet interface from the QoS menu, but to configure an ATM interface
this must have been previously configured from the Layer Two menu option.
When configuring the layer two parameters for an interface select the menu options to configure the
IP QoS Schedules for the interface. These options are
Strict Priority
Precedence of the default queue Default 8 (lowest)
Weighted fair queuing
Weighted fair value of the default queue [1-63] 1
MPAAL Group precedence 1 to 8
5.8.3. QOS – QUEUE MANAGEMENT CONFIGURATION
If Enable the QoS checkbox is selected, choose a default DSCP mark to automatically mark
incoming traffic without reference to a particular classifier. Click 'Apply/Save' button to save
it.
Note: If Enable QoS checkbox is not selected, QoS will be disabled for all interfaces.
Note: The default DSCP mark is used to mark all egress packets that do not match any
classification rules.
Enable QoS
If you enable QoS (tick box) you are presented with another menu option, and a drop down box where
you can select your DSCP Mark.
Select Default DSCP Mark
Note: A default DSCP mark is used to mark all ‘egress’ packets that do not match any classification rules.
Enabling QoS then allows selection of the DSCP values from the drop down menu, which displays the
following options. Note’ No-Change (-1) and Auto Marking (-2) options are also displayed.
Assured Forwarding (AF) Behaviour Group

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.38
5.8.4. QOS QUEUE CONFIGURATION-SETUP
This screen allows the network manager to configure a QoS queue and assign it to a specific layer 2
interface. The scheduler algorithm is defined by the layer 2 interface.
In ATM mode a maximum of 16 queues can be configured
In PTM (Packet Transfer Mode) a maximum of 8 queues can be configured.
For each Ethernet interface a maximum of 4 queues can be configured.
If configuring an Ethernet interface its only possible to set precedence levels
If configuring a WAN port the Precedence or weighting can be selected as well as DSL
latency
If any interfaces are configured on entering this option we see a table as shown below, which displays
the various queues configured.
These fields have the following meanings
Note: For SP scheduling, queues assigned to the same Layer 2 interface shall have unique precedence.
Lower precedence value implies higher priority for this queue relative to others
Click 'Apply/Save' to save and activate the queue.
Name: Provide a Name for this schedule
Enable Enable or disable this service
Interface This will be the Layer 2 interfaces or any of the LAN ports
(Atm0, Eth0 WAN, Eth1, Eth2, Eth3, Eth4)
Precedence (NB1) 1 to 7 (For ATM WAN interface)
1 to 4 (for Ethernet Interface)
Queue Weight 1 to 63 (NB Lower value gives higher priority)
DSL Latency Displays the DSL latency set for the interface if the schedule is set on
a DSL interface.
PTM Priority Packet Transfer Mode – alternative to ATM not currently enabled
Note 1
Lower integer values for precedence imply higher priority for this queue relative to others.
The queue entry configured here will be used by the classifier to place ingress packets appropriately.
QoS Queue Configuration – Example for interface with Precedence
Select from the drop down menu of interfaces on the router
1 (This rule has highest priority)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.39
5.8.5. CONFIGURING QOS CLASSIFICATION
This screen creates a traffic class rule to classify the upstream traffic, assign queue which defines the
precedence and the interface and optionally overwrite the IP header DSCP byte.
A rule consists of a class name and at least one condition below. All of the specified conditions in
this classification rule must be satisfied for the rule to take effect. Click 'Apply/Save' to save and
activate the rule. A rule consists of a class name and at least one condition below. All of the specified
conditions in this classification rule must be satisfied for the rule to take effect.
The Table below shows the Class Interfaces and where they may be used.
Classification Queue (assuming
Queues for all Ethernet ports are set)
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth0, eth1, eth2, eth3, eth4 or ATM
eth0, eth1, eth2, eth3 or eth4
eth0, eth1, eth2, eth3, eth4 or ATM
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth1, eth2, eth3, eth4 or ATM
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth0, eth2, eth3, eth4 or ATM
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth0, eth1, eth3, eth4 or ATM
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth0, eth1, eth2, eth4 or ATM
IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866 or 8021Q
eth0, eth1, eth2, eth3 or ATM
eth0, eth1, eth2, eth3 or eth4
QoS Classification Setup -- A maximum 32 entries can be configured..
The screen that will be displayed will depend on which options are set. Therefore we have provided a
number of tables which show the options available. However there are too many combinations to
include all within this menu.
Specify Classification Criteria
Specify Classification Results

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.40
The Network options available are described in the table below.
Traffic Class name Name given to this Profile
Rule Order The order this rule should be carried out in, the number will
depend on the number of Traffic Class rules entered. If there are no
previously configured rules in place the only option will be ‘last.
Rule Status Enable or Disable
Specify Classification Criteria
Class Interface Select a list of available interfaces from the drop down menu. (e.g.
LAN, WAN, Local, eth0, eth1, eth2, eth3, eth4, pppoa0/atm1)
Ether type Select from the drop down menu (IP, ARP, IPv6, PPPoE_DISC,
PPPoE_SES, 8865, 8866, 802.1Q)
802.1p Priority Check The QoS technique, also known as class of service (CoS), is a 3-bit
field called the Priority Code Point (PCP) within an Ethernet frame
header when using VLAN tagged frames as defined by IEEE 802.1Q.
It specifies a priority value of between 0 and 7 inclusive that can be
used by QoS disciplines to Differentiate traffic.
Source MAC Address Enter the Source (originating devices) MAC Address e.g.
00:1A:A0:93:A5:65
Source MAC Mask Type the mask for the MAC address. Enter the mask with periods
Separating the three groups of four characters (112.334.556.778, for
Example). Entering 255.255.255.255 as the mask causes the access
Point to accept any IP address. If you enter 0.0.0.0, the access point
Looks for an exact match with the IP address you entered in the IP
Address field.
Destination MAC Address Enter the destination device (receiving devices) MAC Address e.g.
00:11:22:33:44:AA
Destination MAC Mask Type the mask for the MAC address. Enter the mask with periods
separating the three groups of four characters (112.334.556.778, for
example). Entering 255.255.255.255 as the mask causes the access
point to accept any IP address. If you enter 0.0.0.0, the access point
looks for an exact match with the IP address you entered in the IP
Address field.
Source IP Address Enter the IP Address for the source / originating device e.g.
192.168.1.20/24 (255.255.255.0)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.41
Destination IP Address Enter the IP Address of the remote service the application is to reach.
E.g. 172.16.20.1/ 16 (255.255.0.0)
Differentiated Services Select from the drop down menu, the options within the DSCP Drop
Code Point (DSCP) Check. down menu are;
Match packets with CS1(precedence 1)
Match packets with CS2(precedence 2)
Match packets with CS3(precedence 3)
Match packets with CS4(precedence 4)
Match packets with CS4(precedence 5)
Match packets with CS4(precedence 6)
Match packets with CS7(precedence 7)
Match packets with default
Protocol Select from drop down menu – TCP – UDP – ICMP-IGMP (where
IPv6 ICMPv6 is displayed)
Specify Classification Select the ‘Classification Queues’ previously configured under
Results Assign Classify ‘Queue Config. Note they will have been given ‘key’ numbers.
Queue
Mark Differential This is the same drop down menu as shown above and allows
Service Code Point (DSCP) you to mark the traffic with a DSCP value.
Mark 802.1p Priority Provides a layer 2 802.1p priority to unassigned frames. Please refer
to the table previously showing the 802.1p priority levels.
TAG VLAN ID IEEE 802.1Q is the networking standard that supports Virtual LANs
(VLANs) on an Ethernet network. The standard defines a system of
VLAN tagging for Ethernet frames and the accompanying procedures
to be used by bridges and switches in handling such frames. The
standard also contains provisions for a quality of service prioritization
scheme commonly known as IEEE 802.1p and defines the Generic
Attribute Registration Protocol.
802.1Q does not actually encapsulate the original frame. Instead, for
Ethernet frames, it adds a 32-bit field between the source MAC
address and the EtherType/Length fields of the original frame,

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.42
extending the minimum and maximum frame sizes from 64 and 1,518
bytes (octets) to 68 and 1,522 bytes. Two bytes are used for the tag
protocol identifier (TPID), the other two bytes for tag control
information (TCI). The TCI field is further divided into PCP, CFI,
and VID.
802.1q operation
Enable 802.1q” in the WAN configuration WEB page if IEEE 802.1q VLAN header is to
be inserted to the rfc2684 bridged encapsulated MAC frame in upstream direction.
In receiving downstream MAC frame, the 802.1q header will be stripped before it is
forwarded to the IP or the bridge module.
If the 802.1p marking is configured in the packet Quality of Service, it will only be effective if the
packet is forwarded to a PVC that has 802.1q VLAN enabled.
5.8.7. DSCP OVERVIEW
Quality of Service within the 6401 Rugged Router is provided by Differentiated Services Code Point
(DSCP). DiffServ uses the 6-bit field in the IP header for packet classification purposes.
DSCP replaces the outdated Type of Service (TOS) field.
Network traffic entering a DiffServ domain is subjected to classification and conditioning. Traffic may
be classified by many different parameters, such as source address, destination address or traffic type
and assigned to a specific traffic class. Traffic classifiers may honour any DiffServ markings in
received packets or may elect to ignore or override those markings.
Differentiated Services Code Point (DSCP)
The DSCP is a number in the range 0 to 63 that is placed into an IP Packet to mark it according to the
class of traffic it belongs in. Half of these values are earmarked for standardized services the other half
are available for local definition
Assured Forwarding (AF) PHB group
Assured forwarding allows the operator to provide assurance of delivery as long as the traffic does not
exceed some subscribed rate. Traffic that exceeds the subscription rate faces a higher probability of
being dropped if congestion occurs.
The AF behaviour group defines four separate AF classes with Class 4 having the highest priority.
Within each class, packets are given drop precedence (high, medium or low). The combination of
classes and drop precedence yields twelve separate DSCP encodings from AF11 through AF43 (see
table below).
Assured Forwarding (AF) Behaviour Group

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.43
5.8.8. CONFIGURATION EXAMPLES
EXAMPLE 1 – LAN – TELNET TRAFFIC ENTERING FROM LAN
Only option for this configuration
Specify Classification Criteria
A blank criterion indicates it is not used for classification.
LAN, WAN, Local, eth1, eth2, eth3,eth4
Select from drop down list
IP, ARP, IPv6, PPPoE_Disc, PPPoE_SES, 8865,
8866, 802.1Q
Enter Source Device MAC Address
Enter Source Device MAC Mask
Enter Destination MAC Address
Enter destination MAC Mask
Left blank to allow access to any remote IP address
Select port number for the application
Select port number for the application
Specify Classification Results
Must select a classification queue.
A blank mark or tag value means no change
Assign Classification Queue:
Select from a drop down menu, these are
previously configured Queues
Mark Differentiated Service
Code Point (DSCP):
Provides QoS at the MAC Layer. Select from drop
down menu range 0 (Lowest) to 7 (Highest)
Enter VLAN Tag ID if tagged VLANS are in use
Enter a data rate in Kbps
Having selected this click save and the following table will be displayed showing the configuration

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.44
EXAMPLE 2 – TRAFFIC ON ETH 0 USING 802.1Q
Name of the Traffic Class Rule
Last rule to be processed
Specify Classification Criteria
A blank criterion indicates it is not used for classification.
We apply this rule to eth0
Specify Classification Results
Assign Classification Queue:
Atm0&atm0path&key56&Pre8 (from drop down menu)
Mark Differentiated Service
Code Point (DSCP):
AF23 Low priority higher medium high drop rate
Mark 802.1p priority
Select form drop down menu range 0 to 7
Enter bandwidth to assign for this QoS
EXAMPLE 3 WAN - SNMP TRAPS ON WAN
Please note that using the WAN Interface for QoS requires at least one of the Ethernet ports
configured as a Queue (see above)
Only option for this configuration
Specify Classification Criteria
A blank criterion indicates it is not used for classification.
LAN, WAN, Local, eth1, eth2, eth3,eth4
Only option allowed on WAN
Enter Source Device MAC Address
Select port number for the application
Select port number for the application

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.45
5.9. ROUTING
5.9.1 DEFAULT GATEWAY
ADVANCED SETUP > ROUTING
On entering the Routing menu the first option is to select the Default Gateway,
out of the router.
The default gateway interface list can have multiple WAN interfaces served as
system default gateways but only one will be used according to the priority with
the first being the highest and the last one the lowest priority if the WAN interface
is connected. Priority order can be changed by removing all and adding them back
in again.
The router will automatically enter any configured WAN interfaces into the
‘Default Gateway’.
5.9.2 STATIC ROUTES.
This menu allows the network manager to configure static routes on the 6401 router. Up to 32 Static
routes can be configured in the 6401. On entering the menu option a table is displayed showing what
static routes have been configured as shown below.
Routing -- Static Route Add
Enter the destination network address, subnet mask, gateway AND/OR available WAN interface then
click "Apply/Save" to add the entry to the routing table.
Static Routing Menu options
Destination IP address/prefix length:
Enter the destination IP address with an address subnet mask
using the CIDR format. For example 172.16.10.20/16 or
192.168.1.1/24
Gateway (Only if using Ethernet port
as a WAN port)
Enter the Gateway address out of the local LAN
Interface
Select the maximum number of hops to the destination
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.46
5.9.3 POLICY ROUTING
In computer networking, policy-based routing (PBR) is a technique used to make routing decisions
based on policies set by the network administrator.
When the 6401 Rugged Router receives a packet it normally decides where to forward it based on the
destination address in the packet, which is then used to look up an entry in a routing table. However,
in some cases, there may be a need to forward the packet based on other criteria. For example, a
network administrator might want to forward a packet based on the source address, not the destination
address. This should not be confused with source routing.
Policy-based routing may also be based on the size of the packet, the protocol of the payload, or other
information available in a packet header or payload. This permits routing of packets originating from
different sources to different networks even when the destinations are the same and can be useful
when interconnecting several private networks.
Policy Routing Setup
A maximum of 8 policies can be added to the 6401 router.
Enter the policy name, policies, and WAN interface then click "Apply/Save" to add the entry to the
policy routing table.
Note: If selected "IPoE" as WAN interface, default gateway must be configured.
Provide a name for this policy, a maximum of 8 letters, no spaces
Select a LAN port from the drop down menu
Enter the Source IP Address of the device setting up the connection.
Select the user interface from all the WAN interfaces that have been
configured. For example. pppoa_0_0_38/pppoa0, this will be the
WAN interface out of the Router
Enter the IP Address of the Gateway out of the LAN
Having configured your routes and saved the configuration, a table will be displayed showing the
configured routes.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.47
5.9.4 RIP
To configure RIP select the RIP option under Routing and you will see the RIP menu option.
RIP can only be configured on services which don’t use Network Address Translation (NAT), and
any invalid interface will not be displayed in the RIP table.
Point to Point over Ethernet
Point to Point over Ethernet
If a Service has been configured which can support RIP then when going to the RIP option in the
menus, the interface will be displayed.
The following table will be displayed
Select RIP version, 1, 2 or
both
Select ‘Enable’ to enable the configuration to be active.
NOTE: RIP CANNOT BE CONFIGURED on the WAN interface which has NAT enabled (such
as PPPoE).
To activate RIP for the WAN Interface, select the desired RIP version and operation and place a
check in the 'Enabled' checkbox. To stop RIP on the WAN Interface, uncheck the 'Enabled' checkbox.
Click the 'Apply/Save' button to star/stop RIP and save the configuration.
Having configured your WAN ports they will appear in a table showing the ports enabled for RIP, as
shown below.
Select enable to activate these ports.
Active or Passive RIP
RIP classifies routers as active and passive (silent).
Active routers advertise their routes (reachability information) to others;
Passive routers listen and update their routes based on advertisements, but do not advertise.
Typically, routers run RIP in active mode, while hosts use passive mode

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.48
RIP version 1
The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop
count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops
allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is
15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16
is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise
undesirable routes in the selection process.
RIP version 2
RIP II includes the ability to carry subnet information, thus supporting Classless Inter-Domain
Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remains.
RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol
fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature allows
fine-grained interoperability adjustments.
In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts the
entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1 which uses
broadcast. Unicast addressing is still allowed for special applications.
Some of the most notable RIP II enhancements are:
Next hop
The primary ones are the ability to advertise a next hop to use other than the router supplying the
routing update. This is quite useful when advertising a static route to a dumb router that does not run
RIP as it avoids having packets destined through the dumb router from having to cross a network
twice. RIP I routers will ignore next hop information in RIP II packets. This may result in packets
crossing a network twice, which is exactly what happens with RIP I.
Network Mask
RIP I assumes that all sub-networks of a given network have the same network mask. It uses this
assumption to calculate the network masks for all routes received. This assumption prevents subnets
with different net-masks from being included in RIP packets. RIP II adds the ability to explicitly
specify the network mask with each network in a packet.
While RIP I routers will ignore the network mask in RIP II packets, their calculation of the network
mask will quite possibly be wrong. For this reason, RIP I compatible RIP II packets must not contain
networks that would be mis-interpreted. These network must only be provided in native RIP II
packets that are multicast.
Authentication
RIP II packets may also contain one of two types of authentication string that may be used to verify
the validity of the supplied routing data. Authentication may be used in RIP I compatible RIP II
packets, but be aware that RIP I routers will ignore it.
The first method is a simple password in which an authentication key of up to 16 characters is
included in the packet. If this does not match what is expected, the packet will be discarded. This
method provides very little security as it is possible to learn the authentication key by watching RIP
packets.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.49
CIDR blocks and number of Host IDs per segment:
How can I calculate the Subnet Mask from a CIDR-type address?
Write down the number of bits that are in the CIDR notation (in Binary notation), divide them into 4
octets, and convert them to decimal notation. For example:
CIDR address: 212.43.43.33/27
Write down 27 bits as 1 (one), and the rest (5) as 0 (zero): 11111111111111111111111111100000
Divide them into 4 octets: 11111111.11111111.11111111.11100000
Convert to decimal: 255.255.255.224
Remember that class A networks are followed by a /8, class B networks are followed by a /16, and
class C networks are followed by a /24. The table below should allow a quick reference.
A network is called a ‘Superrnet, when the prefix boundary contains fewer bits than the network’s
natural (ie Classful) mask. A network is called a subnet when the prefix boundary contains more bits
than the networks natural mask

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.50
5.10 DNS
ADVANCED SETUP >DNS
The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or any resource connected to the Internet or a private network.
It associates various information with domain names assigned to each of the
participating entities.
A Domain Name Service translates queries for domain names (which are
meaningful to humans) into IP addresses for the purpose of locating computer
services and devices worldwide.
5.10.1 CONFIGURING A DNS SERVER
Select DNS From the menu and the following page will be displayed
DNS Server Configuration
Select DNS Server Interface from the available WAN Interfaces or enter a static DNS Server IP
Address for the system.
If using ATM Mode, with only a single PVC with IPoA or Static IPoE protocol, then a static DNS
Server IP Addresses must be entered
DNS Server Interfaces
Can have multiple WAN Interfaces served as systems DNS servers but only one will be used
according to the priority. The highest priority DNS Server will the first connected WAN interface and
the last connected WAN Interface will be the lowest priority. To change priority remove and re-add
the servers.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
Layer 2 Interface
Advanced Setp
6401 Rugged Router
DNS Server Configuration
Select DNS Server Interface from the available WAN Interfaces or enter a static DNS Server IP Address for the system.
In using ATM Mode, with only a single PVC with IPoA or Static IPoE protocol, then a static DNS Server IP Addresses must
be entered
DNS Server Interfaces
Can have multiple WAN Interfaces served as systems DNS servers but only one will be used according to the priority. The
highest priority DNS Server will the first connected WAN interface and the last connected WAN Interface will be the lowest
priority. To change priority remove and re-add the servers.
Select DNS Server Interface from the available WAN Interfaces
Selected DNS Server
Interfaces
Available WAN Interfaces
Atm1
pppoa1
pppoa1
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
Layer 2 Interface
Advanced Setp
Use the following Static DNS IP address
Primary DNS Server
Secondary DNS Server

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.51
5.10.2 CONFIGURING DYNAMIC DNS
Dynamic DNS is a term used for the updating in real time of Internet Domain Name System
(DNS) name servers to keep the active DNS configuration of their hostnames, addresses and other
information up to date.
In order to use the Dynamic DNS service its necessary to subscribe to a Dynamic DNS Service.
Dynamic DNS providers offer a software client program that automates the discovery and registration
of the client system's public IP addresses. The client program is executed on a computer or device in
the private network. It connects to the Dynamic DNS provider's systems with a unique login name;
the provider uses the name to link the discovered public IP address of the home network with a
hostname in the domain name system. Depending on the provider, the hostname is registered within a
domain owned by the provider, or within the customer's own domain name. These services can
function by a number of mechanisms. Often they use an HTTP service request since even restrictive
environments usually allow HTTP service.
The Dynamic DNS Server allows the network manager to alias a dynamic IP Address to a static host
name in any of the domains, allowing the 6401 Rugged Router to be more easily accessed from
various locations on the Internet
On entering the Dynamic DNS menu the following options are presented.
Select from the drop down menu. In version of software 4.06L.03 the
two service providers for dynamic DNS are;
DynDNS.Org
TZO (Different menu options appear when TZO has been selected)
Enter the name of the host in this field - freeform
Select an interface from the drop down menu, eg ipoE_0_0_34/atm1
Where DynDNS has been selected the following options are shown
DynDNS Setting
Or if TZO has been selected complete the following options
Dyn DNS.Org - Dynamic DNS service used to connect remotely to your Network, Camera, PC or
Domain. http://dyn.com/dns/
TZO - TZO is a leading provider of Static and Dynamic DNS services. Our easy to use Dynamic
DNS (DDNS) is a simple way to run your own servers on a Dynamic IP address http://www.tzo.com/

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.52
5.11 DSL CONFIGURATION
ADVANCED SETUP>DSL
The following menu options will be show, simply select all that are
required.
G.DMT Enabled
G.Lite Enabled
T.1413 Enabled
ADSL 2 Enabled
Annex L Enabled
ADSL2+ Enabled
Annex M Enabled (do not select unless your ISP supports Annex M)
Select the Phone Pair
Some equipment requires a signal on the "outer pairs" instead of the "inner pairs" of a
telephone jack.
Inner Pair – selecting the inside pair of wires
Outer pair – selects the outer pair of wires
Capability (see below for details on Bit Swap and SRA)
Bit swap Enabled
SRA Enabled
DSL Options
G.DMT
In telecommunications, ITU G.992.1 (better known as G.DMT) is an ITU standard for ADSL using
discrete multi-tone modulation. G.DMT full-rate ADSL expands the usable bandwidth of existing
copper telephone lines, delivering high-speed data communications at rates up to 8 Mbit/s
downstream and 1.3 Mbit/s upstream
G.LITE
In telecommunications, ITU G.992.2 (better known as G.Lite) is an ITU standard for ADSL using
discrete multi-tone modulation. G.Lite does not strictly require the use of phone line splitters, but like
all ADSL lines generally functions better with splitters.
G.lite is a modulation profile which can be selected on a DSLAM port by an ADSL provider and
provides greater resistance to noise and tolerates longer loop lengths (DSLAM to customer distances)
for a given bandwidth. Most ADSL modems and DSLAM ports support it, but it is not a typical
default configuration. Real life download speeds with this modulation is 2 Mbit/s.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.53
ANSI T1.413
ADSL (T1.413) allows the provision of voice band services including plain old telephone service
(POTS) and data services up to 56 kbit/s, and a variety of digital channels.
ADSL 2
ITU G.992.3 is also referred to as ADSL2 or G.DMT.bis. It optionally extends the capability of basic
ADSL in data rates to 12 Mbit/s downstream and, depending on Annex version, up to 3.5 Mbit/s
upstream. ADSL2 uses the same bandwidth as ADSL but achieves higher throughput via improved
modulation techniques.
Annex L
Increases the range of the DSL service enabling the link to work at a distance of 7 kilometres (23,000
ft)
ADSL 2+
ITU G.992.5 is an ITU standard, also referred to as ADSL2+ (or ADSL2Plus), is notable for its
maximum theoretical download speed of 24 Mbit/s. ADSL2+ allows port bonding, also known as
G.998.x or G.Bond
Annex M
Annex M is an optional specification in ITU-T recommendations G.992.3 (ADSL2) and G.992.5
(ADSL2+), also referred to as ADSL2 M and ADSL2+ M. This specification extends the capability of
commonly deployed Annex A by more than doubling the number of upstream bits. The data rates can
be as high as 12 or 24 Mbit/s downstream and 3 Mbit/s upstream.
Bit Swapping
Bit Swapping is a way of keeping the line more stable by constantly monitoring the frequency bins
(carriers) in use and reusing them if possible.
The bit swap process enables the connection to either change the number of bits assigned to each
individual sub channel or if necessary increase/decrease the power level (gain) whilst still maintaining
the data flow.
With bit swapping the Case 6401 Rugged router can swap the bits around and redistribute the bits to
other channels by using any spare SNR at other frequencies or increasing the gain.
Without bit-swapping, your connection would lose sync every time there was a noise burst that meant
any sub-channel wasn't able to transmit its allocated number of bits.
SRA - Seamless Rate Adaption
Seamless Rate Adaption is a method which dynamically adapts your line rate /sync speed on the fly
depending upon the current condition of your line without having to perform a full retrain or resync.
With SRA, line conditions are constantly monitored and any increases/decreases in SNR result in an
increase/decrease in the line connection speed without having to go through the initialisation process.
Line speed will always be at the highest possible rate depending upon your set target SNR, which is
particularly useful if you have had a low synch and line conditions later improve, as SRA will ensure
that your line speed will increase in line with the better conditions.
While the Case Communications 6401 Rugged Router supports SRA its necessary for the ISP’s
DSLAM to support SRA for it to be used. By default this will not be enabled.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.54
5.12 UPnP
5.12.1 INTRODUCTION TO UPnP
ADVANCED SETUP > PGuP
Universal Plug and Play (UPnP) is a set of networking protocols that permits
networked devices, such as personal computers, printers, Internet gateways, Wi-Fi
access points and mobile devices to seamlessly discover each other's presence on
the network and establish functional network services for data sharing,
communications, and entertainment. UPnP is intended primarily for residential
networks without enterprise class devices.
Universal plug and play (UPnP) is architecture for pervasive peer to peer network
connectivity of intelligent appliances and PCs of all form factors. It is designed to
bring easy-to-use, flexible, standards-based connectivity to ad-hoc or unmanaged
networks whether in the home, in a small business, public places, or attached to
the Internet.
5.12.2 CONFIGURING UPnP ON THE 6401 RUGGED ROUTER
The 6401 Rugged Router has an option to select UPnP and to then apply
NOTE: UPnP is activated only when there is a live WAN service with NAT enabled
Having selected UPnP click ‘Apply / Save’
5.12.3 CONFIGURING UPnP ON A WINDOWS XP PC
Windows XP supports UPnP function.
Please follow the steps below for installing UPnP components.
1. Click on the Start menu, point to Settings and click on Control Panel.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
Layer 2 Interface
Advanced Setp
2. Select Add or Remove Programs
> Add/Remove Windows
Components to open Windows
Components Wizard dialog box.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.55
5. After finishing the installation, go to My Network Places. You will find an icon (e.g., Case 6401
Rugged Route) for UPnP function.
6. Double click on the icon, and the ADSL router will open another web page via the port for UPnP
function. The IE address will be directed to the configuration main webpage as shown in the graphic.
7. Now, the NAT traversal function has already been provided. The ADSL router will create a new
virtual server automatically when the router detects that some internet applications is running on the
PC.
5.12.4 CONFIGURING UPnP ON A WINDOWS 7 PC
On newer versions of Windows UPnP has been changed to Network Discovery and on most
installations of Windows 7 it is installed and enabled by default.
To enable Network Discovery:
1. Go to Control Panel and select “Network and Sharing Center”
2. Select “Change advanced sharing settings”
3. Under “Home or Work” ensure that Network Discovery is turned on.
4. Under “Public” ensure that Network Discovery is turned off (to prevent a possible
network security issue)
3. Select Networking Services and
click Details. Click the UPnP User
Interface check box.
4. Click OK. The system will install
UPnP components automatically.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.56
5.13 DNS Proxy
ADVANCED SETUP > DNS PROXY
The Domain Name Service is a system designed to allow the identification of
Internet servers to be based on names rather than IP addresses. Because Internet
communication is based on IP addresses, all names must be translated into an IP
address.
The 6401 Rugged Router has a built-in DNS proxy that can take DNS queries
from devices on the local network and forward them to the 6401 Router, which in
turn asks the DNS Servers provided by the ISP.
By default the DNS Proxy is enabled and 6401 Router will forward all requests to
the servers detected by the operating system (usually assigned by your ISP).
Alternatively you can choose to forward DNS queries to specified servers.
On entering the option the following page is displayed.
Select DNS Proxy Configuration – Configure a specific server.
Host name of the Broadband Router – Enter the name of this router
Domain Name of the LAN Network – Enter the Domain name of the Local Network
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Layer 2 Interface
Advanced Setp
6401 Rugged Router
x DNS Proxy Configuration
Host Name of the Broadband Router
Domain Name of the LAN Network
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Layer 2 Interface
Advanced Setp

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.57
5.15 INTERFACE GROUPING
ADVANCED SETUP > INTERFACE GROUPING
Interface Grouping -- A maximum 16 entries can be configured
Interface Grouping supports multiple ports to PVC and bridging groups.
Each group will perform as an independent network. To support this feature, you
must create mapping groups with appropriate LAN and WAN interfaces using the
Add button.
The Remove button will remove the grouping and add the ungrouped interfaces to
the Default group. Only the default group has IP interface.
On selecting the option the following page is displayed.
The table displays all available WAN and LAN Interfaces.
To add a new interface select ‘Add’ and to remove a group select ‘Remove’
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
6401 Rugged Router
Interface Grouping -- A maximum 16 entries can be configured
Interface Grouping supports multiple ports to PVC and bridging groups. Each group will perform as an
independent network. To support this feature, you must create mapping groups with appropriate LAN
and WAN interfaces using the Add button. The Remove button will remove the grouping and add the
ungrouped interfaces to the Default group. Only the default group has IP interface.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Group Name Remove WAN Interface LAN Interfaces DHCP Vendor IDs
ppp0
atm1
atm2
eth3
eth4
eth0
eth1
Add Remove

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.58
Interface grouping Configuration
To create a new interface group:
1. Enter the Group name and the group name must be unique and select either
(dynamic)
or
(static) below:
2. To automatically add LAN clients to a WAN Interface in the new group add the DHCP vendor ID
string.
By configuring a DHCP vendor ID string any DHCP client request with the specified vendor ID
(DHCP option 60) will be denied an IP address from the local DHCP server.
3.Select interfaces from the available interface list and add it to the grouped interface list using the
arrow buttons to create the required mapping of the ports. Note that these clients may obtain public IP
addresses
4. Click Apply/Save button to make the changes effective immediately
IMPORTANT If a vendor ID is configured for a specific client device, please REBOOT the client
device attached to the modem to allow it to obtain an appropriate IP address.
6401 Rugged Router
Interface grouping Configuration
To create a new interface group:
1. Enter the Group name and the group name must be unique and select either 2. (dynamic) or 3. (static) below:
2. If you like to automatically add LAN clients to a WAN Interface in the new group add the DHCP vendor ID string. By configuring a DHCP vendor
ID string any DHCP client request with the specified vendor ID (DHCP option 60) will be denied an IP address from the local DHCP server.
3.Select interfaces from the available interface list and add it to the grouped interface list using the arrow buttons to create the required mapping of the
ports. Note that these clients may obtain public IP addresses
4. Click Apply/Save button to make the changes effective immediately
IMPORTANT If a vendor ID is configured for a specific client device, please REBOOT the client device attached to the modem to allow it to
obtain an appropriate IP address.
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Group Name:
WAN Interface used in the grouping
Ipoe_0_0_34/atm1
Grouped LAN Interfaces
Available LAN Interfaces
Eth0
Eth1
Eth3
Eth4
>
>

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.59
5.16. IP SEC
ADVANCED SETUP > IP SEC (Only in Admin Mode)
5.16.1 HOW TO SET UP AN IP SEC TUNNEL
Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol
(IP) communications by authenticating and encrypting each IP packet of a
communication session. IPSec also includes protocols for establishing mutual
authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session. We will use diagram below to
provide an IP Sec example configuration. Here we can see two Local Area
Networks connected via the Internet.
Site A - has a LAN IP Address of 192.168.1.x / 24 and a
WAN IP Address of 113.90.14.180
Site B - has a LAN IP Address of 192.168.2.x/24 and a
WAN IP Address of 119.123.210.251
6401 Rugged ADSL Router
6401 Rugged ADSL Router
Internet
WAN IP: 113.90.14.180
LAN IP: 192.168.1.1/24
WAN IP: 119.123.210.251
LAN IP: 192.168.2.1/24
Site A
Site B
LAN 1
192.168.1.x/24
LAN 2
192.168.2.x/24
IP Sec
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
6401 Rugged Router
IPSec Tunnel Mode Connections
Add, remove or enable/disable IPSec tunnel connections from this page
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Connection Name Remote Gateway Local Addresses Remote Address Remove
192.168.1.0 192.168.2.0
Add New Connection Remove
Case_Sec_1 119.123.210.251
Getting Started
To configure the IPSec menu option go to
the Advanced Setup and then select IPSec.
The following screen will be displayed
which shows any existing IP Sec Tunnels
already in use.
NB. This is option is only available at
Admin level.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.60
To create a new IP Sec Tunnel please click Add New Connection on the IP Sec page as shown below
On selecting ‘add new connection’ the following IPSec configuration page appears.
NB. This page shows the Advanced IKE settings
6401 Rugged Router
IP Sec Settings
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
IP Sec
Certificate
Multicast
Diagnostics
Management
Tunnel From Local IP address
Remote IP Sec Gateway Address (IPv4 address in dotted decimal)
0.0.0.0
IP Sec Connection Name New Connection
q
qTunnel Mode ESP
Subnet
q
IP Address for VPN 0.0.0.0
IP Subnet Mask 255.255.255.0
Tunnel Access from remote IP Addresses Subnet
IP Address for VPN 0.0.0.0
IP Subnet Mask 255.255.255.0
Perfect Forward Secrecy Disable q
Pre-Shared Key Key
Authentication Method Pre-Shared Key q
Key Exchange Method (Auto) IKE
q
Advanced Settings
Advanced IKE Settings
Main q
AES 256 q
SHA1 q
Select Diffie-Hellman Group for Key Exchange
1024 bit q
Phase 1 Mode
Encryption Algorithm
Integrity Algorithm
Main q
AES 256 q
SHA1 q
Select Diffie-Hellman Group for Key Exchange
1024 bit q
Phase 2 Mode
Encryption Algorithm
Integrity Algorithm
Key Life Time
3600
Seconds
3600
Seconds
Key Life Time

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.61
The following are explanations with examples of configuration settings for IP Sec Tunnels
IP Sec Configuration Example Site A
Remote IP Sec Gateway Address
Tunnel Access from local IP Address
IP Sub network mask – site A
Sub network mask for Site A
Tunnel Access from remote IP Address
IP Sub network mask – site B
Sub network mask for Site B
Pre-shared of certificate X509
Pre-shared Key (Maxlength:128)
Having saved / applied this configuration the Case Communications 6401 Router will return you to
the first IP sec page and display the Tunnel you have just configured, as shown below
Configuration of Site B
1. Log onto the management page of the remote Case Communications 6401 rugged ADSL Router
2. On the left menu of the management page, please click Advanced Setup and then click IPSec.
3. On the IPSec main page, please click Add New Connection.
4. On the IPSec configuration page, please do configuration as follows:

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.62
IP Sec Configuration Example Site B
Remote IP Sec Gateway Address
Tunnel Access from local IP Address
IP Sub network mask – site A
Sub network mask for Site B
Tunnel Access from remote IP Address
IP Sub network mask – site B
Sub network mask for Site A
Pre-shared of certificate X509
Pre-shared Key (Maxlength:128)
Having saved / applied this configuration the Case Communications 6401 Router will return you to
the first IP sec page and display the Tunnel you have just configured, as shown below

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.63
5.16.2 TESTING THE IP SEC TUNNEL
1. On the host in LAN1, press [Windows Logo] + [R] to open Run dialog. Input “cmd” and hit OK.
2. In the CLI window, type in “ping 192.168.2.x” (“192.168.2.x” can be IP address of any host
in LAN2). Then press [Enter].
If Ping proceeds successfully (gets replies from host in LAN2), the IPSec connection must be working
properly now.
. If one of the sites has been off line for a while, for example, if Site A has been disconnected, on Site
B you need to click Disable and then click Enable after Site A back on line in order to re-establish the
IPSec tunnel.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.64
5.16.3 ADVANCED SETTINGS
This is a dynamic page. It will change itself by showing and hiding options when different types or
connections are chosen. User can select automatic key exchange or manual key exchange, pre-shared
key authentication or certificate authentication, etc.
When automatic key exchange method is used, click “Show Advanced Settings” will show more
options towards the bottom of the screen. The advanced options are shown in the screen shot below.
This page allows manual configuration of the IP Sec parameters these are explained below.
Advanced IKE Settings
There are two Phases available and both can be edited to different settings if requires.
Mode: Recommendation
Select Main Mode to configure the standard negotiation parameters for IKE phase1.
Main - The Initiator send a proposal containing encryption methods used to and the Responder
selects one and uses it. All further negotiation between the Initiator and Responder are
encrypted. Select Main Mode to configure the standard negotiation parameters for IKE
phase1.
Aggressive – Quicker negotiation method, but the Initiator and Responder’s IDs are passed un-
encrypted. Select Aggressive Mode to configure IKE phase1 of the VPN Tunnel to carry out
negotiation in a shorter amount of time. (Not Recommended-Less Secure)
Encryption Algorithm: DES, 3DES, AES-128, AES-192 or AES-256 – This determines the
algorithm used for encryption. Default is 3DES,
Integrity Algorithm: MD5, SHA1 – encryption techniques used by IPSec to make sure that a
message has not been altered. Default is MD5, but SHA1 is used by Cisco.
Select Diffie-Hellman Group for Key Exchange: 768bit, 1024bit, 1536bit, 2048bit, 3072bit,
4096bit, 6144bit or 8192bit – a public key encryption method used by IPSec to establish a shared
secret key.
Key Life Time: Enter the number of seconds for the IPSec lifetime. It is the period of time before
establishing a new IPSec security association (SA) with the remote endpoint. Default value is 3600.
(1 Hour) As the tunnel is re-started users will be disconnected and re-connected.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.65
5.16.4 CONFIGURATION EXAMPLES
Example 1 – Connection to a PIX Firewall
Cisco default tunnel type
Remote IPSec gateway Address
IP address of the Cisco PIX WAN port
Tunnel Access from local IP
address
Use subnet to allow equipment connected to the
routers to talk over the IPSec tunnel
Local VPN IP address, use this as default gateway for
equipment
Tunnel Access from remote IP
address
Use subnet to allow equipment connected to a Cisco
PIX to talk over the IPSec tunnel
Type in the secure PSK that the Cisco also uses
send a proposal containing encryption methods used
DES, 3DES, AES-128, AES-192 or AES-256
MD5 (default) , SHA1 (SHA1 used by Cisco PIX)
Select Diffie-Hellman Group
768bit, 1024bit, 1536bit, 2048bit, 3072bit, 4096bit,
6144bit or 8192bit
determines when a new key is generated – see below.
Phase 2 Encryption Algorithm
Select Diffie-Hellman Group
Key Life Time (60 – 3,000,000)
60 seconds to nearly 35 days
Time before tunnel is broken and re-established using
a new key. NB. Every tunnel break removes the users.
Example 2 – Manual Key Exchange Method
Cisco default tunnel type
Remote IPSec gateway
Address
IP address of the Cisco PIX WAN port
Tunnel Access from local
IP address
Use subnet to allow equipment
connected to the routers to talk over the
IPSec tunnel
Local VPN IP address, use this as
default gateway for equipment
Tunnel Access from
remote IP address
Use subnet to allow equipment
connected to the Cisco to talk over the
IPSec tunnel
Options – DES, 3DES or AES
16 digit DES Key (48 for DES)
1234567890abcdef1234567890abcdef
32 digit MD5 key (40 for SHA1)

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.66
5.16.5 HOW IP SEC WORKS
IPSec involves many component technologies and encryption methods. Yet IPSec's operation
can be broken down into five main steps:
1. "Interesting traffic" initiates the IPSec process. Traffic is deemed interesting when the
IPSec security policy configured in the IPSec peers starts the IKE process.
2. IKE phase 1. IKE authenticates IPSec peers and negotiates IKE SAs during this phase,
setting up a secure channel for negotiating IPSec SAs in phase 2.
3. IKE phase 2. IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in
the peers.
4. Data transfer. Data is transferred between IPSec peers based on the IPSec parameters
and keys stored in the SA database.
5. IPSec tunnel termination. IPSec SAs terminate through deletion or by timing out.
TUNNEL MODE – (AH) AUTHENTICATION HEADER
Authentication Header guarantees connectionless integrity and data origin authentication of
IP packets. Further, it can optionally protect against replay attacks by using the sliding
window technique and discarding old packets.
In IPv4, the AH protects the IP payload and all header fields of an IP datagram except for
mutable fields (i.e. those that might be altered in transit), and also IP options such as the IP
Security Option (RFC-1108). Mutable (and therefore unauthenticated) IPv4 header fields are
DSCP/TOS, ECN, Flags, Fragment Offset, TTL and Header Checksum.
In IPv6, the AH protects the most of the IPv6 base header, AH itself, non-mutable extension
headers after the AH, and the IP payload. Protection for the IPv6 header excludes the mutable
fields: DSCP, ECN, Flow Label, and Hop Limit. AH operates directly on top of IP, using IP
protocol number 51.
TUNNEL MODE – (ESP) ENCAPSULATING SECURITY PAYLOAD
In IPSec Encapsulating Security Payload provides origin authenticity, integrity, and
confidentiality protection of packets. ESP also supports encryption-only and authenticationonly configurations, but using encryption without authentication is strongly discouraged
because it is insecure. Unlike Authentication Header (AH), ESP in transport mode does not
provide integrity and authentication for the entire IP packet. However, in Tunnel Mode,
where the entire original IP packet is encapsulated with a new packet header added, ESP
protection is afforded to the whole inner IP packet (including the inner header) while the outer
header (including any outer IPv4 options or IPv6 extension headers) remains unprotected.
ESP operates directly on top of IP, using IP protocol number 50.
REMOTE IP SEC GATEWAY ADDRESS
This is the WAN IP address of the remote device usually given by your ISP.
TUNNEL ACCESS FROM LOCAL IP
This is stipulates how device gain access into the IP Sec Tunnel. Selecting Subnet allows
devices on the remote devices subnet to access the LAN. The other option is to simply
configure one device (for example a PC) to have access to the tunnel.
IP ADDRESS FOR VPN
This is the local IP Address to access the IP Sec tunnel from the router at our local end.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.67
IP SUBNET MASK
The sub network mask for the Local Tunnel Entrance’s IP Address
KEY EXCHANGE METHOD (Set to Auto)
Auto Key ( IKE )
When you need to create and manage numerous tunnels, you need a method that does not
require you to configure every element manually. IPsec supports the automated generation
and negotiation of keys and security associations using the Internet Key Exchange (IKE)
protocol. The Case 6401 software supports AutoKey IKE automated tunnel negotiation.
Manual Key
With manual keys, administrators at both ends of a tunnel configure all the security parameters. This
is a viable technique for small, static networks where the distribution, maintenance, and tracking of
keys are not difficult. However, safely distributing manual-key configurations across great distances
poses security issues. Aside from passing the keys face-to-face, you cannot be completely sure that
the keys have not been compromised while in transit.
AUTHENTICATION METHOD
Peer authentication is the process of ensuring that an IPSec peer is who it claims to be. By
using peer authentication, IPSec can determine whether or not to communicate with another
computer before the communication begins.
Pre-shared Key
IPSec can use preshared keys for authentication. Preshared means that the parties agree on a
shared, secret key that is used for authentication in an IPSec policy. The use of pre-shared key
authentication is not recommended because it is a relatively weak authentication method.
Certificate (X509)
X.509 specifies, amongst other things, standard formats for public key certificates, certificate
revocation lists, attribute certificates, and a certification path validation algorithm..
An organization's trusted root certificates can be distributed to all employees so that they can
use the company PKI system. Browsers such as Internet Explorer, Netscape/Mozilla, Opera,
Safari and Chrome come with root certificates pre-installed, so SSL certificates from larger
vendors will work instantly; in effect the browsers' developers determine which CAs are
trusted third parties for the browsers' users
PERFECT FORWARD SECRECY
If perfect forward secrecy (PFS) is specified in the IPSec policy, a new Diffie-Hellman
exchange is performed with each quick mode, providing keying material that has greater
entropy (key material life) and thereby greater resistance to cryptographic attacks. Each
Diffie-Hellman exchange requires large exponentiations, thereby increasing CPU use and
exacting a performance cost
5.16.6 ADVANCED IKE SETTINGS
MAIN MODE OR AGGRESSIVE MODE
Main Mode
Main mode has three two-way exchanges between the initiator and the receiver.
First exchange: The algorithms and hashes used to secure the IKE communications are
agreed upon in matching IKE SAs (Security Association) in each peer.
Second exchange: Uses a Diffie-Hellman exchange to generate shared secret keying material
used to generate shared secret keys and to pass nonces—random numbers sent to the other
party and then signed and returned to prove their identity.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.68
Third exchange: Verifies the other side's identity. The identity value is the IPSec peer's IP
address in encrypted form. The main outcome of main mode is matching IKE SAs between
peers to provide a protected pipe for subsequent protected ISAKMP exchanges between the
IKE peers. The IKE SA specifies values for the IKE exchange: the authentication method
used, the encryption and hash algorithms, the Diffie-Hellman group used, the lifetime of the
IKE SA in seconds or kilobytes, and the shared secret key values for the encryption
algorithms. The IKE SA in each peer is bi-directional.
Aggressive Mode
In aggressive mode, fewer exchanges are made, and with fewer packets. On the first
exchange, almost everything is squeezed into the proposed IKE SA values: the DiffieHellman public key; a nonce that the other party signs; and an identity packet, which can be
used to verify identity via a third party. The receiver sends everything back that is needed to
complete the exchange. The only thing left is for the initiator to confirm the exchange. The
weakness of using the aggressive mode is that both sides have exchanged information before
there's a secure channel.
ENCRYPTION ALGORITHM
The Case Communications 6401 has the ability to select the encryption algorithm used within
IP Sec. The options are;
DES 3 DES
AES128 AES 192 AES 256
INTEGRITY ALGORITHM (SHA1 (default) or MD5)
The Authentication Header (AH) protocol provides a means to verify the authenticity
/integrity of the content and origin of a packet. You can authenticate the packet by the
checksum calculated through a Hash Message Authentication Code (HMAC) using a secret
key and either MD5 or SHA-1 hash functions.
Message Digest 5 (MD5)—An algorithm that produces a 128-bit hash (also called a digital
signature or message digest) from a message of arbitrary length and a 16-byte key. The resulting
hash is used, like a fingerprint of the input, to verify content and source authenticity and
integrity.
Secure Hash Algorithm-1 (SHA-1)—An algorithm that produces a 160-bit hash from a
message of arbitrary length and a 20-byte key. It is generally regarded as more secure than MD5
because of the larger hashes it produces. Because the computational processing is done in the
ASIC, the performance cost is negligible.
SELECT DIFFE_HELLMAN GROUP (RANGE 768 – 8192 DEFAULT 1024)
The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each
other to jointly establish a shared secret key over an insecure communications channel. This key can
then be used to encrypt subsequent communications using a symmetric key cipher.
A Diffie-Hellman (DH) exchange allows the participants to produce a shared secret value. The
strength of the technique is that it allows the participants to create the secret value over an unsecured
medium without passing the secret value through the wire.
KEY LIFE TIME
Define the length of time before an IKE SA automatically renegotiates in this field. It may range from
60 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to update the encryption
and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote
resources are temporarily disconnected

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.69
5.17 CERTIFICATES
5.17.1 INTRODUCTION
ADVANCED SETUP > CERTIFICATES
In cryptography, a certificate authority, or certification authority, (CA)
is an entity that issues digital certificates. The digital certificate certifies the
ownership of a public key by the named subject of the certificate. This
allows others (relying parties) to rely upon signatures or assertions made by
the private key that corresponds to the public key that is certified. In this
model of trust relationships, a CA is a trusted third party that is trusted by
both the subject (owner) of the certificate and the party relying upon the
certificate. CAs are characteristic of many public key infrastructure (PKI)
schemes.
Commercial CAs charge to issue certificates that will automatically be
trusted by most web browsers (Mozilla maintains a list of at least 36 trusted
root CAs, though multiple commercial CAs or their resellers may share the
same trusted root).
The number of web browsers and other devices and applications that trust a
particular certificate authority is referred to as ubiquity.
Aside from commercial CAs, some providers issue digital certificates to the
public at no cost. Large institutions or government entities may have their
own CAs.
The commercial CAs that issue the bulk of certificates that clients trust for email servers and public
HTTPS servers typically use a technique called "domain validation" to authenticate the recipient of
the certificate. Domain validation involves sending an email containing an authentication token or
link, to an email address that is known to be administratively responsible for the domain. This could
be the technical contact email address listed in the domain's WHOIS entry, or an administrative email
like postmaster@ or root@ the domain. The theory behind domain validation is that only the
legitimate owner of a domain would be able to read emails sent to these administrative addresses
5.17.2 CONFIGURING A CERTIFICATE OF AUTHORITY
Select Certificate > Local to select a local certificate.
This opens a page to configure a Local Certificate, with a Local certificate there are two options to
choose from;
1. Create a new Certificate Request
Certificates are a digital means of ensuring the identity of a machine or individual and providing keys
for encryption. These certificates also need to be certified by a root certification authority (CA).
2. Import a certificate
You can also import a certificate from another server instead of recreating the certificate on the
current server. Having selected Local certificate the following table will be displayed showing any
certificates already configured.
Add, View or Remove certificates from this page. Local certificates are used by peers to verify your
identity. Maximum 4 certificates can be stored.
IP Sec
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Certificate

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.70
Create Certificate Request Import Certificate
Create new certificate request
To generate a certificate signing request you need to include Common Name, Organization Name,
State/Province Name, and the 2-letter Country Code for the certificate.
Provide a name for this certificate
Provide an organisation name
Select from the drop down menu
Select Certificate > Trusted Certificate Authority
When selecting a trusted certificate the only option is to import a trusted certificate.
Add, View or Remove certificates from this page. CA certificates are used by you to verify peers'
certificates. A Maximum 4 certificates can be stored.
Import Certificate
Import CA certificate
Enter certificate name and paste certificate content.
Enter name for this certificate
-----BEGIN CERTIFICATE-----
<insert certificate here>
-----END CERTIFICATE-----

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.71
5.18 MULTICAST
5.18.1 INTRODUCTION
ADVANCED SETUP > MULTICAST
In computer networking, multicast is the delivery of a message or information to a
group of destination computers simultaneously in a single transmission from the
source creating copies automatically in other network elements, such as routers,
only when the topology of the network requires it.
Multicast is most commonly implemented in IP multicast, which is often
employed in Internet Protocol (IP) applications of streaming media and Internet
television. In IP multicast the implementation of the multicast concept occurs at
the IP routing level, where routers create optimal distribution paths for datagrams
sent to a multicast destination address.
IGMP is an integral part of the IP multicast specification. It is analogous to ICMP
for unicast connections. IGMP can be used for online streaming video and gaming,
and allows more efficient use of resources when supporting these types of
applications.
There are basically 5 types of messages in the IGMP that must be implemented in
IGMP for the IGMP v3 functional properly and be compatible with previous
versions:
0x11: membership query
0x22: version 3 membership report
0x12: version 1 membership report
0x16: version 2 membership report
0x17 version 2 leave group
IGMP operates between the client computer and a local multicast router. Switches featuring IGMP
snooping derive useful information by observing these IGMP transactions. Protocol Independent
Multicast (PIM) is then used between the local and remote multicast routers, to direct multicast traffic
from the multicast server to many multicast clients.
A network designed to deliver a multicast service using IGMP might use this basic architecture:
IP Sec
WAN Service
VPN
LAN
NAT
Security
Parental Control
Quality of Service
Routing
DNS
DSL
UPnp
DNS Proxy
Print Server
Layer 2 Interface
Advanced Setp
Interface Grouping
Certificate
Multicast

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 5 – ADVANCED CONFIGURATION Page 5.72
5.18.2 CONFIGURING IGMP
On entering the Multicast option the web page displays a table with default options.
There are three versions of IGMP, V1, V2, and V3
Query Interval
(In seconds)
The query interval is the amount of time in seconds between
IGMP General Query messages sent by the router (if the router is
the querier on this subnet). You can also click the scroll arrows to
select a new setting. The default query interval is 125 seconds
Query Response
Interval (In Seconds)
The query response interval is the maximum amount of time in
seconds that the IGMP router waits to receive a response to a
General Query message. The query response interval is the
Maximum Response Time field in the IGMP v2 Host
Membership Query message header. You can also click the scroll
arrows to select a new setting. The default query response
interval is 10 seconds and must be less than the query interval.
Last Member Query
Interval (Seconds)
The last member query interval is the amount of time in seconds
that the IGMP router waits to receive a response to a GroupSpecific Query message. The last member query interval is also
the amount of time in seconds between successive GroupSpecific Query messages.. The default last member query
interval is 1 second
The robustness variable is a way of indicating how susceptible
the subnet is to lost packets. IGMP can recover from robustness
variable minus 1 lost IGMP packets. You can also click the scroll
arrows to select a new setting. The robustness variable should be
set to a value of 2 or greater. The default robustness variable
value is 2
Maximum Multicast
Data Sources for
(IGMPv3) (1 -24)
This field specifies the number of source addresses present in the
Query. For General and Group-Specific Queries, this value is
zero. For Group-and-Source-Specific Queries, this value is nonzero, but limited by the network's MTU.
Maximum Multicast
Group Members
The Maximum number of members allowed in the multicast
group
Then the router will treat these groups as having single host
member. After the reception of a Leave message, the router
immediately removes the multicast forwarding state
LAN to LAN (Intra
LAN) Multicast
Enable

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 6 - DIAGNOSTICS Page 6.1
6. DIAGNOSTICS
6.1 INTRODUCTION
When you select diagnostics menu on the Case Communications 6401 Rugged ADSL Router, it
automatically tests the local Ethernet ports and your WAN settings and produced a series of results.
If the WAN is ‘down’ or disconnected then the only ports that will be tested are the Ethernet ports.
The page below shows the results of a ‘Diagnostics ‘test.
The tables over leaf explain these tests and their meanings.
Test the connection to your Local network
Test eth0 – eth 1, eth 2, eth3, eth 4
Indicates that the Ethernet interface from your computer is connected to the LAN port on your
Case Communications 6401 Rugged ADSL Router
Indicates that your Case Communications 6401 Rugged ADSL Router does not detect an
Ethernet Interface on your computer
Troubleshooting
Note. If this test fails, follow the trouble shooting procedures listed below and rerun diagnostics by
selecting ‘re-run diagnostic Tests’
1. If you’re not able to access the management page on the Case Communications 6401 Rugged
ADSL Router verify that the Ethernet cable from your computer or your hub is connected to
the LAN port on the router. Re-seat the cable by removing and replacing it to the same port.
2. Turn off your Case Communications 6401 Rugged ADSL Router wait 10 seconds and then
power it on.
3. With the router on, press the reset button on your Case Communications 6401 Rugged ADSL
Router for at least 5 seconds and release it. This resets the router to its default configuration.
Wait for the router to initialise, then close and restart your browser. Then it will be necessary
to re-configure the router.
6401 Rugged Router
pppoa_0_0_38 Diagnostics
Your modem is capable of testing your DSL connections. The individual tests are listed below. If a test
displays a fail status, click ‘rerun Diagnostic Tests’ at the bottom of this page to make sure the fail
status is consistent. If the test continues to fail click ‘Help’ and follow the trouble shooting procedures.
Test the connection to your local network
Test ADSL Synchronisation
Test ATM OAM F5 Segment Ping
Test ATM OAM F5 end to End Ping
PASS Help
PASS Help
PASS Help
Test your eth0 Connection
Test your eth1 Connection
Test your eth2 Connection
Test your eth3 Connection
Test your eth4 Connection
FAIL
PASS
FAIL
FAIL
PASS
Help
Help
Help
Help
Help
Test the connection to your DSL Service provider
Test the connection to your Internet Service Provider
Test with OAM F4Test
Test PPP server Session
Test Authentication with ISP
Test the assigned IP Address
Ping default gateway
Ping primary Domain Name Server
PASS
PASS
PASS
PASS
PASS
Help
Help
Help
Help
Help
Advanced Setp
Diagnostics
Management

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 6 - DIAGNOSTICS Page 6.2
Test the connection to your DSL Service provider
Test ADSL Synchronisation
Indicates that your 6401 Rugged ADSL Router has detected a DSL Signal from your DSL
provider
Indicates that your 6401 Rugged ADSL Router has not detected a DSL Signal from your
DSL provider
Troubleshooting
Note. This test will fail if the Test ADSL Synchronisation also fails, therefore test the ADSL
Synchronisation first.
1. Make Sure your phone line is connected to the 6401 Router
2. After turning on your 6401 Router, wait for at least 1 minute to establish a connection. Run
the diagnostic tests again, by selecting ‘rerun Diagnostic test.
3. Make sure there is no DSL Micro filter on the phone cord connecting the 6401 Router to your
phone socket
4. Make sure your using the correct phone cord with four copper wires visible in the plug.
5. If your DSL has been functioning properly for a long period of time and you suddenly
experience problems, there may be a problem with the DSL network. It maybe necessary to
wait for 30 minutes to a couple of hours and to then call your ISP.
6. Turn off the power to the 6401 Router, wait 10 seconds then turn it back on. Wait at least one
minute and retry.
Test OAM F5 segment Ping and OAM F5 End to End Ping
Indicates that your 6401 Rugged ADSL Router can communicate with your DSL
providers network
Indicates that your 6401 Rugged ADSL Router is unable communicate with your DSL
providers network. This test may have an effect on your Internet Connectivity. Sometimes
DSL providers may intentionally block this traffic. Therefore if the test fails but your still
able to access the Internet, there is no need to troubleshoot this issue further
Indicates no connection or not configured
Troubleshooting
Note. This test will fail if the Test ADSL Synchronisation also fails, therefore test the ADSL
Synchronisation first.
1. Turn off the 6401 rugged ADSL Router, wait 10 seconds and power back on.
2. With the modem on, press the reset button (on the rear of the unit) and wait for 5 seconds.
This resets the 6401 Rugged ADSL Router to its default settings. Wait for the 6401 to
completely start, then close and restart your web browser. Reconfigure the unit.
3. If this is the first time the router has been used, you may need to reconfigure your VPI / VCI
settings

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 6 - DIAGNOSTICS Page 6.3
Testing the connection to your Internet Service provider
Indicates that the PPP Server has established a valid PPP session with your 6401 Rugged
ADSL Router
Indicates that the PPP Server cannot establish a valid PPP session with your 6401 Rugged
ADSL Router
Indicates not connected or configured
Test authentication with ISP
Indicates that the username and password stored in your 6401 Rugged ADSL Router has
authenticated with your ISP’s network
Indicates that your 6401 Rugged ADSL Router was unable to verify your username and
password with your ISP’s network
Indicates not connected or configured
Indicates that your 6401 Rugged ADSL Router has received a valid IP Address from the
PPP Server
Indicates that your 6401 Rugged Router does not have a valid IP Address from the PPP
Server
Indicates not connected or configured
Indicates that your 6401 Rugged ADSL Router can communicate with the first entry
point to the network. This is usually your ISP’s Edge router
Indicates that your 6401 Rugged ADSL Router was unable to communicate with the first
entry point to the network. However if the connection is working do not brother trouble
shooting further as your ISP’s server may not respond to pings
Ping Primary Domain Name Server
Indicates that your 6401 Rugged ADSL Router can communicate with the primary
Domain Name Server (DNS)
Indicates that your 6401 Rugged ADSL Router is unable to communicate with the
primary Domain Name Server (DNS). This may not have an effect on your primary
connectivity. Therefore if this fails but your still able to access the Internet, there is no
need to troubleshoot the issue.
Differences between OAM F4 and OAM F5
OAM F4 cells operate at the VP level. They use the same VPI as the user cells, however, they
use two different reserved VCIs, as follows:
VCI=3 Segment OAM F4 cells.
VCI=4 End-end OAM F4 cells.
OAM F5 cells operate at the VC level. They use the same VPI and VCI as the user cells. To
distinguish between data and OAM cells, the PTI field is used as follows:
PTI=100 (4) Segment OAM F5 cells processed by the next segment.
PTI=101 (5) End-to-end OAM F5 cells which are only processed by end stations terminating
an ATM link.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 7 - MANAGEMENT Page 7.1
7. MANAGEMENT
7.1 SETTINGS
7.1.1 BACKUP
Management>Settings>backup
This option allows you to save your 6401 Routers settings to a file on your PC.
Once selected the following option appears
Backup Broadband Router configurations. You may save your router configurations to a
file on your PC
Select ‘Backup’ settings and the following message will appear
Do you want to open or save ‘backupsettings.conf from 192.168.1.1?
Back up files are generally titled ‘backupsettings.conf and have a type file CONF File
Open - Select open to look at the file, generally open this with Notepad. Having viewed the file it can
be saved on your PC.
Save – Select ‘Save’ to save the configuration file to your PC, this will go to your usual download
location, its possible to then view where your PC has stored this file.
Save As – This is more useful option as it allows you to determine where the configuration files can
be stored, in the same way ‘Save As’ can be used to save any PC file to a specific destination folder.
7.1.2 UPDATE
Management>Settings>Update
Update allows saved configurations to be loaded into the 6401 router. Select ‘Update’ and you will
see the following option. Select ‘Browse’ to find the ‘backup settings. Config file’
Update Broadband settings. You may update your router settings using your saved files.
Once the file has been selected, click ‘update’ settings and the router will upload the configuration
file. The message ‘Uploading is in progress. The broadband Router will reboot upon completion. This
process will take about 2 minutes.
7.1.3 RESTORE DEFAULT
This option restores the 6401 Rugged Router to its default condition. Do not use this if your
connected to the 6401 Router remotely as it will take the router offline and deny you remote access.

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 7 - MANAGEMENT Page 7.2
7.2 SYSTEM LOG
MANAGEMENT > SYSTEM LOG
Selecting ‘System Log’ allows you to ‘View the System Log’ and to ‘Configure The System Log.
Select system log to see the following page
Indicates whether the system is currently recording events. Users can ‘enable’ or
‘disable’ event logging. Having enabled the log, click on ‘Apply’
Allows the network manager to configure the event level and to filter out unwanted
events below this level. The events ranging from highest critical level ‘Emergency’
level will be recorded into the 6401 routers RAM.
When the system log buffer is full the 6401 will overwrite ‘old’ events with new
events. By default the log is set to ‘Debugging’ which is the lowest level of alarm.
The following levels can be set
Emergency – The 6401 is unstable
Alert – Action must be taken immediately
Critical – The 6401 is in a critical condition
Error – The 6401 has recorded an error
Warning – The 6401 has detected a significant event
Notice – the 6401 is issuing a notice.
Informational – The 6401 is providing general information
Debugging – this records all events
Allows the user to select the logged events and displays them on the ‘View System
Log’ events page. The level of events is as shown above. To display all events select
‘debugging’ to select only the more severe select ‘Emergency’
Allows you to specify whether events should be stored in the local memory or be sent
to a remote sys log server, or both simultaneously. If remote is selected, ‘View
System Log’ will not be able to display events sent to the sys log server.
When both or remote mode is selected, the 6401 will invite the network manager to
enter the system log servers IP address and UDP Port Number.
6401 Rugged Router
System log -- Configuration
If the log mode is enabled, the system will begin to log all the selected events. For the log event, all
events above or equal to the selected level will be logged. For the Display level all events above or
equal to the selected level will be displayed. If the selected mode is ‘Remote’ or ‘Both’ events will be
sent to the specified IP address and UDP port of the remote System Log Server.
If the selected mode is ‘Local’ or ‘Both’, events will be recorded in the routers local memory.
Select the desired values and click ‘Apply / Save’ to configure the system log options
Advanced Setp
Diagnostics
Management
Log: Disabled Enable
Log Level:
Display Level
Mode:
Server IP Address
Server UDP Port
Debugging q
Debugging q
Remote q
Apply / Save
Settings
System Log
0.0.0.0
514

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 7 - MANAGEMENT Page 7.3
7.3 SECURITY LOG
MANAGEMENT > SECURITY
The security Log dialog allows you to view the Security Log and configure the Security Log options
Click “View” to view the Security Log
Click “Reset” to clear and reset the Security Log
Right Click here to save the Security Log.
Click “View” to view the Security Log
Click “Reset” to clear and reset the Security Log
Right Click here to save the Security Log.
7.4 SNMP AGENT
MANAGEMENT > SNMP
This page allows configuration of the Routers SNMP parameters.
SNMP - Configuration
Simple Network Management Protocol (SNMP) allows a management application to retrieve statistics
and status from the SNMP agent in this device.
Select the desired values and click "Apply" to configure the SNMP options.
Enter IP Address of SNMP / Network Management System

Case Communications 6401 Rugged ADSL Router Manual – Rev 1.5
SECTION 7 - MANAGEMENT Page 7.4
7.5 TR 069 Client
MANAGEMENT > TR069 CLIENT
INTRODUCTION
TR-069 defines an application layer protocol for remote management of end-user devices. As a
bidirectional SOAP/HTTP-based protocol, it provides the communication between customer-premises
equipment (CPE) and Auto Configuration Servers (ACS). It includes both a safe auto configuration
and the control of other CPE management functions within an integrated framework. The TR-069
standard was developed for automatic configuration of these devices with Auto Configuration Servers
(ACS).
SOAP, Simple Object Access Protocol, is the communications protocol mandated by TR-069. The
specification further mandates that all communications between the CPE (client) and ACS (server) are
done via a persistent, bi-directional connection.
TR 069 Connection Request.
While the CPE always initiates a session, the ACS can stimulate it to do so, by issuing a “Connection
Request” A Connection Request is a simple HTTPGet made on the CPE at an arbitrary URL/port set
by the CPE which then tells the ACS what its CR URL is during the Inform
TR 069 Inform
The Inform RPC is a Remote Procedure Call made on the ACS by the CPE, which MUST be called
FIRST in every session It contains the reason(s) for the session (an Event) a list of parameters that are
required by the Data Model to be included (“Forced Inform”) Contains parameters that the ACS set to
be notified upon changes. The ACS completes the RPC by sending an InformResponse.
Select the desired values and click "Apply/Save" to configure the TR-069 client options. The
following screen will then appear.
6401 Rugged Router
TR 069 Client Configuration
WAN Management Protocol (TR-069) allows a Auto-Configuration Server (ACS) to perform autoconfiguration, provision, collection, and diagnostics to this device.
Select the desired values and click "Apply/Save" to configure the TR-069 client options
Advanced Setp
Diagnostics
Management
Inform Disabled Enable
Inform Interval:
ACS URL
ACS User Name
ACS Password
WAN Interface used by TR-069 Client
3000
Apply / Save
Settings
System Log
Security Log
TR 069 Client
q
Any_WAN
Display SOAP messages on serial console Disable Enable
Connection Request Authentication
Connection Request User Name:
Connection Request Password
Connection Request URL: