CONNECTION TECHNOLOGY SYSTEMS VRGIII-31412-N-RF, VRGIII-31412SFP-N-DR, VRGIII-31412-CW-N-DR-RF, VRGIII-31412TP-N, VRGIII-31412-N-DR User Manual

...
1
VRGIII-31412SFP-N
4 ports 10/100/1000Mbps RJ-45; 2 ports VoIP FXS, built-in IEEE802.11n WiFi and 1 port 1000Mbps
SFP slot uplink VoIP Residential Gateway
VRGIII-31412SFP-N-DR
100/1000Mbps SFP slot uplink VoIP Residential Gateway
VRGIII-31412-N-DR
100/1000Mbps fiber optics uplink VoIP Residential Gateway
VRGIII-31412-CW-N-DR
4 ports 10/100/1000Mbps RJ-45; 2 ports VoIP FXS, built-in IEEE802.11n WiFi and 1 uplink port
combo (10/100/1000Mbps RJ-45 and 100/1000Mbps SFP slot) VoIP Residential Gateway
VRGIII-31412-N-DR-RF
100/1000Mbps fiber optics uplink VoIP Residential Gateway with CATV RF Receiver
VRGIII-31412-N-RF
4 ports 10/100/1000Mbps RJ-45; 2 ports VoIP FXS, built-in IEEE802.11n WiFi and 1 port 1000Mbps
fiber optics uplink VoIP Residential Gateway with CATV RF Receiver
VRGIII-31412-CW-N-DR-RF
4 ports 10/100/1000Mbps RJ-45; 2 ports VoIP FXS, built-in IEEE802.11n WiFi and 1 uplink port combo
(10/100/1000Mbps RJ-45 and 100/1000Mbps SFP slot) VoIP Residential Gateway with CATV RF Receiver
VRGIII-31412TP-N
10/100/1000Mbps RJ-45 uplink VoIP Residential Gateway
Network Management User’s Manual Version 1.5
2
Trademarks
CTS is a registered trademark of Connection Technology Systems Inc.. Contents are subject to revision without prior notice. All other trademarks remain the property of their respective owners.
Copyright Statement
Copyright Connection Technology Systems Inc. This publication may not be reproduced as a whole or in part, in any way whatsoever unless prior consent has been obtained from Company.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class-A digital device, pursuant to Part 15 of the FCC Rules. These limitations are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy. If this equipment is not installed properly and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into a different outlet from that the receiver is connected. Consult your local distributors or an experienced radio/TV technician for help. Shielded interface cables must be used in order to comply with emission limits.
Changes or modifications to the equipment, which are not approved by the party responsible for compliance, could affect the user’s authority to operate the equipment.
Copyright © 2013 All Rights Reserved. Company has an on-going policy of upgrading its products and it may be possible that information in this
document is not up-to-date. Please check with your local distributors for the latest information. No part of this document can be copied or reproduced in any form without written consent from the company.
Trademarks: All trade names and trademarks are the properties of their respective companies.
3
Revision History
Version
Date
Description
1.4
20150226
Revise WLAN link speed of channel width in section 2.5.1
1.5
20150904
Revise Photo
4
Table of Contents
1. INTRODUCTION .................................................................................................................................. 6
1.1 Front, Rear and Top-Front Panel ............................................................................................................................................... 7
1.2 Management Options ............................................................................................................................................................ 10
1.2 Management Options ............................................................................................................................................................ 10
1.3 Interface Descriptions ............................................................................................................................................................. 10
1.4 Connecting the Residential Gateway ...................................................................................................................................... 11
1.5 RF over Fiber (W ith RF Receiver only) .................................................................................................................................... 12
1.6 LED Descriptions ..................................................................................................................................................................... 13
2. WEB MANAGEMENT ......................................................................................................................... 14
2.1 The Concept of IP address ...................................................................................................................................................... 14
2.2 Start Configuring .................................................................................................................................................................... 14
2.3 Introduction to Sub-Menus ..................................................................................................................................................... 16
2.4 Setup ...................................................................................................................................................................................... 18
2.4.1 System Information ........................................................................................................................................................ 19
2.4.2 Basic Setup ..................................................................................................................................................................... 21
2.4.3 DDNS............................................................................................................................................................................... 31
2.4.4 Network Setup ................................................................................................................................................................ 33
2.4.5 Routing Setup ................................................................................................................................................................. 36
2.5 WiFi ........................................................................................................................................................................................ 38
2.5.1 Wireless Setup ................................................................................................................................................................ 38
2.5.2 Wireless Security ............................................................................................................................................................ 43
2.5.3 MAC Access Filter ........................................................................................................................................................... 48
2.6 Security ................................................................................................................................................................................... 50
2.6.1 Firewall ........................................................................................................................................................................... 50
2.6.2 Packet Filter .................................................................................................................................................................... 51
2.6.3 URL Filter ........................................................................................................................................................................ 55
2.6.4 VPN Passthrough ............................................................................................................................................................ 56
2.6.5 UPnP ............................................................................................................................................................................... 57
2.6.6 DDoS ............................................................................................................................................................................... 58
2.7 Application ............................................................................................................................................................................. 62
2.7.1 Port Forwarding .............................................................................................................................................................. 62
2.7.2 Port Triggering ................................................................................................................................................................ 64
2.7.3 DMZ ................................................................................................................................................................................ 66
2.8 QoS ......................................................................................................................................................................................... 68
2.8.1 QoS Priority .................................................................................................................................................................... 68
2.8.2 QoS Ratelimiter .............................................................................................................................................................. 73
2.9 SIP ........................................................................................................................................................................................... 75
2.9.1 Basic Settings .................................................................................................................................................................. 75
2.9.2 Account Settings ............................................................................................................................................................. 77
2.9.3 Server Settings ................................................................................................................................................................ 78
2.10 Voice ..................................................................................................................................................................................... 80
2.10.1 Voice Settings ............................................................................................................................................................... 81
2.10.2 Call Service ................................................................................................................................................................... 83
2.10.3 FAX Port Settings .......................................................................................................................................................... 85
2.10.4 FAX Settings .................................................................................................................................................................. 87
2.10.5 General Dialing Settings ............................................................................................................................................... 88
2.10.6 Phone Book .................................................................................................................................................................. 90
2.10.7 Dialing Plan ................................................................................................................................................................... 91
5
2.11 IPTV ...................................................................................................................................................................................... 93
2.11.1 IGMP Control ................................................................................................................................................................ 93
2.12 CATV(available for RF module only) ..................................................................................................................................... 95
2.12.1 CATV Control ................................................................................................................................................................. 95
2.13 Management ........................................................................................................................................................................ 95
2.13.1 Auto Provision (TR069/DHCP) ...................................................................................................................................... 95
2.13.2 SNMP ............................................................................................................................................................................ 96
2.14 Administration ...................................................................................................................................................................... 98
2.14.1 Device Access ............................................................................................................................................................... 98
2.14.2 Interface Mgmt. ............................................................................................................................................................ 99
2.14.3 Time............................................................................................................................................................................ 101
2.14.4 Syslog .......................................................................................................................................................................... 102
2.14.5 Diagnostics ................................................................................................................................................................. 103
2.14.6 User Privilege .............................................................................................................................................................. 105
2.14.7 Backup/Restore .......................................................................................................................................................... 106
2.14.8 Factory Default ........................................................................................................................................................... 107
2.14.9 Firmware Upgrade ...................................................................................................................................................... 108
2.14.10 Save & Restore .......................................................................................................................................................... 109
2.15 Status.................................................................................................................................................................................. 110
2.15.1 WAN ............................................................................................................................................................................ 110
2.15.2 LAN ............................................................................................................................................................................. 111
2.15.3 WLAN .......................................................................................................................................................................... 112
2.15.4 Routing Table .............................................................................................................................................................. 113
2.15.5 Line Status .................................................................................................................................................................. 114
2.15.6 Port Status .................................................................................................................................................................. 114
3. SNMP NETWORK MANAGEMENT .................................................................................................... 116
APPENDIX A: Set Up DHCP Auto-Provisioning ...................................................................................... 117
APPENDIX B: DHCP Text Sample .......................................................................................................... 122
6
1. INTRODUCTION
Thank you for purchasing the WLAN Residential Gateway which is designed to aim at FTTX applications. This WLAN Residential Gateway provides four TP ports for LAN applications, one fiber optic or TP port for WAN, two sets of FXS telephony ports and built-in IEEE 802.11b/g/n wireless LAN (To use CATV application, please purchase the WLAN Residential Gateway with RF module installed). The combination of wireless and VoIP function provides users not only more flexible ways to enjoy bandwidth-intensive services but also more secure internetwork connections by implementing packet or URL filtering policies.
The wireless function of this Gateway conforms to IEEE 802.11n standards that can provide speed rate up to 30Mbps or 300Mbps when used with other 802.11n wireless products (the speed rate varies depends on the model that your purchase). To enhance wireless connections to reach further, the antennas, dispersing the same amount of power in all directions, can be used to receive and deliver stable and high-gain transmissions. The WLAN Residential Gateway also supports WPA/WPA2/WPA-Mixed authentication methods and 64/128-bit data encryption to implement strict security protection so as to prevent your wireless networks from unauthorized uses or possible malicious attacks. Other security mechanisms provided that can protect your network including the uses of disabling SSID broadcast function, MAC filtering, URL filtering, DDoS protection.
For VoIP applications, the internationally recognized standards, SIP (Session Initiation Protocol), have been employed to manage multimedia communication sessions so that users can use traditional analog telephones to make telephone calls to IP telephones over the Internet. Calls received from IP telephones work exactly the same as you would expect from the traditional telephone service. Other WLAN Residential Gateway’s features are: Voice Activity Detection (VAD) / Silence Suppression which reduces the bandwidth that a call uses by not transmitting when you are not speaking; Comfort Noise Generation that is the background noise the device generates to fill moments of silence when the other device in a call stops transmitting because the other party is not speaking (as total silence could easily be mistaken for a lost connection); Echo Cancellation which is WLAN Residential Gateway’s supporting G.168, an ITU-T standard for eliminating the echo caused by the sound of your voice reverberating in the telephone receiver while you talk.
The WLAN Residential Gateway is mainly dedicated to the FTTX broadband service providers who look for a way of delivering multiple IP services to the home users. The fiber optic port supports connection distance from 2KM to 20KM or further than 100KM by using multi-mode optical fiber, single-mode optical fiber (SMF), or bi-direction SMF. The transmission distance varies depending on the fiber transceiver that your purchase. For detailed information about fiber transceiver, please refer to Fiber Transceiver Information PDF in Documentation CD-ROM. To easily manage and maintain the device, advanced network settings are configurable via Web­based Management such as Firmware upgrade. The featured NAT and DHCP server functions also allow you to use a hub or switch to establish a private network depending on your personal needs that allows multiple computers to share a single Internet connection.
7
1.1 Front, Rear and Top-Front Panel
Figure 1-1~1-13 show the front, back and top views of the 802.11n device:
Figure 1-1. Front Panel of VRGIII-31412SFP-N and VRGIII-31412-N-DR Figure 1-2. Back Panel of VRGIII-31412SFP-N and VRGIII-31412-N-DR
Figure 1-3. Front Panel of VRGIII-31412-N-DR-RF Figure 1-4. Back Panel of VRGIII-31412-N-DR-RF
Figure 1-5. Front Panel of VRGIII-31412-CW-N-DR Figure 1-6. Back Panel of VRGIII-31412-CW-N-DR
Telephony Port 1-2 (RJ-11 Connection)
Smart Lighting Control
LAN Port 1-4
(RJ-45 Connection)
Ethernet Optical
WAN Port
CATV RF
CATV RF Input
Copper WAN Port
(RJ-45 Connector)
8
Figure 1-7. Front Panel of VRGIII-31412-CW-N-RF Figure 1-8. Back Panel of VRGIII-31412-CW-N-RF
Figure 1-9. Front Panel of VRGIII-31412TP-N Figure 1-10. Back Panel of VRGIII-31412TP-N
Figure 1-11. Left Panel Figure 1-12. Right Panel
WPS Button
Reset Button
Power Jack Connector
9
Figure 1-13. Top Panel
LED
10
1.2 Management Options
Management options available in this Residential Gateway are listed below:
Web Management
Web Management is of course done over the network. Once the Residential Gateway is on the network, you can login and monitor the status remotely or locally by a web browser. Local console-type Web management, especially for the first time use of Residential Gateway to set up the needed IP, can also be done through any of the four 10/100/1000Base-T 8-pin RJ-45 ports located at the front panel of the Residential Gateway. Direct RJ45 LAN cable connection between a PC and Residential Gateway is required for this.
SNMP Management (See 3. SNMP NETWORK MANAGEMENT for detailed descriptions.)
1.3 Interface Descriptions
Before you start to configure your device, it is very important that the proper cables with the correct pin arrangement are used when connecting the Residential Gateway to other devices such as switch, hub, workstation, etc. The following describes correct cables for each interface type.
WAN 100/1000Base-X or 1000Base-X Fiber Port (With VRGIII-31412-N-DR and VRGIII-
31412-N-DR-RF)
1x100/1000Base-X or 1000Base-X Fiber port is located within the back panel of the Residential Gateway. This port is primarily used for up-link connection and will operate at 100M or 1000M Full Duplex mode. Duplex SC or WDM Simplex SC types of connectors are available. Use proper multimode or single-mode optical fiber to connect this port with other Fast Ethernet Fiber port.
WAN 100/1000Base-X or 1000Base-X SFP Port (With VRGIII-31412SFP-N, VRGIII-
31412SFP-N-DR, VRGIII-31412-CW-N-DR and VRGIII-31412-CW-N-DR-RF)
1x1000Base-X or 100/1000Base-X SFP Port is located within the back panel of the Residential Gateway. The small form-factor pluggable (SFP) is a compact optical transceiver used in optical data communication applications. It interfaces a network device mother board (for a switch, router or similar device) to a fiber optic or unshielded twisted pair networking cable. It is a popular industry format supported by several fiber optic component vendors.
SFP transceivers are available with a variety of different transmitter and receiver types, allowing users to select the appropriate transceiver for each link to provide the required optical reach over the available optical fiber type. SFP transceivers are also available with a "copper" cable interface, allowing a host device designed primarily for optical fiber communications to also communicate over unshielded twisted pair networking cable.
SFP slot for 3.3V mini GBIC module supports hot swappable SFP fiber transceiver. Before connecting the other switches, workstation or Media Converter, make sure both side of the SFP transfer are with the same media type, for example, 1000Base-SX to 1000Base-SX, 1000Bas-LX to 1000Base-LX, and check the fiber-optic cable type matches the SFP transfer model. To connect to 1000Base-SX transceiver, use the multi-mode fiber cable
11
with male duplex LC connector type for one side. To connect to 1000Base-LX transfer, use the single-mode fiber cable with male duplex LC connector type for one side.
LAN 10/100/1000Base-TX RJ-45 Ports
4x10/100/1000Base-T 8-pin RJ-45 ports are located at the front panel of the Residential Gateway. These RJ-45 ports allow user to connect their traditional copper based Ethernet/Fast Ethernet devices into network. All these ports support auto-negotiation and MDI/MDIX auto-crossover, i.e. either crossover or straight through CAT-5 cable may be used.
Since there is no separated RJ-45 Management Console port for this Residential Gateway, however any of these four 10/100/1000Base-T RJ-45 ports can be used temporarily as the RJ-45 Management Console Port for local management. This temporary RJ-45 Management Console Port of the Residential Gateway and a RJ-45 LAN cable for PC connections are required to connect the Residential Gateway and a PC. Through these, the user then can configure and check the Residential Gateway even when the network is down.
FXS RJ-11 Telephony ports
There are two FXS RJ-11 telephony ports at the front panel of the Residential Gateway. The Phone ports are for users to connect their traditional telephones.
1.4 Connecting the Residential Gateway
Before starting to configure the Residential Gateway, you have to connect your devices correctly. When you connect your device correctly, the corresponding LEDs will light up.
Connect the power adaptor to the power port of the Residential Gateway on the back, and
the other end into a wall outlet. The Power LED should be ON.
The system starts to initiate. After completing the system test, the Status LED will light up. CAUTION: For the first-time configuration, connect one end of an Ethernet patch cable (RJ-
45) to any ports on the front panel and connect the other end of the patch cable (RJ-45) to the Ethernet port on Administrator computer. LAN LED for the corresponding port will light up.
Connect one end of an Ethernet patch cable (RJ-45) to other LAN ports of the Router and
connect the other end of the patch cable (RJ-45) to the Ethernet port on other computers or Ethernet devices to form a small area network. The LAN LED for that port on the front panel will light up.
Connect the Fiber cable provided from your service provider to the WAN Fiber port on the
back panel, the WAN LED will light up and blinking if data are transmitting.
12
1.5 RF over Fiber (With RF Receiver only)
Fiber Optic RF Receiver with SC/APC connector is located in the middle of the back panel of the WLAN Residential Gateway. This port is primarily used for CATV RF link connection and will operate at output level greater than 24dBmV@-5dBm of optical input with 77 NTSC or 60 PAL channels of loading. Use proper RF optical fiber to connect this port with other fiber port at the CATV head end. Also use TV Coaxial Cable to connect the TV with the TV coaxial cable female connector located in the right corner of the front panel of the WLAN Residential Gateway.
13
1.6 LED Descriptions
LED
Color
Operation
Power
Off
Power is off.
Green
Power is functioning normally.
STATUS
Green
System is ready.
Orange
System is not ready.
Orange blinking Insert a pin or paper clip to press the Reset button for 3
seconds to restart the device. The STATUS LED will blink in orange once.
Insert a pin or paper clip to press the Reset button for 10 seconds to reset the device to factory defaults. The STATUS LED will blink in orange three times.
WAN
Off
The port link is off or it is up in 10Mbps.
Green
The link is up and works at 100Mbps.
Orange
The link is up and works at 1000Mbps.
Blinking
The traffic is present.
LAN 1
Off
The port link is off or it is up in 10Mbps.
Green
The link is up and works at 100Mbps.
Orange
The link is up and works at 1000Mbps.
Blinking
The traffic is present.
LAN 2
Off
The port link is off or it is up in 10Mbps.
Green
The link is up and works at 100Mbps.
Orange
The link is up and works at 1000Mbps.
Blinking
The traffic is present.
LAN 3
Off
The port link is off or it is up in 10Mbps.
Green
The link is up and works at 100Mbps.
Orange
The link is up and works at 1000Mbps.
Blinking
The traffic is present.
LAN 4
Off
The port link is off or it is up in 10Mbps.
Green
The link is up and works at 100Mbps.
Orange
The link is up and works at 1000Mbps.
Blinking
The traffic is present.
Wi-Fi
Off
WLAN link is off.
Green
WLAN link is up
Green blinking
The traffic is present.
WPS
Off
WLAN link is off.
Green
WPS is searching for the WPS client.
TEL 1
Off
Telephony Port 1 link is off.
Green
The telephone of Telephony Port 1 is off the hook.
Green Blinking
The telephone of Telephony Port 1 rings.
TEL 2
Off
Telephony Port 2 link is off.
Green
The telephone of Telephony Port 2 is off the hook.
Green Blinking
The telephone of Telephony Port 2 rings.
14
2. WEB MANAGEMENT
This chapter describes how to manage the Residential Gateway through a Web browser. The IP address concepts and gaining access to the Residential Gateway will be introduced first, and then followed by web-based management instructions.
2.1 The Concept of IP address
IP addresses have the format n.n.n.n, for example 168.168.8.100. IP addresses are made up of two parts:
The first part (168.168 in the example) refers as network address identifies the network on
which the device resides. Network addresses are assigned by three allocation organizations. Depending on your location, each allocation organization assigns a globally unique network number to each network that wishes to connect to the Internet.
The second part (8.100 in the example) identifies the device within the network. Assigning
unique device numbers is your responsibility. If you are unsure of the IP addresses allocated to you, consult the allocation organization from which your IP addresses were obtained.
Remember that no two devices on a network can have the same address. If you connect to the outside world, you must change all the arbitrary IP addresses to comply with those you have been allocated by the allocation organization. If you do not do this, your outside communications will not operate.
A subnet mask is a filtering system for IP addresses. It allows you to further subdivide your network. You must use the proper subnet mask for proper operation of a network with subnets defined.
2.2 Start Configuring
The Residential Gateway can be managed via a Web browser. However, before doing so, you must assign a unique IP address to the Residential Gateway. Use a RJ-45 LAN cable and any of the four 10/100/1000Base-T RJ-45 ports of Residential Gateway as the temporary RJ-45 Management console port to login to the Residential Gateway and set up the IP address for the first time. (The default IP is “192.168.0.1”. You can change the Residential Gateways IP to the needed one in the WAN Settings under Network Configuration menu.)
Follow these steps to manage the Residential Gateway through a Web browser:
Use one of the four 10/100/1000Base-T RJ-45 ports as the temporary RJ-45 Management
console port to set up the assigned IP parameters of the Residential Gateway.
1. IP address
2. Subnet Mask
3. Default gateway IP address, if required
Run a Web browser and specify the Residential Gateways IP address to reach it. (The
default IP of Residential Gateway is “192.168.0.1” before any changes.)
15
Login to the Residential Gateway to reach the Main Menu.
Once you gain the access, a Login window appears like the following:
Enter the authorized user name and password then click Login. The default user name is admin and without a password (leave this field blank).
After a successful login, the following Residential Gateway Main Menu screen appears.
NOTE: By default, the remote access to the Residential Gateway is disabled. If you would like to login the Residential Gateway from WAN port or ports assigned in Bridge Mode, you must create a management interface in Basic Setup under the Setup Menu Bar and enable it. Then, specify the IP address (if necessary) of the management computer and specify Http port number for remote login in Device Access under the Administration Menu Bar. Once completed, you can type in the IP address of the WAN management interface and Http port number in URL field of your web browser like this 192.168.1.198:8888 to access to web management.
16
2.3 Introduction to Sub-Menus
If you successfully login to the web management, the first page you will see is as follows:
Main Menu Bar At the top of the screen page is the Main Menu bar. It contains the following
main tabs:
Setup To check or configure basic settings of the Residential Gateway, such as WAN
and LAN Settings, DHCP, NAT, VLAN, DDNS, Static Routing etc.
WiFi To configure the WiFi settings of the Residential Gateway.
Security To configure the security policies of the Residential Gateway, such as Firewall,
Packet Filter, URL Filter, VPN Passthrough, UPnP, SIP ALG and DDoS.
Applications To configure the port forwarding function, port triggering function and
DMZ.
17
Qos To configure the QoS settings and the rate limit of the Residential Gateway
SIP Settings To configure SIP settings, such as SIP Basic/Advanced/Account Settings.
VoIP Settings To configure VoIP settings, such as Voice, Phone Book, Call server,
FAX and FXS port settings, etc.
TV To configure the IGMP settings and to enable or disable CATV module. And this tab
is only available for the WLAN Residential Gateway with RF module installed.
Management To enable or disable Auto-provision, TR069 and SNMP for management.
Administration To configure Device Access, Interface Management, system
Date/Time setting, Syslog, Ping test, User Privilege, Bakc/Restore, Factory Default and Firmware Update.
Status To show the current status of each interface and the basic information of the
Residential Gateway.
And note that when a main tab appears in the dark blue background, it is currently selected.
Sub Menu Bar Below the Main Menu Bar is the Sub Menu Bar. The Sub Menu Bar includes the
items which are associated to the selected main tab.
The area below the Sub Menu Bar includes two sub parts.
Configuration Area The part in the right side of the screen page is the configuration area.
Select a tab in the Sub Menu Bar for a feature. Then, you can find the parameters which you can configure for this feature in the configuration area.
Section Panel This is a panel in the left side of the configuration area which displays the
sections available in the configuration area. The sections are the outline for the parameters of this screen page.
18
Below is the brief description for each sub-menu. For detailed function explanations, please refer to the individual section.
2.4 Setup
Select Setup from the Main Menu bar. Then you can see the sub-items – System Information, Basic Setup, DDNS, Network Setup and Routing Setup – on the sub menu bar.
19
2.4.1 System Information
Select System Information from the Setup sub menu bar. Then, System Information screen page appears as follows:
This page displays basic information of the Residential Gateway and information about the SFP transceiver plugged in the WAN port. And for more details, please refer to the description of the individual section below.
System This is a view-only section which displays basic system information of the Residential
Gateway. Below is a description of each item in this section.
Company Name This is the name of the manufacturer.
System Name This is the model name of the Residential Gateway.
System Object ID This is the predefined system OID of the Residential Gateway.
20
System S/N This is the serial number of the Residential Gateway.
Firmware Version This is the current firmware version of the Residential Gateway.
Host Name This is the host name of the Residential Gateway.
Date & Time This is the time of the internal clock of the Residential Gateway.
Up Time This is the time period since the Residential Gateway has been powered on
Fiber Information This is a view-only section which displays information about the fiber
transceiver in the fiber WAN port. Below is a description for each item in this section.
Connector This is the type of the fiber connector in the fiber WAN port.
Vendor This is the name of the manufacturer.
Vendor SN This is serial number of the SFP transceiver.
Product Name This is the model name of the fiber transceiver.
Speed This is the maximal link speed which the fiber transceiver supports.
Wave Length This is the the receiving and transmitting wave length of this fiber..
Distance This is the maximal transmission distance which the fiber transceiver
supports.
21
2.4.2 Basic Setup
This page enables the network administrator to configure the general settings of the Residential Gateway. Select Setup > Basic Setup to access this page. And it will appear as follows:
And for details on the settings of this page, please refer to the description of the individual section below.
System Operation Mode Select one of the following three system operation modes for the
Residential Gateway in the pull-down menu:
Bridge Mode When the Residential Gateway is in this mode, all devices connected to the
Residential Gateway from its LAN ports or WLAN are in the public network.
22
NAT Mode When the Residential Gateway is in this mode, all devices connected to the
Residential Gateway from its LAN ports and WLAN are in the private network.
Hybrid Mode When the Residential Gateway is in this mode, some devices connected to
the Residential Gateway from its LAN ports and WLAN are in the public network and the others are in the private network.
Interface Selection This section shows which LAN ports are on the private network (inside
NAT) and which LAN ports are on the public network (outside NAT). When a LAN port is allocated to the private network, it is selected in its checkbox. And a device which is connected to this port will be a host on the private network. When a LAN port is allocated to the public network, it is unselected in the checkbox. A device which is connected to this port will be a host on the public network.
In the Hybrid Mode, you can change the allocation of LAN ports. Select a LAN port in the
checkbox to allocate it to the private network. Or unselect it in the checkbox to allocate it to the public network.
In the Bridge Mode, all LAN ports of the Residential Gateway will be unselected. And you
can not change the allocation of any port manually.
In the NAT Mode, all LAN ports of the Residential Gateway will be selected. And you can
not change the allocation of any port manually.
Host Settings Specify the host name and the domain name of the Residential Gateway in the
text boxes. They should be provided by your Internet service provider. However, they are usually optional and it should be fine to leave the text boxes blank.
Interface List This section shows the basic information of the WAN interfaces of the Residential
Gateway. Below is a description of each column in the list.
ID This is the index of this WAN interface in this list.
23
Status It is Enabled if the WAN interface is activated. And it is Disabled if the WAN interface is deactivated.
WAN INFO. This is the WAN information type of this interface. And the available the WAN information types include Data, Management, FXS1, FXS2, Routing, and Alias
Interface.
Type This is the Internet connection type of this WAN interface.
VLAN This is the VLAN ID which this WAN interface will add to the egress untagged
packets.
P-Bit This is the 802.1p priority value which this WAN interface will add to the egress untagged packet together with its VLAN ID.
IP This is the IP address of this WAN interface.
Netmask This is the subnet mask of this WAN interface.
Action Click edit to change the settings of an interface in the following section. Or
click delete if you want to remove this entry from the interface list.
To create a new interface, click Add new network interface below the list and edit the settings of the new interface in the following section.
Interface 1 Settings, Edit Interface N & Add New Interface N This section enables
you to edit the settings of a new WAN interface or a WAN interface in the interface list above. And below is the description of configuration parameters in this section.
WAN Enable Enable or disable this WAN interface.
WAN Information Select a WAN information type from the pull-down menu. You can
refer to the following table for a description for the types of the WAN interfaces.
24
Management The Management Interface enables the network administrator to
remotely log in the Residential Gateway via the Management Interfaces IP address if the source IP address is allowed in the Device Access page of the UI. And if the Management Interface is not created on the Residential Gateway, the network administrator can remotely log in the Residential Gateway via the data Interfaces IP address. The difference between the two scenarios is illustrated in the following diagram.
Data The data interface is the default WAN Interface of the Residential Gateway. It is
open to remote management from the IP specified in the Device Access web page when the management interface is not created on the Residential Gateway.
FXS1 The FXS1 interface is a WAN interface exclusive for the telephone on
Telephony Port 1.
FXS2 The FXS2 interface is a WAN interface exclusive for the telephone on
Telephony Port 2.
25
Routing The routing interface is a WAN interface which does not belong to the NAT.
When a host on the private network has the routing interface as the default gateway, it can send packets through the routing interface to the Internet directly. And the packets will keep the original IP address after they pass through the Residential Gateway. The diagram below illustrates the two different paths for the packet to pass through the Residential Gateway via the NAT and the routing interface.
Alias Interface An Alias Interface is an interface which allows the network
administrator to create a DMZ. For more details about the interoperability of the Alias Interface and the DMZ, please refer to the section 2.7.3 in this document.
WAN Type Select an Internet connection type for the WAN interface.
26
VLAN Specify a VLAN ID for the WAN interface in the text box. And the WAN interface will add this VLAN ID to the egress untagged packets. ( This parameter is only
available when the WAN information is Data, Management, FXS1, or FXS2 . )
P-Bit Select a P-Bit value which will be added to the egress untagged packets along with the VLAN ID by this WAN interface. ( This parameter is only available when the
WAN information is Data, Management, FXS1, or FXS2. )
Static IP
If you select Static IP as the WAN type of this interface, please specify the values for the following parameters.
Internet IP Address Specify an IP address in the text box to assign the interface an IP address.
Subnet Mask Select a subnet mask for this interface from the pull-down menu.
Gateway Specify the IP address of a gateway or a router which can deliver
the packets which leave the Residential Gateway from this interface to the other network.
27
Static MTU Specify the maximal size of Ethernet packets which the Residential Gateway will transmit. MTU stands for “Maximum Transmission Unit.”
DNS1 Specify the IP address of the primary DNS server of the WAN interface. ( This parameter is only available for the data interface. )
DNS2 Specify the IP address of the secondary DNS server of the WAN interface. ( This field is only available for the data interface. )
DNS3 Specify the IP address of the tertiary DNS server of the WAN interface. ( This field is only available for the data interface. )
DHCP Client
If you select DHCP Client as the WAN type of this interface, please specify the values for the following parameters.
DHCP MTU Specify the DHCP MTU for optimal performance.
Attain DNS Automatically & Set DNS Manually Choose one of the two
options - Manually or Automatically. ( This parameter is only available for the data interface. )
28
DNS1 If you choose to set the DNS manually, please specify the IP address of the primary DNS server of this interface. ( This parameter is only available for the
data interface. )
DNS2 If you choose to set the DNS manually, please specify the IP address of the secondary DNS server of this interface. ( This parameter is only available for
the data interface. )
DNS3 If you choose to set the DNS manually, please specify the IP address of the tertiary DNS server of the WAN interface. ( This parameter is only available for
the data interface. )
PPPoE
If you select PPPoE as the WAN type of this interface, please specify the values for the following parameters.
PPPoE Account Specify the user name or PPPoE account provided by your ISP.
PPPoE Password Specify the PPPoE password provided by your ISP.
29
PPPoE Service Name Specify the PPPoE service name provided by your ISP.
PPPoE MTU size Specify the maximal size of the PPPoE packets for optimal
performance.
PPPoE MTU You can change the PPPoE MTU for optimal performance. 1492 is the default MTU.
Attain DNS Automatically & Set DNS Manually Choose one of the two options - Manually or Automatically.
DNS1 If you want to choose to set the DNS manually, please specify the IP address of the primary DNS server of the WAN interface. (This field is only available
for the data interface. )
DNS2 If you want to choose to set the DNS manually, please specify the IP address of the secondary DNS server of the WAN interface. (This field is only
available for the data interface.)
DNS3 If you want to choose to set the DNS manually, please specify the IP address of the tertiary DNS server of the WAN interface. (This field is only available
for the data interface.)
Enable Ping Access Tick the checkbox to allow the WAN interface to reply the ICMP echo requests which it receives from the public network.
Click Submit to apply this change after you finish configuring this WAN interface.
VLAN Settings This section enables you to assign a PVID and a P-Bit to each port of the
Residential Gateway. And below is a description for the VLAN settings and the VLAN behaviors of the Residential Gateway.
30
Packets will always be untagged when they leave the Residential Gateway from its
LAN port.
When untagged packets enter the Residential Gateway from a LAN port on the
public network and leave from the WAN port of the Residential Gateway, they will be added the PVID and P-Bit value of the incoming LAN port.
When tagged packets enter the Residential Gateway from a LAN port on the public
network and leave from the WAN port, the Residential Gateway will process them according to their original VLAN tags. If the original VLAN tags of the tagged packets are the same as the WAN ports PVID, the packets will be untagged by the Residential Gateway. Otherwise, they will keep their original VLAN tag when they leave the Residential Gateway.
When untagged packets enter the Residential Gateway from a LAN port on the
private network and leave from the WAN port, they will be added the PVID and P-Bit value of the WAN interface from which they leave the Residential Gateway.
When tagged packets enter the Residential Gateway from a LAN port on the private
network and leave from the WAN port, the Residential Gateway will process the packets according to their original VLAN tags. If their VLAN tags are the same as the PVID of the WAN interface from which they leave, the packets will be untagged. Otherwise, the packets will keep their original VLAN tags when they leave the Residential Gateway.
31
When a LAN port is allocated to the public network, you can specify its VLAN ID in
the text box and select its P-Bit value in the pull-down menu. But when a LAN port is allocated to the private network, its VLAN ID and P-Bit value can not be changed.
Click VLAN Status to view the VLAN table or check members of the VLAN groups of the Residential Gateway.
Click Apply to submit your settings after you finish configuring this page.
2.4.3 DDNS
DDNS stands for Dynamic Domain Name Service. It allows a host to bind with a permanent domain name so the host can be found on the internet with this domain name. With DDNS, the network administrator can access the Residential Gateway with a permanent domain name even if it is often assigned different IP addresses by DHCP. And users on the Internet can access the server (such as the web service) on the private network by the domain name of the Residential Gateway. They do not have to access the server by an IP address which is usually not as easy to remember as a domain name. Select DDNS from the Setup sub menu bar. Then, DDNS screen page appears as follows.
For details on the settings of DDNS, please refer to the description of the individual section.
32
DDNS Service To utilize the DDNS service, you need to first register an exclusive domain name
for the Residential Gateway in the website of the DynDNS or NoIP.org. And after you register in the website successfully, you need to make a proper setting on the Residential Gateway.
Enable DDNS Click the checkbox to enable the DDNS service. And select a registration server to which you already registered a domain name.
Username Specify the username provided by the DDNS server.
Password Enter the password provided by the DDNS server.
Host Name Enter the DDNS URL assigned by the DDNS server..
Click Apply to submit your settings after you finish configuring this page.
Current Status This is a view-only section. It displays information about the current status of
the DDNS service such as Initiating DDNS service, good (The update was successful, and the hostname is now updated.) and Badauth (The username and password pair do not match a real user.). You can click Refresh to update the information to the last status.
33
2.4.4 Network Setup
This page allows the network administrator to configure the private network settings of the Residential Gateway. Select Network Setup from the Setup sub menu bar. Then, Network Setup screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
LAN IP Setting This section allows you to assign a private IP address to the Residential
Gateway. This is an IP address which the Residential Gateway has on the private network. Below is the description of the configuration parameters for the private network setup.
IP Address Specify the private IP address of the Residential Gateway in the text boxes.
Subnet Mask Select a subnet mask from the pull-down menu. The subnet mask and the private IP address will determine the private network of the Residential Gateway.
34
Note that the private network and the public network of the Residential Gateway should not be overlapped. Otherwise, the Residential Gateway can not forward the packets to the correct destination.
DHCP Server Setting This section allows you to configure the DHCP server function of the
Residential Gateway. This function enables the Residential Gateway to assign IP addresses to the hosts on the private network. Below is the description of the configuration parameters for this function.
DHCP Server Enable or disable the DHCP server function of the Residential Gateway.
DNS Proxy Enable or disable the DNS proxy function of the Residential Gateway.
When it is enabled, the DHCP clients will regard the Residential Gateway as its DNS server. And when it is disabled, the DHCP clients on the private network will use the same DNS server on the public network as the Residential Gateway does.
Start IP Address Specify an IP address from which the Residential Gateway will start to assign the IP addresses to the DHCP clients on the private network.
Maximum Number of Users Specify the maximum number of IP addresses which the Residential Gateway can assign to the DHCP clients.
IP Address Range A view-only field. It displays a range of contiguous IP addresses which are determined by the Start IP Address field and the Maximum Number of
Users field. The IP addresses in this IP address range can be assigned by the Residential Gateway to the DHCP clients on the private network.
Client Lease Time This is a time period in which the DHCP clients can keep their IP addresses since the last time in which they receive the DHCP acknowledgement packet
from the Residential Gateway.
IP-MAC Binding Allocation & IP-MAC Binding Access Reservation Select IP-MAC Binding Allocation for the Residential Gateway to assign IP addresses in the IP Address
Range field to the DHCP clients. Or select IP-MAC Binding Allocation Reservation for
35
the Residential Gateway to only assign IP addresses which are in the DHCP Reservation Table.
Click Apply to submit your settings after you finish configuring this page.
DHCP Reservation This section contains the DHCP Reservation Table. The DHCP
Reservation Table includes the IP addresses reserved for the designated DHCP clients. You can
create a new entry or modify an entry of this table in the text boxes. Below is the description for each column of the DHCP Reservation Table.
Description This is a brief description for this entry.
IP This is an IP address which you want to reserve for a specific DHCP client.
MAC This is the MAC address of the DHCP client which you want to bundle with the IP address in IP field.
Action Click Insert to add a new entry after you configure it in the textboxes of the
table. Click Edit to modify this entry in the text boxes. And after you modify it, click Change to replace the previous settings with the new one. Or click Del to remove an
entry in this table.
Click DHCP Reservation and the DHCP Client List will show up in the pop-out window. The list displays information such as the hostname, the IP address, the type of the IP address, the MAC address and the expire time of the leased IP address.
Click Refresh to update the DHCP client list. Or click Close to close the pop-out window. You can select an entry and click add to edit it in the text boxes of the DHCP Reservation Table. After you finish editing this entry, you can click Insert to add this new entry to the DHCP Reservation Table.
Click Apply Reservation Table to submit your settings after you finish configuring this table.
36
2.4.5 Routing Setup
This page allows the network administrator to decide how the Residential Gateway will process the received packets. Select Routing Setup from the Setup sub menu bar. Then, Routing Setup screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
NAT This section allows you to enable or disable the NAT function of the Residential Gateway.
NAT stands for Network Address Translation. Due to this function, the Residential Gateway can replace the private IP address in the header of a packet with a public IP address or vice versa.
Note: If you disable the NAT function, the firewall protection of the Residential Gateway will be disabled as well. So you should be cautious if you want to disable this function.
Static Routing This section allows you to edit or modify an entry in the Static Route Table of
the Residential Gateway. A static route is a pre-determined pathway that packets can travel to reach a specific destination network. Enter the information below to set up a static route in the
Static Route Table.
Enable Static Route Enable or disable this static route.
37
IP Address Specify the destination IP address of the static route.
Subnet Mask Specify the subnet mask of the destination network of the static route.
Gateway Specify the IP address of a gateway through which this static route will send
the packets to the destination network.
Metric Metric is the cost of a route to a destination network.
Interface Specify an interface of the Residential Gateway from which the static route
will forward the packets to the destination network.
Click Apply Changes to submit your settings. Or click Show Routing Table to view the routing table of the Residential Gateway in the pop-out window. If you want to update the routing table, click Refresh in the pop-out window. And to close the pop-out window, click Close.
Static Routing Table - This table displays all the static routes created on the Residential Gateway. If you want to remove an entry in this table, click the checkbox in
the last column of this table to select it. Then, click Delete Selected to remove the selected entry. And if you want to clear all the entries in the table, click Delete All.
Here is an example for how the packets follow the static route to reach the destination network. Suppose the following entry is created in the Static Routing Table of the Residential Gateway.
Then, when the Residential Gateway receives packets whose destination IP addresses belongs to the network 192.168.1.0 from its LAN interface, the Residential Gateway will redirect the packets to the specified destination 192.168.0.100.
38
The picture below illustrates how the Residential Gateway will follow the static routes in the Static Routing Table.
2.5 WiFi
Select WiFi in the Main Menu bar. Then you can see the sub-items – Wireless Setup, Wireless Security and MAC Access Filter – on the sub menu bar.
2.5.1 Wireless Setup
This page allows the network administrator to set up a wireless network of the Residential Gateway. Select Wireless Setup from WiFi sub menu bar. Then, Wireless Setup screen page appears as follows:
39
For details on the settings of this page, please refer to the description of the individual section below.
WiFi Setup This section offers you two approaches to set up the wireless network of the
Residential Gateway. Select Manual to set up the wireless network manually. Or select WiFi
Protected SetupTM to allow the wireless clients to connect to the WLAN with WPS. WPS stands for
Wi-Fi Protected Setup. It is a standard which makes the WiFi security simpler and easier. Below is the description of configuration parameters for the two approaches.
Manual
If you want to set up the wireless network manually, please specify the values of the following parameters.
40
Network Mode Select one of the following modes for your wireless network.
Network Mode
Description
2.4 GHz (B)
In this mode, the Residential Gateway will only support
802.11b standard.
2.4 GHz (G)
In this mode, the Residential Gateway will only support
802.11g standard.
2.4 GHz (N)
In this mode, the Residential Gateway will only support
802.11n standard.
2.4 GHz (B+G)
In this mode, the Residential Gateway will support both
802.11b and 802.11g standards.
2.4 GHz (G+N)
In this mode, the Residential Gateway will support both
802.11g and 802.11n standards.
2.4 GHz (B+G+N)
In this mode, the Residential Gateway will support
802.11b, 802.11g and 802.11n standards.
Channel Number Select one of the channels in the pull-down menu. The wireless channels are stipulated to prevent too many APs from using the same
frequency. Select the channel which is used by fewer APs in your application environment. Or you can select Auto for the Residential Gateway to choose a WiFi channel automatically.
41
Data Rate Select a data rate in the pull-down menu to decide the speed of the wireless network.
Channel Width Select 20MHz for the Residential Gateway to support the link speed of 802.11n mode up to 150Mbps. Or select 40MHz for the Residential
Gateway to support the link speed of 802.11n mode up to 300Mbps. Note that 40MHz will only operate when the WiFi Channel is 5-11. (This field is only
available when the network mode is 2.4 GHz (N), 2.4 GHz (G+N), or 2.4 GHz (B+G+N).)
Control Sideband The extra bandwidth will be available when the channel bandwidth is 40MHz. If you select Upper, the extra bandwidth will be extended in
the upper sideband. (This field is only available when the network mode is 2.4 GHz (N), 2.4 GHz (G+N), or 2.4 GHz (B+G+N).)
Network Name To enable a WLAN of the Residential Gateway, tick the checkbox of its SSID. And specify the SSID in the text box as the name of the
WLAN. The Residential Gateway provides four WLANs. The WLANs should be distinguished from each other by their SSIDs. You can find the SSID in the wireless control panel of the wireless client devices to set up the wireless connection to the Residential Gateway. And if you do not want the SSID of this WLAN to be displayed on the wireless control panel of the wireless client devices, unselect the checkbox for SSID Broadcast.
Click Apply to submit your changes. Or click reset to clear all values in the text boxes.
WiFi Protected SetupTM
If you want to set up a wireless network of the Residential Gateway via WPS, please specify the values of the following parameters.
42
WPS Setup This section allows you to decide how the WPS clients shall set up the
wireless connection to the Residential Gateway. Choose one of the three methods below for WPS clients to connect to the wireless network of the Residential Gateway.
Push the WPS buttons on the Residential Gateway and the WPS client device. And
click Start PBC to set up the wireless connection.
Enter the PIN number generated by the WPS client device in the text box. And click
Start PIN to set up the wireless connection.
Enter the PIN number generated by the Residential Gateway here on the WPS
clients. And after the PIN number is entered on the WPS clients, the wireless connection will be set up.
WPS Setup This is a view-only section which displays information about the WPS
connection status.
43
WiFi Protected SetupTM Status It is Configured when the WPS connection has not been set up. And it is Unconfigured when the WPS connection has been
set up successfully.
Network Name(SSID) This is a network name (SSID) automatically set up by the Residential Gateway.
Security This shows the current security mode used.
2.5.2 Wireless Security
This page allows the network administrator to set the authentication method for the wireless network of the Residential Gateway when the WiFi connection is set up manually. Select Wireless Security from WiFi sub menu bar. Then, Wireless Security screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
SSID Select Select the SSID of a WLAN from the pull-down menu to set its authentication type
in the following section.
Wireless Security Setup This section enables you to set the authentication type for the
WLAN whose SSID is selected in the section above. And below is the description of the
44
configuration parameters in this section.
Security Mode The Residential Gateway supports four types of encryptions WEP, WPA, WPA2 and WPA-Mixed. Select one of them in the drop-down menu as the
encryption of this WLAN. Or select Disabled if you dont want any data encryption for this WLAN.
WEP
WEP stands for Wired Equivalent Privacy. It is a basic encryption method based on IEEE 802.11 standard.
802.1x Authentication Enable or disable the 802.1x authentication for the WLAN with a RADIUS server.
If you enable 802.1x Authentication, please specify the values of the following parameters:
Key Length Select 64 bits or 128 bits from the pull-down menu. The wireless client devices must have the same WEP encryption length as the Residential
Gateway.
RADIUS Sever IP Address Specify the IP address of the RADIUS server in the text box.
RADIUS Server Port Specify the port number for the RADIUS server in the text box. The default value is 1812.
45
RADIUS Server Password Specify the password which the RADIUS server will verify.
If you disable 802.1x Authentication, please specify the values of the following parameters:
Authentication The three available authentication options are Open System, Shared Key and Auto. If you select Open System, anyone can request
authorization and sends an ID to the Residential Gateway. If the Residential Gateway recognizes the ID, wireless client can connect to the Residential Gateway. Shared Key requires wireless clients to have the same key positions as
the Residential Gateway.
Key Length Select 64 bits or 128 bits from the pull-down menu. The wireless client devices must have the same WEP encryption length as the Residential
Gateway.
Key Format Select ASCII (5 characters) or HEX (10 characters) from the pull-down menu as the format of the key.
Encryption Key Specify the password for the WLAN.
WPA & WPA2
WPA stands for Wi-Fi Protected Access. It is a kind of encryption which improves the
security of WEP. It adopts two security-enhanced types to encrypt data TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). AES is a
stronger encryption method than TKIP. WPA2 is based on 802.11i. And it provides a stronger wireless security than WPA.
46
Authentication Mode Select Enterprise (RADIUS) to ask the wireless client devices to pass the authentication of a RADIUS server. And specify the values of the following
parameters.
WPA Cipher Suite & WPA2 Cipher Suite Select TKIP or AES in the pull- down menu.
RADIUS Sever IP Address Specify the IP address of the RADIUS server in the text box.
RADIUS Server Port Specify the port number of the RADIUS server in the text box. The default value is 1812.
RADIUS Server Password Specify the shared password which will be verified by the RADIUS server.
If you select Personal (Pre-Shared Key), please specify the values of the following parameters for the wireless authentication.
WPA Cipher Suite & WPA2 Cipher Suite Select TKIP or AES in the pull- down menu.
Pre-Shared Key Format Select Passphrase (alphanumeric format) or
47
Hex(64characters) (“A-F”, “a-f” and “0-9”) in the pull-down menu.
WPA Pre-Shared Key Specify the pre-shared key value in the text box. The key value can be between 8 and 63 characters long or 64 HEX characters long.
Symbols and spaces can also be used.
WPA Mixed
WPA Mixed is the security mode which permits the coexistence of WPA and WPA2 clients
on a WLAN. When the wireless security is set in this mode, the wireless client device can connect to the Residential Gateway with WPA/TKIP or WPA2/AES. Some older wireless client devices only support WPA/TKIP. So you have to select the mixed mode to open the WiFi service to this device.
Authentication Mode Select Enterprise (RADIUS) to ask the wireless client devices to pass the authentication of a RADIUS server. And specify the values of the following
parameters.
WPA Cipher Suite Select TKIP or AES in the pull-down menu.
WPA 2 Cipher Suite Select TKIP or AES in the pull-down menu.
RADIUS Sever IP Address Specify the IP address of the RADIUS server in
the text box.
RADIUS Server Port Specify the port number of the RADIUS server in the text box. The default value is 1812.
48
RADIUS Server Password Specify the shared password which will be verified by the RADIUS server.
Select Personal (Pre-Shared Key) as the authentication mode. And specify the values of the following parameters.
WPA Cipher Suite Select TKIP or AES in the pull-down menu.
WPA 2 Cipher Suite Select either TKIP or AES in the pull-down menu.
Pre-Shared Key Format Select either Passphrase (alphanumeric format) or
Hex(64characters) (“A-F”, “a-f” and “0-9”) in the pull-down menu.
Pre-Shared Key Specify the pre-shared key value in the text box. The key value can be between 8 and 63 characters long or 64 HEX characters long.
Symbols and spaces can also be used.
Click Apply Change to submit the settings after you finish configuring this page
2.5.3 MAC Access Filter
This page allows the network administrator to make its wireless access policy for the Residential Gateway. Afterwards, the Residential Gateway can deny or allow access of specific wireless client devices to its wireless network. Select MAC Access Filter from WiFi menu. Then, MAC Access Filter screen page appears as follows:
49
For details on the settings, please refer to the description of the individual section below.
Wireless Access Control Mode This section allows you to decide whether the Residential
Gateway should deny or allow wireless connection from the MAC addresses in the Current Access Control List below.
Select Disabled to deactivate the MAC access filter feature.
Select Permit PCs listed below to access the wireless network to open the WiFi
service of the Residential Gateway only to the wireless clients in the list.
Select Prevent PCs listed below from accessing the wireless network to open the
WiFi service of the Residential Gateway to any wireless clients except those in the list.
Access Restriction This section enables you to create or modify an entry in the Current
Access Control List in the next section. Please specify the MAC address (with the
AAAAAAAAAAAA format) of a wireless client in the MAC Address text box to add it to the list. Specify a description in the Comment text box if you need to. And click Apply Changes to apply the changes in the text boxes to the list. Or click Reset to clear all the values in the text boxes.
MAC Filter List This section contains the Current Access Control List of each WLAN. Select
the SSID of the WLAN from the pull-down menu in this section to check its control list.
To remove an entry from the list, select it in its checkbox in the last column. And click Delete Selected to remove it from the list. Or if you want to delete all entries in the list, click Delete All.
50
Click Wireless Client List to view the Active Wireless Client Table in the pop-out window.
2.6 Security
Select WiFi in the Main Menu bar. And the sub-items – Firewall, Packet Filter and URL Filter – will show up on the sub menu bar.
2.6.1 Firewall
Select Firewall in the sub menu bar for Security. Then, the following screen page will appear
Configuration This section allows you to enable or disable the firewall protection of the
Residential Gateway. When the firewall protection is enabled, the Residential Gateway will inspect the packets which are transmitted from the public network to its private network.
Note: When you disable the firewall protection, the security features such as Packet Filter, URL Filter, VPN Passthrough and DDoSwill stop working.
Click Apply to submit your settings after you finish configuring this page.
51
2.6.2 Packet Filter
This function enables the Residential Gateway to filter out the unwanted packets according to the IP address, the source MAC address or the application protocol. So the network administrator can set up the access policies on the Residential Gateway.
Select Packet Filter in the sub menu bar of Security. Then, Packet Filter screen page appears as follows:
Packet Filter Rule Enable or disable the packet filter function. When it is enabled, the
Residential Gateway will drop packets which meet predetermined conditions of the rules in the following sections.
WAN Filter This section allows you to edit the WAN filter rules. The WAN filter rule will block
packets which are received by the Residential Gateway from the public network and match the pre-determined condition of the rule. Below is an explanation for each column of the rule table.
Enable Enable or disable this WAN filter rule.
52
Source IP Range Specify an IP address range for the WAN filter rule to block packets whose source IP addresses are in this range.
Destination IP Specify an IP address range for the WAN filter rule to block packets whose destination IP addresses are in this range.
Dest. Port Specify the destination port number of the packets which the WAN filter rule will block.
Protocol Select TCP or UDP in the pull-down menu for the WAN filter rule to block packets of this communication protocol.
as the communication protocol of the packets which the WAN filter rule will block.
Schedule Select Always for the Residential Gateway to always execute this rule. Or select By Schedule for the Residential Gateway to follow the schedule stipulated in the
Days and Time fields to execute this rule.
Days Select the days on which you want this rule to be executed in a week.
Time Specify a time period of a day in which this rule will be executed.
Actions Click Insert to create a new rule which you configure in the text boxes. And if
you want to modify an entry in the rule table, click Edit to modify it in the text boxes. Then, click Change to submit the new settings. And if you want to remove an entry in the rule table, click Del.
LAN Filter This section allows you to edit the rule table for the LAN filter. The LAN filter will block
packets which are received by the Residential Gateway from the private network and match the pre-determined condition of any entry in the rule table. Below is a description for each column of this table.
Enable Select the checkbox to enable this rule.
53
Source IP Range Specify an IP address range for the LAN filter to block packets whose source IP addresses are in this range.
Destination IP Specify an IP address range for the LAN filter to block packets whose destination IP addresses are in this range.
Dest. Port Specify the destination port number of the packets which the LAN Filter will block.
Protocol Select TCP or UDP in the pull-down menu as the communication protocol of the packets which the LAN filter will block.
Schedule Select Always for the Residential Gateway to always execute this rule. Or select By Schedule for the Residential Gateway to follow the schedule stipulated in the
Days and Time fields to execute this rule.
Days Select the days on which you want this rule to be executed in a week.
Time Specify a time period of a day in which this rule will be executed.
Actions Click Insert to create a new rule which you configure in the text boxes. And if
you want to modify an entry in the rule table, click Edit to modify it in the text boxes. Then, click Change to submit the new settings. And if you want to remove an entry in the rule table, click Del.
MAC Filter This section allows you to edit the rule table for the LAN filter. The LAN filter will
block packets which are received by the Residential Gateway from the private network and match the pre-determined condition of any entry in the rule table. Below is a description for each column of this table.
This section allows you to edit the MAC filter rules in the table. The Residential Gateway will drop packets which match the pre-determined condition of any entry in this table. Below is a description of each column in this table.
54
Enable Select the checkbox if you want to enable this rule.
MAC Address Specify the MAC address of the packet which will be denied by this
rule.
Destination IP Specify the destination IP address of the packets which will be denied by this rule.
Dest. Port Specify the destination port number of the packet which will be denied by this rule.
Protocol Select TCP or UDP in the pull-down menu as the communication protocol inside the packet which will be denied by this rule.
Schedule Select Always for the Residential Gateway to always execute this rule. Or select By Schedule for the Residential Gateway to follow the schedule in the Days and
Time fields to execute this rule.
Days Select the day on which you want this rule to be executed.
Time Specify a time period of a day in which you want this rule to be executed.
Actions Click Insert to add a new rule to the table after you configure it in the text
boxes. And to modify an entry in the rule table, click Edit. Then, click Change to submit the new settings. If you need to remove any entry from this table, click Del.
Application Filter This section allows you to edit the table of application filter rules. The
Residential Gateway will drop packets when it receives packets which match the entries in the rule table. Below is a description of configuration parameters in this table.
Enable Select the checkbox if you want to enable this rule.
Source IP Range Specify the source IP address range of the packets which will be
denied by this rule.
55
Application The drop-down menu offers the most widely used Internet applications, including MSN, YAHOO Messenger, FTP, SSH, Telnet, SMTP, DNS, HTTP, POP, NNTP,
IMAP, SNMP, and HTTPS. Select an application whose packets will be denied by this filter rule.
Schedule Select Always for the Residential Gateway to always execute this rule. Or select By Schedule for the Residential Gateway to follow the schedule in the Days and
Time fields to execute this rule.
Days Select the day on which you want this rule to be executed.
Time Specify a time period of a day in which you want this rule to be executed.
Actions Click Insert to add a new rule to the table after you configure it in the text
boxes. And to modify an entry in the rule table, click Edit. Then, click Change to submit the new settings. If you need to remove any entry from this table, click Del.
Click Apply to submit your settings after you finish configuring this page.
2.6.3 URL Filter
URL Filter enables the network administrator to deny computers to access the specific websites on the Internet from the private network of the Residential Gateway. Select URL Filter from the Security sub menu bar. Then, URL Filter screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
56
URL Filter Rule Enable or disable the URL filter function. When it is enabled, the Residential
Gateway will drop packets whose destination URL addresses are specified in the URL filter rules.
URL Filter This section contains a table for the URL filter rules. The URL filter rules will prevent
the hosts on the private network to visit the specified URL addresses on the Internet. You can create or modify a URL filter rule in the text boxes of the rule table. Below is a description of configuration parameters in this table.
Enable Select the checkbox if you want to enable this rule.
URL Filter String Specify the URL address which this rule will allow or deny.
Action Click Insert to add a new rule to the table after you configure it in the text
boxes. And to modify an entry in the rule table, click Edit. Then, click Change to submit the new settings. If you need to remove any entry from this table, click Del.
Click Apply to submit your settings after you finish configuring this page.
2.6.4 VPN Passthrough
This feature enables the VPN traffic to be transmitted from the private network of the Residential Gateway to the public network. So the VPN client on the private network can establish a VPN tunnel to the remote VPN server. Select VPN pass through from the Security sub menu bar. Then, VPN pass through screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
57
VPN Passthrough The Residential Gateway supports VPN passthrough of the most popular
VPN tools - IPSec (IP Security), PPTP and L2TP. This section allows you to enable the VPN pass through feature for any of these tools which the VPN client on the private network uses. Below is a
description of configuration parameters in this section.
IPSec Passthrough Enable or disable IPSec passthrough on the Residential Gateway. IPSec stands for Internet Protocol Security. It is a suite of protocols for
secure exchange of packets at the IP layer.
PPTP Passthrough Enable or disable PPTP passthrough on the Residential Gateway. PPTP stands for Point-to-Point Tunneling Protocol. And PPTP passthrough is a feature
which allows the Point-to-Point Protocol to be tunneled through an IP network.
L2TP Passthrough Enable or disable the PPTP passthrough on the Residential Gateway. L2TP stands for Layer 2 Tunneling Protocol. It is used to enable Point-to-
Point sessions via the Internet on the Layer 2 level.
Click Apply to submit your settings after you finish configuring this page.
2.6.5 UPnP
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. An UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically.
Select UPnP from the Security sub menu bar. Then, this screen page appears as follows:
58
UPnP Setting Tick this checkbox then click Submit button to enable UPnP feature. UPNP
provides compatibility with networking equipment, software and peripherals.
2.6.6 DDoS
The Residential Gateway supports DDoS Prevention. DDoS stands for “Distributed Denial of Service”. It is a Hackers attack from a multitude of compromised systems to a target. It will cause
the target to deny the service for normal users. Select DDoS from the Security sub menu bar. Then, DDoS screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
DDoS Setup This section allows you to configure the DDoS prevention feature to prevent the
Residential Gateway from malicious attacks. Below is a description of configuration parameters in this section.
59
Enable DoS Prevention Tick the checkbox to activate DDoS prevention manually. And select the kinds of DDoS attacks to enable the Residential Gateway to detect them.
Or untick the checkbox to disable this feature. But note that when the feature is disabled, the Residential Gateway will be vulnerable to DDoS attacks.
Whole System Flood: SYN Tick the checkbox to prevent a SYN attack. A SYN attack will interrupt the process of the three way handshake of TCP and redirect the
acknowledge response to a malicious IP address. Or it will cause the targeted system to be flooded with false SYN requests.
Whole System Flood: FIN Tick the checkbox to prevent a FIN flood. This attack will flood the network with connection resets from an invalid IP address.
Whole System Flood: UDP Tick the checkbox to prevent a flood of large numbers of raw UDP packets targeted at the Residential Gateway.
Whole System Flood: ICMP Tick the checkbox to prevents a flood of ICMP messages from an invalid IP address. This attack can cause all TCP requests to be
halted.
Per Source IP Flood: SYN Tick the checkbox to prevent a SYN attack on a specified IP address.
Per Source IP Flood: FIN Tick the checkbox to prevent a FIN attack on the LAN port IP address.
Per Source IP Flood: UDP Tick the checkbox to prevent a UDP attack on the LAN port IP address.
Per Source IP Flood: ICMP Tick the checkbox to prevent an ICMP attack on the LAN port IP address.
TCP/UDP Port Scan Tick the checkbox to prevent a series of systematic queries to
60
the Residential Gateway for open ports through which to route traffic.
ICMP Smurf Tick the checkbox to prevent the hacker to forge the IP address of the Residential Gateway and send repeated ping requests to it flooding the network.
IP Land Tick the checkbox to prevent an attack which involves a synchronized request being sent as part of the three way handshake of TCP to an open port specifying
the port as both the source and destination effectively locking the port.
IP Spoof Tick the checkbox to prevent a hacker to create an alias IP address of the Residential Gateway to which all traffic is redirected.
IP Teardrop Tick the checkbox to prevent a Teardrop attack. A Teardrop attack sends mangled IP fragments with overlapping, over-sized, payloads to the Residential Gateway.
The fragmented packets are processed by the Residential Gateway and will cause it to crash.
PingofDeath Tick the checkbox to prevent the Residential Gateway to receive oversized ping packets which it cannot handle. The Ping of Death attack will send
packets which exceed the maximum IP packet size of 65,535 bytes.
TCP Scan Tick the checkbox to prevent the Residential Gateway to be probed by a hacker for open TCP ports to then block.
TCP SynWithData Tick the checkbox to prevent the hacker to send a volume of requests for connections that cannot be completed.
UDP Bomb Tick the checkbox to prevent the hacker congesting the network by a flood of UDP packets between him and the Residential Gateway using the UDP chargen
service.
UDP EchoChargen Tick the checkbox to prevent the hacker from sending a UDP packet to the echo server with a source port set to the chargen port.
61
packets/second Specify the number of packets per second that you want to scan for malicious activity.
Sensitivity Select High or Low from the pull-down menu for the sensitivity of the TCP/UDP port scan prevention.
Click Select All to select all of kinds of DDoS attacks in the checkboxes. Or click Clear all to unselect all of the checkboxes.
Enable Source IP Blocking Tick the checkbox to block the IP.
Blocking Time Specify the time to block the IP.
Click Apply Changes to submit your settings after you finish configuring this page.
62
2.7 Application
Select Application in the Main Menu bar. And the sub-items – Port Forwarding, Port Triggering and DMZ – will show up on the sub menu bar.
2.7.1 Port Forwarding
A host on the private network of the Residential Gateway is invisible from the Internet for it is protected by the firewall. Therefore, when a server is on the private network, its service will be inaccessible from the Internet. To open the service to hosts on the Internet, the network administrator may adopt Port Forwarding feature. Port Forwarding allows an IP address on the private network to be accessed from an IP address on the public network. It will redirect packets from the public network to a specified private IP address if the packets meet the pre-condition of a port forwarding rule. The diagram below compare the two scenarios when the Port Forwarding feature is enabled and when it is not.
Select Port Forwarding from the Application sub menu bar. Then, the screen page appears as follows:
63
Port Forwarding This section allows you to create or modify a port forwarding rule which will
be executed by the Residential Gateway. Below is a description of configuration parameters in this section.
Enable Select the checkbox if you want to enable this rule.
Public Port Specify the port number which the packets from the Internet are destined
to (1~65535).
Protocol Choose TCP, UDP or Both in the pull-down menu as your desired protocol.
LAN IP Specify the IP address of the server on the private network.
Local Port Specify the port number which the packets are destined to (1~65535). Application Description Enter a brief description for this entry if you want to.
Click Apply to submit your settings after you finish configuring a rule in the text boxes.
The example below illustrates how the Residential Gateway will execute a port forwarding rule in the table.
64
2.7.2 Port Triggering
Port Triggering is a more secure feature than port forwarding. It only allows transient port forwarding and does not always expose an Internet socket port to the Internet. When a packet which meets the precondition of a port triggering rule is received by the Residential Gateway from the private network, it will trigger the Residential Gateway to set up a temporary tunnel for an open service port. The tunnel will not be closed until the packets stop passing through the Residential Gateway for a period of time.
Select Port Triggering from the Application sub menu bar. Then, Port Triggering screen page appears as follows:
65
For details on the settings, please refer to the description of the individual section below.
Port Triggering Select Enabled to activate port triggering feature on the Residential Gateway.
Then, the Residential Gateway will execute the port triggering rules in the rule table below. Or select the Disabled radio button if you want to deactivate this feature. You can modify or create a port triggering rule in the text boxes according to your preferences. Below is a description of configuration parameters in this section.
Enabled Select the checkbox if you want to enable this rule.
Application Description Enter a brief description for this entry if you want to.
Protocol Choose TCP, UDP or Both in the pull-down menu as the protocol of the
trigger packets
Trigger Port Enter the destination port number of the trigger packet.
Incoming Port Range Specify the range of destination port numbers of the packets
which are allowed to pass through from the WAN interface to the private network when trigger packets are detected.
Action Click Apply to submit the settings after you finish configuring a rule in the text boxes.
To modify an entry in the rule table, you can select Edit in the last column of the rule table to modify the entry in the text boxes. Or you can click Reset below the rule table to clear all the values in the text boxes. If you want to remove an entry in the rule table, please select the entry in
66
the checkbox in the last column and click Delete Selected below the table. If you want to remove all entries in the table, please click Delete All.
2.7.3 DMZ
DMZ stands for “Demilitarized Zone”. It is an IP address on the private network of the Residential Gateway. But it is exposed to the Internet for special-purpose services. So a host on the private network can be assigned the IP address of the DMZ to provide services to the hosts on the Internet. The network administrator should be cautious of adopting DMZ. If a host is on DMZ, it is not protected by the firewall. And the Residential Gateway will open all ports to expose DMZ to the Internet. This may expose the local network to a variety of security risk.
67
Select DMZ from the Application sub menu bar. Then, DMZ screen page appears as follows:
Interface List This section displays a list of the data interface and alias interfaces of the
Residential Gateway. You can create a DMZ for each of the WAN interfaces in the list. And after a DMZ is created for an interface, this interface will redirect the packets received from the public network to its DMZ. Below is a description for each column of the table.
EN This field displays if the WAN interface is enabled or disabled. You can click this field to create or edit its interface in the following section.
WAN INFO. This is a view-only field which displays the type of the WAN interface.
Type This is a view-only field which displays the Internet access type of this WAN
interface.
VLAN This is a view-only field. It displays the VLAN ID which the WAN interface will add to the untagged packets when the packets leave the Residential Gateway from this
WAN interface.
P-Bit This is a view-only field. It displays the 802.1p priority value which the WAN interface will add to the untagged packets along with its VLAN ID.
WAN IP This is a view-only field which displays the IP address of this WAN interface.
68
DMZ SRC. IP This is a view-only field. It displays an IP address range on the internet which the DMZ is open to.
DMZ DES. IP This is a view-only field. It displays the private IP address which is on the DMZ of this WAN interface.
DMZ Settings This section allows you to create or edit the DMZ of a selected interface in the
Interface List. Below is a description of configuration parameters in this section.
Enable & Disable Enable or disable the DMZ of the selected WAN interface.
Source IP Select Any IP Address to expose the DMZ to any IP address on the
Internet. Or you can select the other radio button and specify an IP address range in the text boxes so the DMZ will be exposed to the IP address in the specified IP address range only.
Destination IP Specify the IP address of the host on the DMZ. You click Client List to view the DHCP client list in the pop-out window.
Click Apply to submit your settings after you finish configuring this section.
2.8 QoS
Select Application in the Main Menu bar. And the sub-items – Port Forwarding, Port Triggering and DMZ – will show up on the sub menu bar.
2.8.1 QoS Priority
QoS stands for the Quality of Service. It allows the network administrator to give traffic of a service a higher priority for bandwidth to ensure its quality. Some services on the Internet, like the multimedia service, require larger bandwidth than the other services do. So the network administrator needs QoS to guarantee that their traffics will not be assigned too few bandwidth when there are many other traffics in the same link. Select QoS Priority from the QoS sub menu bar. Then, the QoS Priority screen page appears as follows:
69
For details on the settings, please refer to the description of the individual section below.
QoS Priority Configuration: The Residential Gateway supports QoS of the egress traffic.
QoS of the Residential Gateway provides four queues for packet transmission – Queue 0, Queue 1, Queue 2 and Queue 3. Queues are used to store packets before the packets are transmitted. You can designate a queue to store packets if they meet a pre-determined condition of the QoS rule. Then, the queues will follow the priority order or the ratio of transmission rates to transmit the packets. Below is a description of configuration parameters in this section.
Priority Modes The Residential Gateway provides three QoS priority modes Port, DSCP, and 802.1p. Select one of them in the pull-down menu to decide how you want to
map the packets to the queues. Or select Disable to deactivate the QoS feature.
Port Select this mode to bind every port of the Residential Gateway with a queue. And
packets will be assigned to different queues according to the ports from which they leave the Residential Gateway. The Residential Gateway will follow the priority orders or the ratio of the transmission rates of the queues which store the packets to transmit packets.
802.1p Select this mode to bind the 802.1p values of the packets with the designated queues. And packets will be assigned to different queues according to their
802.1p values. The Residential Gateway will follow the priority orders or the ratio of the transmission rates of the queues which store the packets to transmit packets.
DSCP Select this mode to bind the DSCP values of the packets with the designated
queues. And packets will be assigned to different queues according to their DSCP values. The Residential Gateway will follow the priority orders or the ratio
70
of the transmission rates of the queues which store the packets to transmit packets.
Queue Mode If you select strict, the Residential Gateway will follow the priority orders of the queues to transmit packets. It will not start to transmit packets in a queue until all
packets in the queues which have higher priorities are transmitted. And the priorities of the four queues from high to low are Queue 3, Queue 2, Queue 1 and Queue 0. If you select weight, the Residential Gateway will follow the pre-determined ratio of the transmission rates to transmit the packets.
Port Priority Mode > Strict Queue Mode
If you select Port for the Priority Mode and strict for the Queue Mode, you need to decide how the ports of the Residential Gateway will be mapped to the queues.
Port Priority Select a queue from the pull-down menu to bind the selected queue with the port.
Port Priority Mode > Weighted Queue Mode
If you select Port for the Priority Mode and weighted for the Queue Mode, you need to specify the ratio of the transmission rates of the queues to decide how the ports of the Residential Gateway will be mapped to the queues.
71
Queue Weight(Q0:Q1:Q2:Q3) Specify the ratio of the transmission rates for queues in the text boxes.
Port Priority Select a queue from the pull-down menu to map it to the port.
802.1p Priority Mode > Strict Queue Mode
If you select 802.1p for the Priority Mode and strict for the Queue Mode, you need to determine how the 802.1p value will be mapped to the queues.
802.1p Priority Map Select a 802.1p value from the first pull-down menu. And select a queue from the second pull-down menu to map the 802.1p value to it.
802.1p Priority Mode > Weighted Queue Mode
If you select 802.1p for the Priority Mode and weighted for the Queue Mode, you need to specify the ratio of the transmission rates of the queues and decide how the 802.1p value should be mapped to the queues.
72
Queue Weight(Q0:Q1:Q2:Q3) Specify the ratio of the transmission rate for queues in the text boxes.
802.1p Priority Map Select a 802.1p value from the first pull-down menu. And select a queue in the second pull-down menu to map the 802.1p value to it.
DSCP Priority Mode > Strict Queue Mode
If you select DSCP for the Priority Mode and strict for the Queue Mode, you need to determine how the DSCP value should be mapped to the queues.
DSCP Priority Map Select a DSCP value from the first pull-down menu. And select a queue from the second pull-down menu to map the DSCP value to it.
DSCP Priority Mode > Weighted Queue Mode
If you select DSCP for the Priority Mode and weighted for the Queue Mode, you need to specify the ratio of the transmission rates of the queues and determine how the DSCP value should be mapped to the queues.
73
Queue Weight(Q0:Q1:Q2:Q3) Specify the ratio of the transmission rate for queues in the text boxes.
DSCP Priority Map Select a DSCP value from the first pull-down menu. And select a queue from the second pull-down menu to map the DSCP value to it.
Click Apply to submit the settings after you finish configuring this page.
2.8.2 QoS Ratelimiter
QoS Ratelimiter allows the network administrator to set the maximum transmission rate limit for the ingress or egress traffic. So the network administrator can give different rate limits to different Internet services or clients according to their privilege levels. Select QoS Ratelimiter from the QoS sub menu bar. Then, the QoS Ratelimiter screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
74
Rate Limit Configuration This section contains a table which displays the current rate limit
settings of the Residential Gateway. It allows you to set the maximum rate limit of the ingress and egress traffic on each port. Or you can set the maximum rate limit on the queues for each port. Below is a description of configuration parameters in this section.
Port Number Select a port from the pull-down menu to edit its maximum rate limit. Or you can click Edit in the last row of the table to edit the rate limit settings of the port.
Ingress Rate Select on to enable the ingress rate limit of this port. Or select off to disable it.
Ingress Bandwidth If you select on for the Ingress Rate, specify the rate limit for the ingress traffic of this port in the text box.
Egress Rate Select per port to give an egress rate limit to the port. Select per queue to give an egress rate limit to each queue for this port. Or select disable to deactivate this
feature.
Egress Bandwidth Q0 If you select Per Port for the Egress Rate, specify the rate limit for the egress traffic of the port in the text box. And if you select Per Queue for the
Egress Rate, specify for this port the maximum egress rate of the traffic stored in Queue 0 in the text box.
Egress Bandwidth Q1 Specify for this port the maximum egress rate of the traffic stored in Queue 1 in the text box.
Egress Bandwidth Q2 Specify for this port the maximum egress rate of the traffic stored in Queue 2 in the text box.
Egress Bandwidth Q3 Specify for this port the maximum egress rate of the traffic stored in Queue 3 in the text box.
Click Apply to submit your settings after you finish configuring this page.
75
2.9 SIP
Select SIP in the Main Menu bar. And the sub-items – Basic Settings, Account Settings and Server Settings – will show up in the sub menu bar.
2.9.1 Basic Settings
Select Basic Settings from the SIP Management menu. Then, Basic Settings screen page appears as follows:
Basic Settings This section allows you to configure basic SIP settings for the telephony
service. .
SIP Port Number Specify a port number which the Residential Gateway will open for the SIP packets. The number ranges from 1024 to 65535. And the default setting is 5060.
Session Timer Specify the time interval in seconds to refresh SIP. The default setting is 1800 seconds.
Media Port Start Specify the media port start number for the real time transportation protocol in the text box.
76
Media Port End Specify the media port end number for real time transportation protocol in the text box.
Transport Select UDP or TCP as the transportation protocol for the media stream. The default transport type is UDP.
SIP Time Interval Specify SIP time interval in milliseconds in the text box. The default setting is 500 msec.
SIP User Agent Name Specify SIP user agent name in the text box.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all values in the text box of this page.
77
2.9.2 Account Settings
This page enables the network administrator to register the phone numbers of the telephones connected to the Residential Gateway in the SIP server. The SIP server can locate the registered phone numbers after the registration is completed. And when the server receives a request to set up a connection to one of these phone numbers from another phone number, the server can forward the request packet to the correct destination. For details on the settings, please refer to the description of the individual section below. Select Account Settings from the SIP
Management menu. Then, Account Settings screen page appears as follows:
Account Settings This section allows you to configure the SIP account settings to register the
phone numbers in the SIP server.
User name Specify a user name for the SIP user agent.
Display Name Specify a display name for the SIP user agent.
78
Authentication User Name Specify the authentication name for the SIP user agent to register in the SIP server.
Authentication Password Specify the authentication password for the SIP user agent to register in the SIP server.
Confirmed Password Re-type the authentication password to reconfirm it.
MWI MWI stands for Message Waiting Indication. You can tick the checkbox to allow
the Residential Gateway to pass the MWI message to this telephony port. And the telephone will show a message–waiting indicator on its LED screen when you have a left message. To utilize this feature, your VoIP service provider must have a messaging system that sends message-waiting-status SIP packets as defined in RFC 3842.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all values in this page.
2.9.3 Server Settings
Select Server Setting from the SIP Management menu. Then, Server Setting screen page appears as follows:
79
For details on the settings, please refer to the description of the individual section below.
Server Settings This section allows you to decide which servers the telephony ports are going
to register in and how they are going to register.
Authentication Expired Time Specify SIP authentication expired time in seconds. The default setting is 3600 seconds.
Register Tick the checkbox to enable the SIP user agent under Telephony Port 1 or Telephony Port 2. And you will see more available parameters appear as follows.
Register Server Address — Specify the registration server IP address.
Register Server Port Specify the registration server port.
Proxy Address Specify the proxy address of the SIP server.
Proxy Port Specify the proxy port of the SIP server.
Use Outbound Proxy Tick the checkbox to use outbound proxy.
Outbound Proxy Address When outbound proxy is enabled, you need to further
specify the IP address of SIP outbound proxy server.
80
Outbound Proxy Port When outbound proxy is enabled, you need to further specify the port number of outbound proxy server.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all values in this page.
2.10 Voice
Select Voice in the Main Menu bar. And the sub-items – Voice Settings, Call Service, FAX settings, General Dialing Settings, Phone Book and Dialing Plan – will show up on the sub
menu bar.
81
2.10.1 Voice Settings
Select Voice Setting from the VoIP Management menu. Then, the following screen page appears.
For details on the settings, please refer to the description of the individual section below.
Voice Setting Below is a description of configuration parameters in this section.
82
Codec Priority 1~9 Codec stands for Compress-Decompress. It converts the analog voice signals to digital data packets. There are nine different codecs in the pull-
down menu. And each of them requires different bandwidth. Select one of them from the drop-down menu for each priority. Codec Priority 1 is the highest priority. And code priority 9 will is the lowest priority.
G.723 Rate Select 6.3Kbps or 5.3Kbps from the drop-down menu to decide the encoding rate for the G.723 Codec.
iLBC mode Select 20msec. or 30msec. from the drop-down men for the iLBC mode. The default setting is 30 msec.
DTMF Method Choose RFC2833, SIPINFO or INBAND from the drop-down menu as the DTMF Method. DTMF stands for Dual Tone Multiple Frequency. It is used for
telecommunication signaling over analog telephone lines in the voice-frequency band between telephone handsets and other communications devices and the switching center. If you select RFC2833, the Residential Gateway will send the DTMF tone as a RTP payload signal. And it will have a higher tolerance for packet loss. If you select SIPINFO, the Residential Gateway will send the DTMF tone via SIP INFO message. Or if you select “In-band”, the Residential Gateway will send the DTMF tone in voice packet.
Outband 2833 Payload type value Select a value from the drop-down menu.
Voice Active Detector If the voice being encoded is human speech or background
noise, select a mode from the drop-down menu to determine. Or select Disable to deactivate this feature.
Line Echo Canceller Tail Length Select Tail Length for line echo cancellation from the drop-down menu. The echo canceller can remove your echo from the returning audio
stream without removing responders voice.
Automatic Gain Control Tx Level Select a transmitting AGC level from the pull­down menu. Or select Disable to deactivate this feature.
83
Automatic Gain Control Rx Level Select a receiving AGC level from the pull-down menu. Or select Disable to deactivate this feature.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all unsaved values in this page.
2.10.2 Call Service
Select Call Service from the VoIP Management menu. Then, Call Service screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
Call Service This section allows you to configure for the call forwarding and call waiting
functions. Below is a description of configuration parameters in this section.
Call Waiting Tick the checkbox to activate the feature. It allows you to answer the second incoming call while you are still on a phone call. When the other caller tries to
84
reach you, this feature will send a special tone to notify you of the incoming call. To answer the second incoming call or switch back and forth between two calls, please press Flash button or FlashHook once.
Call Waiting Timeout Specify the call waiting timeout time in the text box. If you would like to continue with your first call and ignore a waiting call, this is the time that the
second caller will wait before disconnecting the waiting call.
Note: When the call waiting function is activated, the call forward function will be deactivated. If you enable Call Waiting function and set up Call Forward on Busy URI and Call Forward on NoAnswer URI at the same time, the waiting call will be disconnected instead of forwarding to the specified number when the time is out.
Call Forward on Busy URI Specify a account user name in the text box. The incoming call will be forwarded to the number of the specified account when the line is
busy.
Call Forward on NoAnswer URI Specify a account user name in the text box. The incoming call will be forwarded to the number of the specified account if it is not
answered.
Call Forward Always URI Specify a account user name to which all incoming calls are always forwarded.
Call Forward on NoAnswer Timeout Specify the timeout time for Call Forward on NoAnswer. The call will be forwarded to the specified number when the specified time is
out,
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all unsaved values in the check boxes.
85
2.10.3 FAX Port Settings
Select FXS port setting from the VoIP Management menu. Then, the following screen page appears.
For details on the settings, please refer to the description of the individual section below.
FAX Port Setting: This section allows you to configure for the fax function of the Residential
Gateway. Below is a description of configuration parameters in this section.
FXS Reverse Tick the checkbox to enable FXS Reverse function.
86
Caller ID Type Select a appropriate Caller ID type from the drop-down menu. Options available in the pull-down menu include DTMF, FSK Bellcore, FSK ETSI, BT and NTT. Or
select Disable to deactivate this feature.
Caller ID Display Select Before Ring when you want information of caller ID to be shown before ringing. Select After Ring when you want information of caller ID to be
shown after ringing.
Tone Setting Select a countrys tone setting from the pull-down menu. Or select Customization to configure tone settings using your own values.
Ring Impedance Select a ring Impedance type available from the drop-down menu.
Hook Flash Detect Upper Bound Specify the maximum time to detect hook flash.
Hook Flash Detect Lower Bound Specify the minimum time to detect hook flash.
Voice Tx Level Select the transmitting sound level from the drop-down menu. The
corresponding value for each level can be found in the table below.
Voice Rx Level Select the receiving sound level from the drop-down menu. The corresponding value for each level can be found in the table below.
Tx/Rx Voice Gain Value
Level
Decibel (dB)
1
-24 dB
2
-18 dB
3
-12 dB
4
-6 dB
5
-2.5 dB
Ring Cadence On Specify how long the tone will last.
Ring Cadence Off Specify how long it will wait before the next tone rings.
87
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all values in this page.
2.10.4 FAX Settings
Select FAX Setting from the VoIP Management sub menu bar. Then, the following screen page appears.
For details on the settings, please refer to the description of the individual section below.
FAX Setting Below is a description of configuration parameters in this section.
Line 1 & 2 T.38 Option Select the T.38 FAX option from the drop-down menu.
T.38 Option
Description
Voice
Voice data will be transmitted in accordance with CODEC priority defined in Voice Setting.
T.38 FAX Relay
The Residential Gateway will send fax messages as UDP or TCP/IP packets. This option provides better quality. However, the peer device must use T.38 as well.
Voice and T.38 Relay
Voice will be transmitted with the defined CODEC priority and fax messages will be sent with T.38.
Voice and Fax Pass
Through
Voice will be transmitted with the defined CODEC priority and fax messages will be sent with G.711/Ulaw.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all
88
values in this page.
2.10.5 General Dialing Settings
Select General Dialing Setting from the VoIP Management menu. Then, the following screen page appears.
For details on the settings, please refer to the description of the individual section below.
General Dialing Setting Below is a description of configuration parameters in this section.
Inter-digit Timeout Specify the time for inter-digit timeout in the text box. This is the time value allowed between two digits that are entered.
First-digit Timeout Specify the time for first-digit timeout in the text box. If a user picks up the handset without dialing a call within this specified time, the dialing tone will
be changed to busy tone.
Feature Invocation Key Feature Invocation Key.
89
Transfer Key Select a key from the drop-down menu. When hook flash is pressed on a call, the transfer key will be activated and a call will be transferred by pressing the
selected key(s). You can follow the procedures below to transfer a call.
Step 1. Press FlashHook.
Step 2. Dial the transfer key “*#.
Step 3. Dial the phone number of the called party and then press #.
New Call key Select the key from the drop-down menu. When hook flash is pressed on a call, the new call key will be activated and a new call will be dialed by pressing the
selected key(s).
Three Way Conference key Select the key from the drop-down menu. When hook flash is pressed on a call, the three-way conference key will be activated and a three
way conference call will be initiated by pressing the selected key(s). You can follow the procedures below to begin a three-way conversation.
Step 1. Dial the number of the first conferee. After the connection is established,
ask the first conferee to hold.
Step 2. Press FlashHook and then dial “** followed by the phone number of the
second conferee.
Step 3. After the connection is established with the second conferee, press the
selected key(s), such as 3”, to initiate a three-way conversation.
Hold Call Key Select the key from the drop-down menu. When the selected keys are pressed, a call will be put on hold. To resume a call, please press FlashHook.
90
There are two ways to put a call on hold, please see the table below for detailed descriptions.
To put a call on hold, press~
To resume a call on hold, press~
Method 1.
1 (Hold Call Key combination)
FlashHook
Method 2.
FlashHook
FlashHook
Send # Tick the checkbox to enable this function. And when it is enabled, you have to dial # after every phone number.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all values in this page.
2.10.6 Phone Book
The Residential Gateway supports 2-digit speed dial for the local lines and the SIP phone numbers that are used frequently. Select Phone Book from the VoIP Management menu. Then, Phone Book screen page appears as follows.
For details on the settings, please refer to the description of the individual section below.
Phone Book This section enables you to make settings for the phone book function. So you can
dial the frequently called number by entering this pre-programmed code. And below is a description of configuration parameters in this section.
Speed Dial This function allows you to dial the frequently called number by entering pre-programmed codes. The maximum of 10 speed-dial entries can be assigned.
91
Phone Number Enter the SIP number for an associated speed dial.
Note Enter the contact description if you want to.
Action Click Insert to create a new rule in the URI Phone book. Click Edit on the entry
that you would like to make some changes. When the selected entry is highlighted in blue, users can make some changes by selecting from the drop-down menu or enter the new phone number or notes. Click Change to apply the changes after you finish configuring the phone book. Then, the modified changes will apply to the URI Phone Book immediately. Click Del to remove an entry from the Phone Book.
2.10.7 Dialing Plan
The Residential Gateway supports Dialing Plan. A dialing plan establishes the expected number and pattern of digits for a telephone number. This includes country codes, access codes, area codes and all combinations of digits dialed. For instance, the North American public switched telephone network (PSTN) uses a 10-digit dial plan that includes a 3-digit area code and a 7-digit telephone number. Most PBXs support variable-length dial plans that use 3 to 11 digits. Dial plans must comply with the telephone networks to which they connect. For details on the settings, please refer to the description of the individual section below.
Select Dialing Plan from the VoIP Management menu. Then, Dialing Plan screen page appears as follow:
Dialing Plan This section contains a table for the created dialing plans. Below is a description of
configuration parameters in this section.
92
Phone NO. Identify a specific digit or specific digits (do not use #).
Length of NO. Specify the minimum and maximum digits that can be entered.
Delete Length Specify the number of digits that are to be ignored. For example, if you
enter “2”, the first 2 digits that you enter will be ignored.
Prefix No. Enter the prefix numbers that will be added in front of the phone no. that you enter.
Dest. IP / DNS Specify Destination IP / DNS address.
Port Specify the port number.
Click Insert to add this new rule to the Dialing Plan below after you enter the new settings.
Click the Edit button on the entry that you would like to make some changes. When the selected entry is highlighted in blue, users can make some changes by selecting from the drop-down menu or enter the new settings.
Click Submit to apply your settings after you finish configuring this page. Or click Reset to clear all unsaved values in the text boxes.
93
An example is given below to illustrate how the Residential Gateway will execute a dialing plan in the table.
2.11 IPTV
Select IPTV in the Main Menu bar. And the sub-items – IGMP Control – will show up on the sub menu bar.
2.11.1 IGMP Control
The Residential Gateway supports the IGMP snooping and the IGMP proxy. IGMP stands for Internet Group Management Protocol. It is widely used by the multimedia services which rely on
94
the multicast protocol to conduct multimedia streams to the hosts (such as IPTVs). When a host makes a request for the multimedia stream of a channel, it will send a request packet to join the multicast group of this channel to the multicast router. And if the device between the host and the multicast router supports the IGMP snooping or proxy, it will remember the port from which it receives the request. Then, it will forward the multimedia stream to the host when it receives the multimedia stream from the router. For details on the settings, please refer to the description of the individual section below. Select IGMP Control from the IPTV sub menu bar. Then, IGMP Control screen page appears as follows:
For details on the settings, please refer to the description of the individual section below.
IGMP Snooping/Proxy Enable or disable the IGMP snooping and IGMP proxy function on the
Residential Gateway. When the IGMP host is on the private network, the IGMP proxy must be activated for the Residential Gateway to learn the request of the host. And when the IGMP host is on the public network, the IGMP snooping must be enabled for the Residential Gateway to learn this request of the host.
IGMP Options This section allows you to set some values for other IGMP parameters.
Fast Leave If Enabled, it allows the host to change its multicast memberships faster. Thus, you can change the channels on the host faster.
Click Apply to submit your settings after you finish configuring this page. Or click Cancel to clear all the unsaved values in this page.
95
2.12 CATV(available for RF module only)
Select CATV in the Main Menu bar. And the sub-items – CATV Control – will show up on the sub menu bar.
2.12.1 CATV Control
Select CATV Control from the CATV sub menu bar. Then, the screen page appears as follows:
CATV Power Select Enabled to turn on the power of CATV RF module.
CATV Control Enable or disable the CATV RF module to receive the signals.
Click Apply to submit your settings after you finish configuring this page. Or click Cancel to clear all the unsaved values in this page.
2.13 Management
Select Management in the Main Menu bar. And the sub-items – Auto-Provision (TR069/DHCP) and SNMP– will show up on the sub menu bar.
2.13.1 Auto Provision (TR069/DHCP)
The Residential Gateway supports DHCP auto-provision and TR-069. The two functions are important for the network administrator who needs to manage many devices. They enable devices to automatically upgrade firmwares and configuration files from the server. So the network
96
administrator can save much time and cost and does not have to configure each device manually. For details on the settings, please refer to the description of the individual section below.
Select Auto-Provision (TR069/DHCP) from the Management sub menu bar. And then the following screen page appears.
DHCP Auto-Provision This section allows you to enable or disable the DHCP auto-
provisioning function.
TR-069 This section allows you to enable or disable TR-069 management.
Click Apply to submit your settings after you finish configuring this page.
2.13.2 SNMP
The Residential Gateway supports SNMP management. SNMP stands for Simple Network Management Protocol. A brief introduction for SNMP will be found in Chapter 3 of this document.
97
Select SNMP from the Management sub menu bar. And then the following screen page appears.
SNMP Management This section allows you to make a proper settings on the Residential
Gateway so you can manage the Residential Gateway by SNMP. Below is a description of the configuration parameters of this section.
SNMP Management Enable or disable the SNMP service.
SNMP Read Community Specify the Read Community.
SNMP Read/Write Community Specify the Read/Write Community.
SNMP Trap Host 1 Specify the IP address of the SNMP server to which the
Residential Gateway will send the SNMP traps.
SNMP Trap Host 2 Specify the IP address of the SNMP server to which the Residential Gateway will send the SNMP traps.
SNMP Trap Community Specify the authorized SNMP community name.
SNMP Power Down Trap Select Enable for the Residential Gateway to send the
power down trap to the SNMP trap host.
98
SNMP Link Up and Link Down Trap Select Enable for the Residential Gateway to send the link up or link down trap to the SNMP trap host..
2.14 Administration
Select Administration in the Main Menu bar. And the sub-items – Device Access, Interface Management, Time, Syslog, Diagnostics, User Privilege, Backup/Restore, Factory Default, Firmware Upgrade and Save & Logout– will show up on the sub menu bar.
2.14.1 Device Access
The network administrator may need to restrict the management access from LAN ports so he can prevent end users to change the settings of the Residential Gateway. Or he may want to manage the Residential Gateway via SNMP and deactivate management access via HTTP for security concern. This page allows him to make the management access policies of the Residential Gateway. Select Device Access from the Administration sub menu bar. Then, Device Access screen page appears as follows:
And for details on the settings, please refer to the description of the individual section below.
Management Access This section allows you to configure the management methods for the
Residential Gateway. Below is a description of the configuration parameters of this section.
Access Via Tick the checkbox to enable the Residential Gateway to open the web UI for management.
99
Access Via LAN Select Enabled to permit the computers to manage the Residential Gateway from its LAN ports. Or select Disabled to deny the computers to manage the
Residential Gateway from its LAN ports.
Allow Remote IP address Select Any IP Address for the Residential Gateway to be managed from its WAN port by any remote IP address. Or select the second radio button
and specify a range of IP addresses in the text boxes to enable these IP addresses to manage the Residential Gateway from the WAN port.
Click Apply to submit t your settings after you finish configuring this page.
2.14.2 Interface Mgmt.
This page enables the network administrator to edit the port settings of the Residential Gateway. Select Interface Mgmt from the Administration sub menu bar. Then, the following screen page appears.
100
Current State This section displays the port state of the Residential Gateway. You can click
Edit in the last column of the table to configure the settings of the selected port in the next section. Below is a description of the configuration parameters of this section.
Port Configuration This section allows you to edit the port settings of the Residential Gateway.
Port Number Click the pull-down menu to select the port number for configuration. Or it will display the port which you select in the section above.
Port State Enable or disable the selected port.
Media Type This field shows the media type (either Fiber or Copper) of the selected
port. And it is open to select when this port is a combo port.
Port Type This is a view-only field. It indicates that the selected port is in the auto- negotiation mode so this port will negotiate with the other device to link up in the
maximum link speed. And the port of the device on the other side should support auto­negotiation as well.
Port Speed This field shows the speed of the selected port. And it is open to select when the selected port is a combo port.
Duplex This is a view only field. It indicates that the selected port is in the full duplex mode.
Flow Control Enable or disable the flow control function.
Click Apply to submit t your settings after you finish configuring this page.
Loading...