ECG9210-04
Home Gateway VDSL2
Router with 802.11b/g
capabilities
User Guide
http://www.edgecorenetworks.com
http://www.edgecorenetwork
User Guide
Home Gateway VDSL2 Router
VDSL2 Home Gateway Router with
4100BASE-TX (RJ-45) Ports, 2 VDSL Ports (RJ-11)
and 802.11b/g wireless capabilities
EGC9210-04
E022010-DT-R01
150200000095A
Compliances
FCC - Class B
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with instructions, may cause harmful interference to
radio communications. However, there is no guarantee that the interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
• Reorient the receiving antenna
• Increase the separation between the equipment and receiver
• Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected
• Consult the dealer or an experienced radio/TV technician for help
You are cautioned that changes or modifications not expressly approved by the party
responsible for compliance could void your authority to operate the equipment.
You may use unshielded twisted-pair (UTP) for RJ-45 connections - Category 3 or
better for 10 Mbps connections, or Category 5 or better for 100 Mbps connections.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interf erence, and (2)
this device must accept any interference received, including interference that may
cause undesired operation.
For product available in the USA/Canada market, on ly channel 1~11 can be operated.
Selection of other channels is not possible.
This device and its antenna(s) must not be co-located or operation in conjunction with
any other antenna or transmitter.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with
minimum distance 20cm between the radiator & your body.
EC Conformance Declaration
Marking by the above symbol indicates compliance with the Essential Requirements of the
R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following
conformance standards:
• EN 60950-1 (IEC 60950-1) - Product Safety
v
• EN 300 328 - Technical requirements for 2.4 GHz radio equipment
• EN 301 489-1 / EN 301 489-17 - EMC requirements for radio equipment
This device is intended for use in the following European Community and EFTA countries:
AustriaBelgiumCyprusCzech Republic Denmark
Requirements for indoor vs. outdoor operation, license requirements and allowed channels
of operation apply in some countries as described below:
• In Italy the end-user must apply for a license from the national spectrum authority to
operate this device outdoors.
• In Belgium outdoor operation is only permitted using the 2.46 - 2.4835 GHz band:
Channel 13.
• In France outdoor operation is only permitted using the 2.4 - 2.454 GHz band:
Channels 1 - 7.
Note: The user must use the configuration utility provided with this product to ensure the
channels of operation are in conformance with the spectrum usage rules for
European Community countries as described below.
• This device will automatically limit the allowable channels determined by the current
country of operation. Incorrectly entering the country of operation may result in illegal
operation and may cause harmful interference to other systems. The user is obligated to
ensure the device is operating according to the channel limitations, indoor/outdoor
restrictions and license requirements for each European Community country as described
in this document.
• This device may be operated indoors only in all countries of the European Community
using the 2.4 GHz band: Channels 1 - 13, except where noted below.
• In Italy the end-user must apply for a license from the national spectrum authority to
operate this device outdoors.
• In Belgium outdoor operation is only permitted using the 2.46 - 2.4835 GHz band:
Channel 13.
• In France outdoor operation is only permitted using the 2.4 - 2.454 GHz band:
Channels 1 - 7.
Declaration of Conformity in Languages of the European Community:
Czech
Česky
Estonian
Eesti
SMC tímto prohlašuje, že tento Radio LAN device je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES.
Käesolevaga kinnitab SMC seadme Radio LAN device vastavust direktiivi
1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele
asjakohastele sätetele.
vi
EnglishHereby, SMC, declares that this Radio LAN device is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/
EC.
Finnish
Suomi
Dutch
Nederlands
French
Français
Swedish
Svenska
Danish
Dansk
German
Deutsch
Greek
Ελληνική
Hungarian
Magyar
Italian
Italiano
Latvian
Latviski
Lithuanian
Lietuvių
Maltese
Malti
Valmistaja SMC vakuuttaa täten että Radio LAN device tyyppinen laite on
direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin
muiden ehtojen mukainen.
Hierbij verklaart SMC dat het toestel Radio LAN device in overeenstemming
is met de essentiële eisen en de andere relevante bepalingen van richtlijn
1999/5/EG
Bij deze SMC dat deze Radio LAN device voldoet aan de essentiële eisen
en aan de overige relevante bepalingen van Richtlijn 1999/5/EC.
Par la présente SMC déclare que l'appareil Radio LAN device est conforme
aux exigences essentielles et aux autres dispositions pertinentes de la
directive 1999/5/CE
Härmed intygar SMC att denna Radio LAN device står I överensstämmelse
med de väsentliga egenskapskrav och övriga relevanta bestämmelser som
framgår av direktiv 1999/5/EG.
Undertegnede SMC erklærer herved, at følgende udstyr Radio LAN device
overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF
Hiermit erklärt SMC, dass sich dieser/diese/dieses Radio LAN device in
Übereinstimmung mit den grundlegenden Anforderungen und den anderen
relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi)
Hiermit erklärt SMC die Übereinstimmung des Gerätes Radio LAN device
mit den grundlegenden Anforderungen und den anderen relevanten
Festlegungen der Richtlinie 1999/5/EG. (Wien)
με την παρουσα SMC δηλωνει οτι radio LAN device συμμορφωνεται προσ
τισ ουσιωδεισ απαιτησεισ και τισ λοιπεσ σχετικεσ διαταξεισ τησ οδηγιασ
1999/5/εκ.
Alulírott, SMC nyilatkozom, hogy a Radio LAN device megfelel a vonatkozó
alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Con la presente SMC dichiara che questo Radio LAN device è conforme ai
requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva
1999/5/CE.
Ar šo SMC deklarē, ka Radio LAN device atbilst Direktīvas 1999/5/EK
būtiskajām prasībām un citiem ar to saistītajiem noteikumiem.
Šiuo SMC deklaruoja, kad šis Radio LAN device atitinka esminius
reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
Hawnhekk, SMC, jiddikjara li dan Radio LAN device jikkonforma mal-ħtiġijiet
essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/
5/EC.
vii
Spanish
Español
Polish
Polski
Portuguese
Português
Slovak
Slovensky
Slovenian
Slovensko
Por medio de la presente SMC declara que el Radio LAN device cumple con
los requisitos esenciales y cualesquiera otras disposiciones aplicables o
exigibles de la Directiva 1999/5/CE
Niniejszym SMC oświadcza, że Radio LAN device jest zgodny z
zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami
Dyrektywy 1999/5/EC.
SMC declara que este Radio LAN device está conforme com os requisitos
essenciais e outras disposições da Directiva 1999/5/CE.
SMC týmto vyhlasuje, že Radio LAN device spĺňa základné požiadavky a
všetky príslušné ustanovenia Smernice 1999/5/ES.
SMC izjavlja, da je ta radio LAN device v skladu z bistvenimi zahtevami in
ostalimi relevantnimi določili direktive 1999/5/ES.
Customer Information
1.This equipment complies with Part 68 of the FCC rules and the requirements
adopted by the ACTA. On bottom of this equipment is a label that contai ns,
among other information, a product identifier of [INSERT LABEL]. If requested,
this number must be provided to the telephone company.
2.If this equipment, ECG9210-04, causes harm to the telephone network, the
telephone company will notify you in advanc e that temporary discontinuance of
service may be required. But if advance notice isn't practical, the telephone
company will notify the customer as soon as possible. Also you will be advised of
your right to file a complaint with the FCC if you believe it is necessary.
3.The telephone company may make changes i n its facili ties, equipment, op erations
or procedures that could affect the operation of the equipment. If this happ ens, the
telephone company will provide advance notice in order for you to make
necessary modification to maintain uninterrupted service.
4.If you experience trouble with this equipment, you disconnect it from the network
until the problem has been corrected or until you are sure that the equipment is
not malfunctioning.
5.Please follow instructions for repairing if any (e.g. battery replacement section);
otherwise do not alternate or repair any parts of device except specified.
6.Connection to party line service is subject to state tariffs. Contact the state public
utility commission, public service commission or corporation commission for
information.
7.If your home has specially wired alarm equipment connected to the telephone
line, ensure the installation of this equipment does not disable alarm equipment,
consult your telephone company or a qualified installer.
viii
Warnings and Cautionary Messages
Warning: This product does not contain any serviceable user parts.
Caution:Do not plug a phone jack connector in the RJ-45 port. This may damage this
Caution:Use only twisted-pair cables with RJ-45 connectors that conform to FCC
device.
standards.
Environmental Statement
The manufacturer of this product endeavours to sustain an environmentally-friendly policy
throughout the entire production process. This is achieved though the following means:
• Adherence to national legislation and regulations on environmental production standards.
• Conservation of operational resources.
• Waste reduction and safe disposal of all harmful un-recyclable by-products.
• Recycling of all reusable waste content.
• Design of products to maximize recyclables at the end of the product’s life span.
• Continual monitoring of safety standards.
End of Product Life Span
This product is manufactured in such a way as to allow for the recovery and disposal of all
included electrical components once the product has reached the end of its life.
Manufacturing Materials
There are no hazardous nor ozone-depleting materials in this product.
Documentation
All printed documentation for this product uses biodegradable paper that originates from
sustained and managed forests. The inks used in the printing process are non-toxic.
ix
x
About This Guide
Purpose
This guide details the hardware features of the Gateway, including its physical and
performance-related characteristics, and how to install the Gateway. It also includes
information on how to operate and use the management functions of the Gateway.
Audience
The guide is intended for use by network administrators who are responsible for installing
and setting up network equipment; consequently, it assumes a basic working knowledge
of LANs (Local Area Networks).
Conventions
The following conventions are used throughout this guide to show information:
Note: Emphasizes important information or calls your attention to related features or
instructions.
Caution: Alerts you to a potential hazard that could cause loss of data, or damage the
system or equipment.
Warning: Alerts you to a potential hazard that could cause personal injury.
Revision History
This section summarizes the changes in each revision of this guide.
January 2010 Revision
This is the first revision of this guide.
xi
xii
Contents
Chapter 1: Introduction 13
Overview 13
VDSL Technology 14
Features and Benefits 15
Description of Hardware 16
Chapter 2: Installation 25
Installation Overview 25
Package Contents 25
System Requirements 25
Cable Connections 26
Powering On 27
Configuring the TCP/IP Protocols 27
Chapter 3: Network Planning 29
Application Examples 29
Networking Concepts 29
Route Determination 29
Bridging 29
Routing 30
Network Applications 30
Accessing a Remote Site 30
Accessing the Internet 31
Network Services 32
DHCP Service 32
DNS Service 32
NAT Functions 32
Virtual Server 33
User-Definable Application Sensing Tunnel 33
DMZ Host Support 33
Security 33
Virtual Private Network 34
Chapter 4: Initial Configuration 35
Accessing the Setup Wizard 35
Using the Setup Wizard 36
Chapter 5: System Configuration 45
Using the Web Interface 45
Home Page 46
Advanced Settings Menu 47
Status Information 50
System Information 50
xiii
Contents
WAN Status 51
Bridge WAN Status 52
LAN Status 52
System Log 53
DHCP Client List 53
System Configuration 54
System Mode 54
System Time 56
Admin Settings 57
System Tools 58
UPnP 59
Service Settings 60
SNMP 61
DNS 63
Management IP 63
WAN Configuration 64
WAN Type 64
WAN Settings 65
Dynamic IP Address 65
Static IP Address 66
PPPoE 67
This device can serve as a key component in any Ethernet-over-VDSL2 data transport
system that consists of an end-user Gateway and a VDSL2 switch connected by
standard telephone cable. The VDSL connection delivers an Ethernet data link rated
up to both 100 Mbps downstream and 100 Mbps ups tream (VDSL2 profile 30A), while
simultaneously supporting standard telephone services. The system can be deployed
in any multi-dwelling/multi-tenant environment (apartment blocks, hotels, or office
complexes) to provide both high-speed Internet ac cess and telephone services without
any need for re-wiring. It also provides a built-in 802.11b/g access point for wireless
connectivity.
VDSL switches combine both the data and phone signals coming from your Internet
and telephone service providers, and pass these signals directly over standard
telephone wiring to multiple users in the same building. The Gateway is used to
separate these signals and pass them on to a customer’s computer and telephone
equipment.
The VDSL2 switch is typically located in a wiring closet or other cent ral location of a
multi-dwelling/multi-tenant unit, campus, or enterprise. An Internet connection is
provided from the ISP to the customer’s building over fiber optic cable, running
Ethernet directly over a 1 to 10 Gbps connection. This kind of WAN connection is
referred to as Fiber To The Building (FTTB). Data signals entering a site are first
passed through an Ethernet switch that segregates the signals for individual user
connections, and are then fed into the switch. Phone signals are also routed from PBX/
MDF distribution equipment into the switch. The data and phone signals for each user
are combined in the switch, and passed over VDSL lines to individual customers.
The Gateway at the customer end of the VDSL line connects to any PC equipped with
a 10BASE-T or 100BASE-TX network interface card. Your existing telephone, mo dem,
or fax machine simply plugs into the Gateway’s phone port. There is no need for
splitters, terminators, or filters. In fact, there is no need to modify your home wiring at
all. And because the VDSL connection is based on Ethernet, no complex software
configuration is required.
The Gateway provides access to a wide range of advanced transport features,
including support for real-time video, and other multimedia servic es requiring
guaranteed Quality of Service (QoS). It also provides multiprotocol encapsulation for
bridging Windows NetBEUI and Novell’s IPX protocols directly to a remote site for
complete access to corporate resources, or for routing TCP/IP traffic for Internet
connections.
13
Introduction
ISP
(Internet)
Central Office
(PSTN)
Punch Down
Blocks /
Patch Panels
PBX
Telephone/Fax
Telephone
VDSL
Concentrators
Ethernet
Switch
1
E
S
3
5
2
6
F
TelephoneLine from Central Office
Fiber Optic Link to ISP
Local Servers
(Locally Hosted Services,
Video Servers, Billing)
Existing Phone
Lines to Clients
Multi-dwelling/Multi-tenant Building
Floor 2
Floor 1
Rooms/Clients
Rooms/Clients
VDSL Lines
Phone Lines
Ethernet
Links to Switch
VDSL
Gateway
VDSL
Gateway
1
VDSL Technology
VDSL (Very High Bit-Rate Digital Subscriber Line) is at the high-en d of all the DSL
technologies, offering the best combination of fiber optics and copper to provide
high-speed broadband Internet access. VDSL’s primary application is in providing a
broadband data service to multi-tenant residential or commercial buildings. In this
implementation, fiber optic cable carries the data from a telephone company’s central
office to the building; then the installed telephone copper wires take the data and
deliver it to individual units within that building.
Figure 1-1 Providing Broadband Internet Access through VDSL
VDSL provides high-speed Internet access over existing phone lin es by makin g use of
previously unused frequency bandwidth abov e the voice band (i.e., up to 30 MHz with
VDSL2). By placing VDSL signals above the frequency of the voice signal, a VDSL
service can coexist on the same line wit h o ther te lep hone servic es. VDSL c an o perat e
symmetrically, providing the same data rate in both directions, or asymmetrically,
providing a higher data rate in the downstr eam (receive) di rection than in the u pstream
(transmit) direction.
VDSL delivers high-performance online applications, such as high-quality video and
other switched multimedia services. This Ethernet VDSL2 Gateway provides robust
performance, with a data rate up to 100 Mbps downstream and 100 Mbps upstream,
and a range up to 200 meters (656 ft).
This system is based on advanced VDSL2 Multi-Carrier Modulation (MCM) technology
with adaptive channel equalization that overcomes bridge taps and other line
14
Features and Benefits
distortions. Reed-Solomon Forward Error Correction and interleaving protects against
errors due to impulse noise, and enables recovery from signal interruptions. Frequency
Division Duplexing (FDD) separates downstream and upstream channels and allows
VDSL signals to coexist with regular telephon e se rv ice s. A p ower bac k-off mechanism
is also implemented to reduce noise from crosstalk in line bundles.
Features and Benefits
VDSL features (Gateway side) include:
• High-speed Internet access over existing phone lines
• VDSL2 connection provides the following rate/rang e options (profile 30A):
Table 1-1 Maximum Rates and Distances
RateModeMax. Range
100 MbpsDownstream200 m (656 ft)
100 MbpsUpstream
• Concurrent data and telephone services over a single connection
• Always-on digital connection eliminates dial-up delays, providing transparent
reconnection when initiating a network request
• Supports ITU-T VDSL2 and interface standards
• Spectral compatibility with VDSL2, Smartphone digital PBX extensions and
narrowband interference
• Robust operation on severely distorted lines
• Supports power back-off algorithm that permits a mixed distance deployment
• Wireless 802.11b/g access point
• LEDs indicate VDSL link status, and power
• Simple plug-and-play installation
1
Additional VDSL2 features (Gateway side) include:
• Fast startup for quick initialization
• Trellis coding modulation for higher performance
• Seamless rate adaptation for enhanced quality in video applications
• Variable tone spacing enables best performance for long and short reach lines
• Improved framing, overhead channel, and interleaving
Gateway services include:
• Multiprotocol encapsulation of Windows NetBEUI, Novell’s IPX and TCP/IP via
bridging for complete access to corporate resources
• TCP/IP routing transport using RIP or RIP 2 for Internet access
15
Introduction
1
• Network Address Translation (NAT/NAPT) which enables multiple user Internet
access with a single user account, flexible local IP address administration, and
firewall protection
• Virtual Server which allows remote users access to various services at your site
using a constant IP address
• DMZ Host allows a client to be fully ex posed to the Internet fo r applications wh ich do
not work properly behind a firewall
• Dynamic Host Configuration Protocol (DHCP) for dynamic IP address ass ignment as
a server or server relay
• TR-069 CPE WAN Management Protocol support for communication between the
Gateway and an Auto-Configuration Server
• TR-098 Multi-Service Delivery Framework for Home Networks
Description of Hardware
This Gateway is a Very High Bit-Rate Digital Subscriber Line (VDSL2) customer
premises equipment (CPE) that can connect to a remote site (via bridging) or to the
Internet (via routing). It transports data over standard telephone wire at a symmetric
data rate up to 100 Mbps downstream and 100 Mbps upstream, and a range up to
200 meters (656 ft).
This unit provides the following ports on the rear panel:
• One RJ-11 port for connection to your VDSL service provider’s incoming line.
• One RJ-11 port for connection to your telephone, modem, or fax machine. The
Gateway includes a built-in POTS voice/data splitter, so no external splitt er or
low-pass filter is required.
• Four RJ-45 ports for connection to a 10/100BASE-TX Ethernet Local Area Network.
These ports operate at 10/100 Mbps, half/full duplex. All of these ports support
automatic MDI/MDI-X operation, so you can use straight-through cables for all
network connections. (See “10BASE-T/100BASE-TX Pin Assignments,” page 113.)
• One 802.11b/g antenna for wireless connectivity.
• WPS button for instant wireless connection.
• Wall or ceiling mount kit.
The rear panel also includes a DC p ower input jack, and a screw hole for groundi ng the
Gateway to earth.
There is also a reset button on the bottom of uni t that can be used to re store the de vice
to its factory default settings.
16
Description of Hardware
PW
R ALARM
VDSL VD
SL LA
N
1 LAN
2 LAN
3 LAN
4 W
LAN
W
PS
LIN
K TX/RX
WPS
802.11b/g Antenna
WPS Button
Power LED VDSL LINK LEDLAN1~4 LEDsWPS LED
ALARM LEDVDSL TX/RX LEDWLAN LED
The following figure shows the front components of the Gateway:
1
Figure 1-2 Top Panel
The Gateway includes key system and port indicators that simplify installation and
network troubleshooting. The LEDs, which are located on the top of the unit for easy
viewing, are described in the following table.
Table 1-2 LED Display Status
LED
ColorStatusDescription
PWRGreen OnThe unit is being supplied with power.
OffThe unit is not receiving power.
ALARMOrangeOnIndicates VDSL link failure.
VDSL LINKGreenOnA stable link has been established with the VDSL network.
OffConnected to network; VDSL link has been established.
OffVDSL link has not been established.
BlinkingThe unit is synchronizing (initializing the VDSL link).
17
Introduction
Power Receptacle Power SwitchRJ-11 Phone Ports
Grounding PointRJ-45 LAN Ports
1
Table 1-2 LED Display Status (Continued)
LED
VDSL TX/RXGreenOnSignal detected on VDSL WAN port.
LAN1-4GreenOn Ethernet link signal detected on LAN port.
WLANGreen
WPSGreen
ColorStatusDescription
OffNo signal detected on VDSL WAN port.
BlinkingNetwork traffic is crossing the VDSL WAN port.
OffNo Ethernet link signal detected on LAN port.
BlinkingNetwork traffic is crossing the LAN port.
On/
Flashing
OffIndicates the 802.11b/g radio is disabled.
On (for 10
seconds)
Fast
Flashing
Slow
Flashing
(for 10
seconds)*
OffIndicates that WPS is not in progress.
Indicates the 802.11b/g radio is enabled. Flashing indicates
wireless network activity.
Indicates the WPS authentication of a device has been
successfully completed.
Indicates the WPS authentication of a client device is in
progress.
Indicates the WPS authen tication of a device did not c omplete
after 120 seconds.
The following figure shows the rear components of the Gateway:
Figure 1-3 Rear Panel
18
Description of Hardware
Reset Button
Rubber Feet
The following figure shows the base components of the Gateway:
Figure 1-4 Base Panel
1
19
Introduction
Mounting Holes
1
The gateway also includes a wall/ceiling mount bracket illustrated in the picture that
follows. Align the bracket in the direction indicated, marking four screw holes in the
mounting surface with a pencil. Drill four holes in the mounting surface suf ficie nt in size
to accomodate the screws that you are using. If drilling into a wall, make sure to use
wall-plugs as well.
The mounting bracket also includes two clips for attaching the unit to the backet.
Figure 1-5 Mounting Bracket - Front
Before attaching the bracket to the mounting surface be sure to connect the unit to its
required connections, a power source, RJ-11/RJ-45 leads, grounding source, and
power on the unit to make sure that it is functioning and providing connectivity.
20
Description of Hardware
Mounting Clips
The mounting bracket also includes two clips for attaching the unit to the backet.
Figure 1-6 Mounting Bracket - Rear
1
21
1
Introduction
Figure 1-7 Mounting the unit in the bracket
Figure 1-8
Mount the connected unit into the bracket in the direction of the red arrows shown
above, making sure the unit clips correctly into the mount ing clips.
22
Figure 1-9 Unit in bracket
Description of Hardware
1
23
Introduction
1
If mounting the assembled unit to a vertical surface follow the directions of the red
arrows indicated below .
24
Figure 1-10 Attaching the bracket to the mounting surface
Chapter 2: Installation
Installation Overview
Before installing the Gateway, verify that you have all the items listed in “Package
Contents.” If any items are missing or damaged, contact your local distributor. Also,
be sure you have all the necessary tools and cabling before installing the Gateway.
Package Contents
After unpacking the Gateway, check the contents of the box to be sure that you have
received the following components:
• 1 standard RJ-11 telephone cable (1 m / 3.28 ft)
• Mounting bracket (Optional)
• Warranty Card
Please inform your dealer if there are any incorrect, missing, or damaged parts. If
possible, retain the carton, including the original packing materials in case there is a
need to return the Gateway for repair.
System Requirements
Before you start installing the Gateway, make sure you can provide the right operating
environment. See the following installatio n requirements:
• A PC or Macintosh with a 10/100 Mbps Ethernet adapter card inst alled.
• For Internet access, the computer must be configured for TCP/IP.
• Power requirements: 12 VDC via the included AC power adapter. Make sure that a
properly grounded power outlet is within 1.8m (6ft) of the Gateway.
• The Gateway should be located in a co ol dry place, with at least 5 cm (2 in.) of space
on all sides for ventilation.
• Place the Gateway out of direct sunlight, and away from heat sources or areas with
a high amount of electromagnetic interference. The temperature and humidity
should be within the ranges listed in the specifications.
• Be sure that the Gateway is also accessible for Ethernet and telephone cabling.
25
Installation
Category 5 UTP cable to
Ethernet port on computer
Computer
ACPower Adapter
ACPowerOutlet
RJ-11 Ports
RJ-45 Ports
VDSL Line Wall Jack
Standard Telephone Cable
Telephone, Fax,or Modem
2
Cable Connections
Depending on the wiring configuration used in your house, sep arate wa ll jacks may be
used for telephone and VDSL services. Otherwise, you will need to connect
telephones and your computer directly to the Gateway.
Figure 2-1 Connecting the Gateway
1. Using standard telephone cable, connect the Gateway’s RJ-11 VDSL port to the
RJ-11 telephone wall jack providing the VDSL service.
2. Connect a telephone or fax machine to the RJ-11 port on the Gateway labeled
PHONE.
3. For Ethernet connections, make sure you have installed a 10BASE-T or
100BASE-TX network adapter card in the computers to be connected to the LAN.
4. Prepare straight-through shielded or unshielded twisted-pair cables with RJ-45
plugs at both ends. Use 100-Ohm Category 3, 4, or 5 cable for a 10 Mbp s Etherne t
connection, or Category 5 cable for a 100 Mbps connection.
5. Connect one end of the cable to the RJ-45 port of the network interface card, and
the other end to any of the RJ-45 LAN ports on the Gateway.
When inserting an RJ-45 plug, be sure the tab on the plug clicks into position to
ensure that it is properly seated.
Caution:Do not plug a phone jack connector into any RJ-45 port. Use only
twisted-pair cables with RJ-45 connectors that conform to FCC standards.
Notes: 1. When connecting to any network device (such as a PC, hub or switch), you can
26
use either straight-through or crossover cabling. (Refer to Appendix B: “Cables”
on page 113 for a description of cable types.)
2. Make sure the twisted-pair cable connected to any of the Gateway’s LAN ports
does not exceed 100 meters (328 feet).
Powering On
Powering On
Plug the power adapter cord into the DC 12V power socket on the Gateway, and then
plug the power adapter directly into a power outlet. Check the LED marked PWR on
the top of the unit to be sure it is on. If the PWR indicator does not light up, refer to
Appendix A: “Troubleshooting” on page 111.
If the Gateway is properly configured, it will take about 30 seconds to establish a
connection with the VDSL service provider after powering up. During this time the
VDSL LINK indicator will flash during synchronization. After the VDSL connection has
been established, the VDSL LINK indicator will stay on.
Configuring the TCP/IP Protocols
To connect the Gateway to a computer through its Ethernet port, the computer must
have an Ethernet network adapter card installed, and be configured for the TCP/IP
protocol. Many service providers configure TCP/IP for client computers automatically
using a networking technology known as Dynamic Host Configu ration Protocol
(DHCP). Other service providers may require you to use a specific IP configuration
(known as a static IP address), which must be entered manually.
Carry out the following steps to check that the computer’s Ethernet port is correctly
configured for DHCP.
Windows 95/98/NT
1. Click “Start/Settings/Control Panel.”
2
2. Click the “Network” icon.
3. For Windows NT, click the “Protocols” tab.
4. Select “TCP/IP” from the list of network protocols; this may include details of
adapters installed in your computer.
2. Right-click the “Local Area Connection” icon for the adapter you want to configure.
3. Highlight “Internet Protocol (TCP/IP).”
4. Click on “Properties.”
5. Select the option “Obtain an IP address automatically” and “Obtain DNS server
address automatically.”
Windows Vista
1. Click Start/Control Panel.
2. Double-click “Network and Sharing Center.”
3. Click “View status.”
4. Click “Properties.” If the “User Account Control” window appears, click “Continue.”
5. Highlight “Internet Protocol Version 6 (TCP/IPv6)” or “Internet Protocol Version 4
(TCP/IPv4),” and click “Properties.”
6. Select the option “Obtain an IP address automatically” and “Obtain DNS server
address automatically.”
Mac OS
1. Pull down the Apple Menu . Click “Control Panels” and select “TCP/IP.”
2. In the TCP/IP dialog box, verify that “Ethernet” is selected in the “Connect Via:”
field.
3. If “Using DHCP Server” is already selected in the “Configure” field, your computer
is already configured for DHCP. Otherwise, select “Using DHCP Server” in the
“Configure” field and close the window.
4. Another box will appear asking whether you want to save your TCP/IP settings.
Click “Save.”
5. Your service provider will now be able to automatically assign an IP a ddress to your
computer.
28
Chapter 3: Network Planning
Application Examples
VDSL provides significant savings on network installation, equipment, and service
fees. Internet services operate over existing phon e cabling and a mi nimal amount of
network equipment. The only changes require installing a VDSL CPE (or Gateway
as described in this manual) for each client, and a VDSL switch in the basement or
wiring closet. Internet service can then be provided over a direct Ethernet connectio
from your ISP. For non-commercial environments, you can run the switch through a
broadband router (such as this Gateway) at the customer’s site. This will allow you
to use a single-user account and ISP sharing to significantly reduce network access
charges.
Using VDSL provides Internet connections of up to 100 Mbps downstream and 100
Mbps upstream at 200 meters. Installation is extremely economical for
multiple-tenant dwellings such as apartment buildings, hotels or school dormitories,
as well as commercial buildings.
VDSL provides multiple-user access to the Internet with benefits including:
• Internet services such as e-mail over faster connections than currently possible
with other options such as cable modem or ADSL
• Multimedia applications such as video and virtual gaming made available to the
broader public for the first time
• Access to corporate intranets at speeds close to that available in the office
• Both local network applications and Internet servi ces are supported for commercial
environments
n
Networking Concepts
Route Determination
Depending on the transport protocol used, this device can han dle traffic as a Layer-2
bridge, using only the physical address stored in the p acket’s sou rce and destination
address fields. Or it can forward traffic as a full y functional Layer-3 router, using a
specific route (that is, next hop) for each IP host or subnet that is statically
configured or learned through dynamic routing protocols.
Bridging
When Bridge Mode is selected, the Gateway behaves like a wire di rectly connecti ng
your local network to the ISP. The Gateway simply stores the physical address and
corresponding port number of each incoming packet in an address table. This
information is subsequently used to filter packets whose destination address is on
29
Network Planning
3
the same segment (that is, the local network or remote network) as the source
address.
Routing
When Router Mode is selected, the Gateway forwards incoming IP packets and
uses RIP or RIP-2 for routing path management if enabled. The router sup ports both
static routing and dynamic routing.
• Static routing requires routing information to be stored in the router, either manually
or when a connection is set up, using the default gateway designated by your ISP.
• Dynamic routing uses a routing protocol to exchange routing information,
calculates routing tables, and responds to changes in the status or traffic on the
network.
Dynamic Routing Protocols - This router supports both RIP and RIP-2 dynamic
routing protocols. Routing Information Protocol (RI P) is the most widely used
method for dynamically maintaining routing t ables in small to medium networks. RIP
uses a distance vector-based approach to routing. Routes are chosen to minimize
the distance vector, or hop count, which serves as a rough estimate of transmission
cost. Each router broadcasts an advertisement every 30 seconds, together with any
updates to its routing table. This allows all routers on the net work to build consi stent
tables of next hop links which lead to relevant subnets.
RIP-2 is a compatible upgrade to RIP. However, RIP-2 adds usef ul capabilities for
plain text authentication, multiple independent RIP domains, variable length subnet
masks, and multicast transmissions for route advertising (see RFC 1388).
Note: If the destination route is not found in the routing table, the router simply transmits
the packet to a default router for resolution.
Network Applications
The Gateway can be configured as a bridge for making a transparent connection to
a remote site, or as a router for accessing the Internet. These applic ations are briefly
described in the following sections.
Accessing a Remote Site
The Gateway can be configured to act as a transparent bridge between a local PC
or LAN attached to the Ethernet port s and a remot e si te across th e WAN VDSL link.
Bridging can be used to make two separate networks appear as if they we re part of
the same physical network. When data enters an Ethernet port on the Gateway, its
destination MAC address (physical address) is checked in the address database to
see if it is located in the local segment (that is, attached to one of the Gateway’s
Ethernet ports). If the destination addres s is not found, the fr ame is forwarded to th e
VDSL port and queued for output. If the destination address is found to belong to
one of the local ports, the frame is dropped or “filtered.” However, note that
broadcast or multicast frames are always broadcast across the VDSL link.
30
Network Applications
10/100Mbps Ethernet LAN
ECG9210-04
ECG9210-04
VDSL
10/100Mbps Ethernet LAN
The source MAC address of each frame is recorded into the address database only
if it belongs to the local LAN segment. This information is then used to make
subsequent decisions on frame forwarding. The address database can hold up to
512 unique MAC addresses. An entry in the address dat abase will be discarded only
if it has not been accessed for a period of time called the aging time. This is to
ensure that correct forwarding decisions can still be made when a node is moved to
another port, and to keep the table clean.
Figure 3-1 Transparent Bridged Network
3
Accessing the Internet
To access the Internet, which uses the TCP/IP protocol exclusively, the Gateway
should be configured to function as a router . One side of the connection is formed by
the ports attached to a loc al 10/ 100Mbp s Ethernet LAN (or directly to a h ost PC with
an Ethernet adapter), while the ot her is the Layer 3 transport service running on the
VDSL port. When the Gateway receives an IP packet over the WAN interface, the
destination address is checked in the routing table. If the address is found, the
packet is forwarded to the associated interface/port. Otherwise, the packet is
dropped. When it receives an IP packet over the LAN interface, it also checks the
routing table. If the source and destination address are in the same subnet, no
action is required because the packet can be passed on at Layer 2. If the address is
found to be in a remote subnet, the packet is forwarded to the next hop router.
Otherwise, if not found in the address table, it is sent to the default gateway
designated by the ISP.
The routing table contains information on which networks are accessible through
each interface. It can be dynamically update d using the Routing Inf ormation Protocol
(RIP), or statically configured through the web management interface. If you use
RIP, the router will exchange information with neighboring routers to learn the best
routes to remote networks, and advertise the networks for which it can provide the
best route.
When the system is powered on, the Gateway builds its own routing
according to previous static routing entries, and/or collects
adjacent routers through RIP or RIP-2
supported by all routers, but RIP-2 carries
protocol. RIP (that is, RIP-1) is generally
more information which allows the router to
routing information from
database
31
Network Planning
LocalArea Network
ECG9210-04
VDSL
VDSL
TCP/IP Protocol
PPP/ATM
Internet
ISP
DSLAM
3
make better choices on the most appropriate path to a remote network. However,
RIP-1 is adequate for most networks and involves less overhead.
Figure 3-2 Routed Network
Network Services
DHCP Service
Dynamic Host Configuration Protocol (DHCP) allows network clients to dynamically
obtain TCP/IP configuration information upon bootup. When a DHCP client starts, it
broadcasts a DHCP request. The Gateway can be set up to respond to the client
with configuration information (including, an IP address, subnet mask and default I P
gateway) or to relay the request to another DHCP server.
The Gateway can be configured with an client pool o f up to 254 IP addresse s. These
addresses are leased to the requesting client for a specified amount of time, or until
the device surrenders the address during shut-down. Windows 95, 98, NT, 2000,
and Vista hosts as well as other systems that provide DHCP client services can be
configured with a TCP/IP address provided by this Gateway.
DNS Service
The DNS protocol is used to map host names to IP addresses. The Gateway can
specify a well-known DNS server, or relay service requests directly through to the
ISP for resolution.
NAT Functions
Network Address Translation (NAT) allows you to map multiple IP addresses for
clients from your local Ethernet through to the Internet using a single IP address for
the VDSL port. This allows multiple users to access the Internet using a single-user
account from your ISP.
32
Network Services
3
Virtual Server
Y ou can also map mu ltiple local server s to the Gateway’ s external IP address. In this
way, service requests from Internet users can be redirected to designated servers
on the local network. This allows you to define a single access point for all the
Internet services provided at your site, such as a loc al web server or an FTP serve r.
And then, just by entering the external IP address for your site (provided by your
ISP), Internet users can access the service they need at the local address to which
you redirect them.
NAT allows Internet users through to the services you designate, but because all
your internal IP addresses are private, this provides a natural firewall that prevents
direct access to local resources by hackers. NAT also simplifies address
management because changes to IP addresses for local services will not affect
access for Internet users accessing your site. For example, when you update an IP
address for an Internet server on your local network, Internet users can continue to
access the service via the same external IP address.
User-Definable Application Sensing Tunnel
You can define special applications that require multiple connections such as
Internet gaming, videoconferencing, and Internet telephony. The Gateway can then
sense the application type and open a multi-port TCP/UDP tunnel for it.
DMZ Host Support
DMZ allows a networked computer to be fully exposed to the Internet. This function
is used when the special application sensing tunnel is insufficient to allow an
application to function correctly.
Security
The Gateway supports security features that can deny Internet access to specified
users, or filter all requests for specific services the administrator does not want to
serve. The Gateway’s firewall can also block common hacker attacks, including IP
Spoofing, Land Attack, Ping of Death, IP with zero length, Smurf Attack, UDP port
loopback, Snork Attack, TCP null scan, and TCP SYN flooding.
It also supports the following additional security features:
• Disable Ping from the LAN or WAN side
• Discard port scans from the WAN side
• Filter specific MAC or IP addresses
• Block certain web sites based a specified URL
• Stateful Packet Inspection which accepts only legitimate packets based on
connection type
33
Network Planning
3
Virtual Private Network
The Gateway supports three of the most commonly used VPN protocols – PPTP,
L2TP and IPSec. These protocols allow remote users to establish a secure
connection to their corporate network. If your service provider supports VPNs, then
any of these protocols can be used to create an authenticated and encrypte d tunnel
for passing secure data over the Internet (i.e., a traditionally shared data network).
The VPN protocols supported by the Gateway are briefly described below.
Point-to-Point Tunneling Protocol – Provides a secure tunnel for remote client
access to a PPTP security gateway. PPTP includes provisions for call origination
and flow control required by ISPs.
Layer Two Tunneling Protocol – L2TP includes most of the features provided by
PPTP, but has less overhead and is more suited for managed networks.
IP Security – Provides IP network-layer encryption. IPSec can support large
encryption networks (such as the Internet) by using digital certificates for device
authentication.
34
Chapter 4: Initial Configuration
Accessing the Setup Wizard
The Gateway provides a Setup Wizard for initial configurat i on of the uni t’s operating
mode (Bridge or Router as described in “Networking Concepts” on pag e 29) and
WAN IP address (when Router mode is selected).
For initial configuration, connect a PC directly to one of the LAN port s on the back o f
the unit, and use a web browser (such as Internet Explorer 6.0 or above, or Mozilla
Firefox 2.0.0.0 or above) to connect to the Gateway.
The Gateway has a default IP address of 192.168.2.1 and a subnet mask of
255.255.255.0. If your PC is set to “Obtain an IP address aut omatically” (that is, set
as a DHCP client), you can connect immediately to the web interface. Otherwise,
you must set your PC IP address to be on the same subnet as the Gateway (t hat is,
the PC and Gateway addresses must both start with 192.168.2.x).
To access the Setup Wizard, follow these steps:
1. Use your web browser to connect to the management interface using the default
IP address of 192.168.2.1.
2. Log into the Gateway’s management interface by entering the default user name
and password both as “admin,” and then click OK.
Figure 4-1 Login Dialog Box
35
Initial Configuration
4
3. Click WIZARD when the home page appears.
Figure 4-2 Home Page
Using the Setup Wizard
There are only a few basic steps you need to set up the Gateway, and to configure
an IP address for the WAN interface (when operating in Router mode).
The Setup Wizard takes you through the configuration procedures shown below:
1. Select the Operating Mode – By default, the Gateway is set to operate in Bridge
mode, and requires no other features to be set before using the Advanced Setup
menu. If you plan on using the Gateway in Bridge mode, just click Next and skip
to Step 4. Otherwise, select Router mode, and click Next.
Figure 4-3 Mode Selection (Bridge Mode)
36
Using the Setup Wizard
If Router mode is selected the information displayed on the screen changes to
that shown below.
Figure 4-4 Mode Selection (Router Mod e)
2. Set the WAN Connection Type – By default, the Gateway’s WAN port is
configured for dynamic IP assignment using DHCP. Select the option indicated by
your Internet service provider, and click Next.
4
Figure 4-5 WAN Type
• Dynamic IP – If you selected Dynamic IP, the following screen will appear.
Click Next to confirm your selection.
Figure 4-6 WAN Setting (Dynamic IP)
37
Initial Configuration
4
• Static IP – If you selected Static-IP, the following screen will appear. Fill in the
required settings, and then click Next.
Figure 4-7 WAN Setting (Static IP)
Field Attributes
• IP address assigned by your ISP – IP address of the WAN interface. Valid
addresses consist of four decimal numbers, 0 to 255, separated by periods.
• Subnet Mask – This mask identifies the subnet and host portion of the IP
address.
• Default Address – The IP address of the gateway router which is used if the
requested destination address is not on the local subnet, nor in any of the
routing tables.
• Primary DNS – The IP address of the Primary Domain Name Server on the
network. A DNS maps numerical IP addresses to domain names which can
be used to identify network hosts by familiar names instead of the IP
addresses.
• Secondary DNS – The secondary domain name server.
38
Using the Setup Wizard
• PPPoE – If you selected PPPoE, the following screen will appear. Fill in the
required settings, and then click Next.
Figure 4-8 WAN Setting (PPPoE)
Field Attributes
• User Name – Sets the PPPoE user name. (Range: 1-32 characters)
• Password – Sets a PPPoE password. (Range: 1-32 characters)
• Password Confirm – Prompts you to re-enter your password.
• Service Name – The service name assigned for the PPPoE connection. The
service name is normally optional, but may be required by some service
providers. (Range: 1-32 characters)
• Access Concentrator Name – The name of the access concentrator to use
in PPPoE Active Discovery Offers (PADO). (Range: 1-32 characters)
• MTU (1400-1492) – Sets the maximum packet size that the WAN port may
transmit. The Maximum Transmission Unit is e xpressed in bytes. By defaul t,
the Gateway will send several test messages to determine the MTU for the
upstream connection. (Range: 1400-1492 bytes)
• Idle Time (0-99) – The maximum length of inactive time the unit will stay
connected to the service provider before disconnecting. Select
“Auto-reconnect” to reconnect to the upstream gateway whenever an
Internet access request is made. (Range: 1-99 minutes; Default: 2 minutes)
4
39
Initial Configuration
4
3. Enable Local DHCP Service – By default, the Gateway’s is configured to
provide DHCP service to any client attached to the Gateway’s LAN ports. Set the
administrative status of this feature, and click Next.
Figure 4-9 DHCP Setting
4. Set Wireless Settings – The wireless radio on the Gateway is disabled by
default. To enable it check the WLAN Enable box. The access point’s ESSID is
automatically set, but may be changed by altering this field. Click Next to cont inue
with the wireless setup.
Figure 4-10 WLAN Setting
Field Attributes
• WLAN – Enables the wireless radio interface.
• ESSID – The name of the wireless network service provided by the VAP.
Clients that want to connect to the net work must set their SSID to t he same
as that of the VAP interface. (Default: ECG9210-04_AP-0; Range: 1-32
characters)
40
Using the Setup Wizard
5. Setting WLAN Security (WEP) – Sets the wireless security encryption key for
the wireless network.
Figure 4-11 WLAN Security - WEP
Field Attributes
• None – Disables security on the access point. (Default: Disabled)
• WEP – WEP is used as the multicast encryption cipher.
• Authentication Mode – Defines the mode with which the access point will
associate with other clients.
• Key Mode – Select 64 Bit, or 128 Bit length. Note that the same size of
encryption key must be supported on all wireless clients.
(Default: 64 Bit)
• Active Key – Selects the key number to use for encryption for the VAP
interface. If the clients have all four keys c onfigured to the sa me values, you
can change the encryption key to any of the eight sett ings witho ut hav ing to
update the client keys. (Default: Key 1)
4
41
Initial Configuration
4
Setting WLAN Security (WPA) – Sets the WPA/WPA2 PSK wireless security
encryption key for the wireless network.
Figure 4-12 WLAN Security - WPA
Field Attributes
• TKIP/AFS – TKIP/AES is used as the multicast encryption cipher.
• AES – AES is used as the multicast encryption cipher. AES-CCMP is the
standard encryption cipher required for WPA2.
6. Click Next followed by Apply on the next srceen to save your settings. The unit
will save your settings and restart. Note that your configuration changes are not
saved until the Setup Wizard is completed and the system rest arted.
42
Figure 4-13 Saving Your Settings
Using the Setup Wizard
7. When the system restarts, a countdown window displays for about 60 seconds.
Figure 4-14 Reboot
4
43
Initial Configuration
4
44
Chapter 5:
System Configuration
Using the Web Interface
The Gateway provides a web-based management interface for configuring device
features and viewing statistics to monitor network activi ty. This interf ace can be
accessed by any computer on the network using a standard web browser (such as
Internet Explorer 6.0 or above, or Mozilla Firefox 2.0.0.0 or above).
Note:
You can also use the Command Line Interface (CLI) to manage the Gateway over
a serial connection to the console port or via Telnet or SSH.
To make an initial connection to the management interface, connect a PC to one of
the Gateway’s LAN ports. Then either set it to “Obtain an IP address automatically”
(DHCP service is enabled by default on the Gateway) or configure it with a static
address within the same subnet as that used by the Gateway (that is, 192.168.2.x
with the subnet mask 255.255.255.0).
To access the configuration menu, follow these steps:
1.Use your web browser to connect to the management interface using the
default IP address of 192.168.2.1.
2.Log into the Gateway’s management interface by entering “admin” as both the
default user name and password.
Note:
It is strongly recommended to change the default password the first time you
access the web interface. For information on changing the password, see “Admin
Settings” on page 57.
45
System Configuration
5
Home Page
When your web browser connects with the Gateway’s web agent, the home page is
displayed as shown below . For initial configuration, you can use th e Setup Wizard as
described in the preceding chapter. To carry out more detailed configuration tasks,
use the Advanced Setup Menu, as described in this chapter.
46
Figure 5-1 Home Page
Using the Web Interface
Click “START WITH ADVANCED SETUP” to open the Advanced Settings menu as
shown below. By default, the Gatewa y is set to Bri dge Mode. (For a brief descrip tion
of Bridge Mode and Router Mode, see “Route Determination” on page 29.)
Figure 5-2 Initial Page for Advanced Settings (Router Mode)
5
Advanced Settings Menu
The Advanced Settings pages display the main menu on the left side of the screen
and sub-menu tabs at the top of screen. The main menu links are used to navigate
between key functional categories, while the sub-menus list related topics within
each of these categories. The sub-menus display configuration parameters, fixed
system information, or network statistics.
The information in this chapter is organized to reflect the structure of the web
management screens for easy reference.
The configuration pages include the options liste d in the table below. For details on
configuring each feature, refer to the corresponding page number.
Note:
The displayed pages and settings may differ depending on whether the unit is in
Bridge Mode or Router Mode.
Table 5-1 Advanced Settings Menu
MenuDescriptionMode Page
STATUSSystem information, access logs, and DHCP client list Both50
InformationShows firmware/hardware and VDSL code versions, as
well as the unit’s serial number
Both50
47
System Configuration
5
Table 5-1 Advanced Settings Menu (Continued)
MenuDescriptionMode Page
WANShows configuration status (DHCP or static), IP
LANShows IP address, subnet mask, and local DHCP
LogDisplays a log of all network access and service activity Both53
DHCPDisplays addresses currently bound to DHCP clients Router 54
SYSTEMBasic administrative settingsBoth54
ModeSets the device to operate as s bridge or routerBoth54
TimeConfigures NTP settings, including time zone, server,
AdminConfigures access password, and IP address(es)
ToolsIncludes management tools for pinging another device,
UPnPEnables UPnP auto-discovery mechanismRouter 59
ServicesEnables TFTP, Telnet, and Secure Shell accessRouter 60
SNMPConfigures SNMP settings.Both61
DNSDynamic Name ServerBoth69
WANWide Area NetworkRouter 69
WAN TypeConfigures virtual WAN portsBoth64
WAN SettingsConfigures address configuration options for DHCP,
DDNSConfigures dynamic DNS services for DynDNS and
LANLocal Area Network Both69
LAN TypeConfigures VLANsBoth69
LAN SettingsConfigures IP settings for the LAN, including IP
Switch PortsConfigures port connection parameters, including
ROUTERoute ConfigurationRouter 69
Static RoutingConfigures and displays static routing entriesRouter 73
Dynamic RoutingConfigures dynamic route learning from LAN and WAN
Policy RoutingConfigures IP policy routing Router 76
WirelessWireless ConfigurationBoth77
address, subnet mask, DNS servers, gateway address,
and WAN link status
server status
and refresh time
authorized for remote access over the WAN link
updating firmware, restoring factory defaults, and
rebooting the unit
static assignment or PPPoE
TZO servers
address, DHCP server, and DNS assignment
speed and duplex mode
interfaces
Router 51
Router 52
Router 57
Both57
Both58
Router 64
Router 69
Both69
Both72
Router 74
48
Using the Web Interface
Table 5-1 Advanced Settings Menu (Continued)
MenuDescriptionMode Page
WirelessConfigures wireless AP settingsBoth79
Client ListList of all wireless clients currently associated with the APBoth85
NATNetwork Address TranslationRouter 86
Virtual ServerMaps public to private service addresses Router 86
Port MappingMaps one or more service ports to a local serverRouter 87
DMZAllows a specified host on the local network to access
FIREWALLFirewall ConfigurationBoth90
Firewall SettingsEnables or disables the firewall, and sets default policy
IP FilteringFilters IP addresses of clients accessing the InternetBoth91
ALGEnables or disables customized N AT travers al filters for
Remote ControlConfigures remote management access of the WAN
VDSLVDSL ConfigurationBoth95
Rate InformationDisplays general VDSL status information for the VDSL
Performance CountersDisplays performance information including common
SNRDisplays counters for sound-to-noise ratio
IGMPInternet Group Management ProtocolBoth101
IGMPConfigures IGMP Proxy, IGMP Snooping, Fast Leave Both102
QoSQuality of ServiceBoth104
QoS SettingsEnables or disables QoS, sets the upstream rate limit,
Traffic ClassificationConfigures diffServ priorities based on protocol type,
ACSAuto-configuration server (TR-069 and TR-098)Router 108
TR SettingsConfigures parameters for establishing connection
the Internet without any firewall protection
for addresses not found in the MAC or IP filtering list
SIP, H323, IRC, PPTP, SNMP, TFTP, and IPSEC.
port.
line, BME and specific ports; also displays current rate
for various stream types
error conditions for the VDSL line
measurements
and the queuing mode
source and destination addresses, and TCP/UDP port
between Gateway and auto-configuration server
Router 89
Both90
Router 92
Both93
Both95
Both98
Both99
Both104
Router 105
Router 108
5
49
System Configuration
5
Status Information
The Status pages display details on the current configuration and status of the
Gateway, network access logs, and DHCP client lists.
Note:
The Status Information pages display different statistics depending on the mode
selected – Bridge or Router. Refer to “Networking Concepts” on page 3-29 for a
general description about these operating modes. Refer to “System Mode” on
page 5-54 for information on setting the operation mode.
System Information
The System Information page displays firmware/h ardware and VDSL code versions,
the physical address of the LAN and W AN interfaces, and the unit’s serial number.
Click Status, System Info.
Figure 5-3 System Information
Field Attributes
• Connected Clients – The number of DHCP clients serviced by the Gateway.
• Runtime Code Version – Version number of operation code.
• LAN MAC Address – The physical layer address for the LAN interface.
• WAN MAC Address – The physical layer address for the WAN interface.
• Hardware Version – Hardware version of the main board.
• VDSL Version – VDSL firmware version.
• Serial Number – Serial number of the main board.
• Product ID – The product identification number.
50
Status Information
• Company Name – The name of the manufacturer.
• Postal Address – The postal address of the manufacturer.
• Phone Number – The phone number of the manufacturer.
• Fax Number(option) – The facsimile number of the manufacturer.
• Support E-mail Address – The support email address.
WAN Status
This page shows the administrative status, the IP address configuration mode
(DHCP, static assignment, or PPPoE), the IP address, subnet mask, DNS servers,
gateway address, and WAN link status.
Click Status, WAN Status.
5
Figure 5-4 WAN Status
Field Attributes
• Mode – The administrative status of the WAN interface (on or off) , the IP ad dress
configuration mode (DHCP, Static IP, or Pope).
• TX packets – The total number of transmitted pack ets sen t by t he uni t sinc e boot
up.
• TX bytes – The total number of transmitted bytes sent by the unit since boot up.
• RX packets – The total number of packets received by the unit since connection
to a network.
• RX bytes – The total number of bytes received by the unit since connection to a
network.
51
System Configuration
5
Bridge WAN Status
This page shows the administrative status of the bridge WAN port.
Click Status, Bridge WAN Status.
Figure 5-5 Bridge WAN Status
Field Attributes
• Mode – The administrative status of the bridge WAN port.
• TX packets – The total number of transmitted pack ets sen t by t he uni t sin ce b oot
up.
• TX bytes – The total number of transmitted bytes sent by the unit since boot up.
• RX packets – The total number of packets received by the unit since connection
to a network.
• RX bytes – The total number of bytes received by the unit since connection to a
network.
LAN Status
This page shows the IP address, subnet mask, and local DHCP server st atus.
Click Status, LAN Status.
Figure 5-6 LAN Status
Field Attributes
• IP Address – IP address of the LAN interface.
52
Status Information
• Subnet Mask – This mask identifies the subnet and host portion of the IP addres s.
• DHCP Server – Shows if the Gateway’s DHCP server is enabled or disabled.
5
System Log
This page displays a log of all network acc ess requests by cl ient devices and servic e
responses sent from the Gateway.
Click Status, System Log.
Figure 5-7 System Log
Field Attributes
• Log Entry – Shows the date, time, process, and description.
• Download – Downloads the log table as an raw text file. In Windows, this is
downloaded to Notepad.
• Clear – Flushes the log table.
• Auto Refresh – Automatically updates the log table every 5 seconds.
DHCP Client List
This page displays the addresses currently bound to DHCP clients.
Click Status, DHCP Client List.
Figure 5-8 DHCP Client List
Field Attributes
• LAN Client List – The list of assigned addresses for the listed LAN.
53
System Configuration
5
• Count Down – The time after which the connection will expire and the DHCP client
must request a new IP address.
• MAC Address – The MAC address of the DHCP client.
• IP Address – The IP address assigned to the DHCP client.
• Host – The host name of the DHCP client.
System Configuration
The System pages are used to configure basic administra tive setti ngs, in cludin g the
operating mode (bridge or router), NTP server selection, management access
control through a password or specified host address, firmware upgrade, UPnP
auto-discovery, and management through TFTP, Telnet or Secure Shell.
System Mode
This page sets the Gateway to operate as s bridge or router. Refer to “Networking
Concepts” on page 3-29 for a general description about these operating modes.
Click System, System Mode. Select the required operating mode, and click Apply.
54
Figure 5-9 System Mode - Bridge
Figure 5-10 System Mode - Router
System Configuration
5
Figure 5-11 System Mode - Router - DHCP Enabled
Field Attributes
• Bridge – Sets the Gateway to function as a Layer-2 bridge, using only the physical
address stored in the packet’s source and destinat ion address fields to pass traffic.
• Router – Sets the Gateway to function as a Layer-3 router, using a specific route
(that is, next hop) for each IP host or subnet that is stati cally configured o r learned
through dynamic routing protocols.
The Gateway must reboot after each mode change. It takes about 60 seconds for
the router to reboot and start forwarding traffi c on the LAN and WAN interfaces.
Also note that the menus provided by the Gateway differ for the bridge and router
operating modes as noted in Table 5-1, “Advanced Settings Menu,” on page 47.
• VLAN Enable – Enables VLANs. (Router mode only)
• Enable PPPOE Pass Through – Enables PPPoE Pass Through
55
System Configuration
5
• Enable Broadcast Pass Through – Enables Broadcast Pass Through.
• VID – Specifies the VLAN ID.
• 802.1p – Specifies quality of service level.
• Enable DHCP Option –
• Option 60 – Option 60 allows a DHCP server to differentiate between the two kinds
of client machines and process the requests from the two types of modems
appropriately. The DHCP server and client send a vendor class option that
contains an ASCII-encoded string with three parts delimited by a / character. The
first part is AAPLBSDPC, which advertises BSDP capability. The s econd part is the
client's architecture ("ppc" or "i386"). The third part is a system identifier.
• Option 61 – Specifies the client MAC address.
System Time
This page configures the local time zone, and Network Time Protocol (NTP) settings,
including the NTP server to use and the refresh time.
Click System, System Time. Set the time zone, enable NTP servi ce, specif y an NTP
server, set the time at which to refresh date and time information, and click Apply.
Figure 5-12 System Time
Field Attributes
• Time – The current date and time configured on the Gateway.
• Set Time Zone – Sets the time zone as an offset from Greenwich Mean Time
(GMT).
• NTP – Enables or disables client requests for NTP service.
• NTP Server 1/2 – The URL or IP address of the NTP server to use.
• Refresh Interval – Specifies the interval at wh ich t he Gate way will request a t ime
update from the NTP server.
56
System Configuration
5
Admin Settings
The Administrative Settings page allows you to configure the management access
password, and IP address(es) authorized for remote management access over the WAN
link.
To protect access to the management interface, you need to configure a new
password as soon as possible. If a new password is not configured, then anyone
having access to the Gateway may be able to compromise the unit's security by
entering the default password.
Management access to the Gateway through the W AN port is enabled by def ault. To
prevent access by unauthorized hosts, enter the IP address for one or more known
hosts. Once any entry is added to the Remote Management Client List , access
attempts from any other host will be blocked.
Click System, Admin Settings. Set a new password, spe cify host st at ions authori zed
for remote management access, and click Apply.
Figure 5-13 Admin Settings
Field Attributes
• Current Password – The password for management access. (Default: admin;
Length: 3-16 characters, case sensitive)
• New Password – Prompts you to enter a new password for access.
• Confirm Password – Re-enter the new password.
57
System Configuration
5
System Tools
This page provides facilities for pinging another device, updating firmware, restoring
factory defaults, and rebooting the unit.
Click System, System Tools. Follow the instructions shown on the web page to
perform any of the listed tasks.
Figure 5-14 System Tools
Field Attributes
• Firmware Update – Allows you to download new firmware by selecting a file stored
on your management station.
• Restore Factory Default – Restores the factory defaults.
• Reboot Gateway – Click the Reboot button to restart the Gateway. When
prompted, confirm that you want reset the Gateway. A time r will display the amount
time remaining in the boot up process.
• Ping – Performs a loopback test on a specified IP address.
58
System Configuration
5
UPnP
This page is used to enable or disable the UPnP auto-discovery mechanism.
Universal Plug and Play (UPnP) is a set of protocols that allows devices to connect
seamlessly and simplifies the deployment of home and office networks. UPnP
achieves this by using UPnP device control protocols designed upon open,
Internet-based communication standards.
Note that only devices within the same broadcast domain can be discovere d through
UPnP. When the Gateway is discovered by another device, a brief description o f the
Gateway can be viewed, and the management interface can be accessed by
clicking on the Gateway icon.
For example, to access or manage the Gateway with the aid of UPnP under
Windows Vista, open the Network and Sharing Center, and enable Network
Discovery. Then click on the node representing your local network under the
Network Sharing Center. An entry for the Gateway will appear in the list of
discovered devices. Right click on the entry for the Gateway, and sel ect “View
Device webpage” to access the Gateway’s web management interface, or select
“Properties” to display a list of device attributes advertised by the Gateway through
UPnP.
Figure 5-15 UPnP
• EnablePing – Enables UPnP on the unit.
• Port Number – Specifies a port number for SOAP traffic.
• NAT-PMP – Enables/disables NAT Port Mapping Protocol.
• BitRate-UpStream – Specifies the upload speed of your connection. (Default: 1
Mbps; Options: 1 Mbps, 10 Mbps, 100 Mbps)
• BitRate-DownStream – Specifies the download speed of your connection.
This page allows you to enable or disable TFTP, Telnet, and Secure Shell access. Note
that these functions are only used for the command line interface, not the web interface.
Click System, Service Settings. Enable or disable the required service, and click
Apply.
Figure 5-16 Service Settings
Field Attributes
• tftpd – Trivial File Transfer Protocol used to download firmware to the Gateway.
• telnetd – Replicates the serial port’s command line interface via Telnet.
• sshd – Replicates the serial port’s command line interfa ce over a secure interface.
When the client contacts the Gateway via the SSH protocol, the Gateway
generates a public-key that the client uses along with a local user name and
password for access authentication. SSH also encrypts all data transfers passing
between the Gateway and SSH-enabled management stations, and ensures that
data traveling over the network arrives unaltered.
• Port – The UDP port number to use for these services. (Range: 0-65535)
60
System Configuration
5
SNMP
Simple Network Management Protocol (SNMP) is a communication protocol
designed specifically for managing devices on a network. Equipmen t commonly
managed with SNMP includes switches, routers and host computers. SNMP is
typically used to configure these devices for proper operation in a network
environment, as well as to monitor them to evaluate performance or detect poten tial
problems.
Managed devices supporting SNMP contain software, which runs locally on the
device and is referred to as an agent. A defined set of variables, known as managed
objects, is maintained by the SNMP agent and used to manage the device. These
objects are defined in a Management Information Base (MIB) that provides a
standard presentation of the information controlled by the agent. SNMP def ines both
the format of the MIB specifications and the protocol used to access this inf ormation
over the network.
The access point includes an onboard agent that supports SNMP versions 1, 2c,
and 3 clients. This agent continuously monito rs the status of the access point, as
well as the traffic passing to and from wireless clients. A network management
station can access this information using SNMP management software that is
compliant with MIB II. To implement SNMP management, the access point must first
have an IP address and subnet mask, configured either manually or dynamically.
Access to the onboard agent using SNMP v1 and v2c is controlled by community
strings. To communicate with the access point, the management station must first
submit a valid community string for authentication.
Access to the access point using SNMP v3 provides additional se curity features that
cover message integrity, authentication, and encryption; as well as controlling
notifications that are sent to specified user targets.
61
System Configuration
5
Figure 5-17 SNMP
• SNMP – Enables or disables SNMP management access and also enables the
access point to send SNMP traps (notifications). (Default: Disable)
• Contact – A text string that describes the system contact. (Maximum length: 255
characters)
• Location – A text string that describes the system location. (Maximum length: 255
characters)
• Trap IP – The IP address of the SNMP server.
• ROCommunity – Defines the SNMP community access string th at has rea d-only
access. Authorized management stations are only able to retrieve MIB objects.
(Maximum length: 23 characters, case sensitive; Default: public)
• WOCommunity1/2 – Defines the SNMP community access string that has write
only access. (Maximum length: 23 characters, case sensitive)
62
System Configuration
5
DNS
The Domain Name System (DNS) distributes the responsibility of assigning doma in
names and mapping those names to IP addresses by designating authoritative
name servers for each domain. Authoritative name servers are assigned to be
responsible for their particular domains, and in turn can assign other authoritative
name servers for their sub-domains.
Figure 5-18 DNS
• Primary and Secondary DNS Addr ess – The IP address of Domain Name
Servers on the network. A DNS maps numerical IP addresses to domain names
and can be used to identify network hosts by familiar names instead of the IP
addresses.
If you have one or more DNS servers located on the local network, type the IP
addresses in the text fields provided. Otherwise, le ave the ad dresse s as al l z eros
(0.0.0.0).
Management IP
The Management IP page configures the IP address through which the unit can be
managed using a web-browser.
Figure 5-19 Management IP
• Management IP Address – The IP address through which the unit can be
managed.
• Management Netmask – Specifies the subnet mask for network traffic.
• Management Gateway – Specifies the gateway address for routing to the unit.
63
System Configuration
5
WAN Configuration
The WAN pages are used to configure the address assignmen t method for the W AN
interface, and to configure dynamic DNS service.
WAN Type
The WAN Type page allows the user to create multiple WANs by VLAN.
Figure 5-20 WAN Type
• No Tag – Specifies no VLAN tag.
• VID – The VLAN ID.
• NAT – Enables/disables NAT on the specified VLAN.
• Add – Applies the settings and creates the WAN.
64
WAN Configuration
5
WAN Settings
This page configures address assignment options for the WAN interface, using DHCP, a
static address, or PPPoE. The WAN interface should connect directly to a Layer 3 device
at your service provider’s central office or to another gateway device at your office. You
therefore need to use the method and parameter settings given to you by your service
provider or network administrator.
Dynamic IP Address
Click WAN, WAN Settings. Be sure the WAN interface is enabled. Then select
Dynamic IP Address mode, fill in the appropriate string for the DHCP options as
required, and click Apply.
Figure 5-21 WAN Settings (DHCP)
Field Attributes
• Mode – Select Dynamic IP Address to obtain a address from an upstream DHCP
server.
• Class Identifier (Option 60) – Vendor Class Identifier is used identify the vendor
class and configuration of the Gateway to the DHCP server, which then uses this
information to decide on how to service the client or the type of information to
return.
• Client Identifier (Option 61) – Client Identifier i s a unique identifier for the Gateway
which is sent to the DHCP server. DHCP servers use this value to index their
database of address bindings. This value must therefore be unique for all cli ents in
an administrative domain.
• ENumber (Option 125) – Vendor Idenifying Vendor-Specific Information tag
specified in the form of of a string of numerals xx xx xx xx.
65
System Configuration
5
The general framework for these DHCP options are set out in RFC 2132, but the
specific string to use should be supplied by your service provider or network
administrator.
Static IP Address
Click WAN, W AN Settings. Be sure the W AN int erface is enable d. Then select Static
IP Address mode, fill in the appropriate settings as required, and click Apply.
Figure 5-22 WAN Settings (Static)
Field Attributes
• Mode – Select Static IP Address to manually set an addre ss for the Gateway.
• IP – IP address of the WAN interface.
• Netmask – This mask identifies the subnet and host portion of the IP address.
• Default Gateway – The IP address of the gateway router which is used if the
requested destination address is not on the local subnet, nor in any of the routing
tables.
66
WAN Configuration
PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) emulates a dial-up connection. It
allows an ISP to use existing network configuration settings to implement VDSL
service without significant changes.
Click WAN, WAN Settings. Be sure the WAN interface is enabled. Then select
PPPoE mode, fill in the appropriate settings as required, and click Apply.
5
Figure 5-23 WAN Settings (PPPoE)
Field Attributes
• Mode – Select PPPoE to obtain a address using this protocol.
• User Name – Sets the PPPoE user name. (Range: 1-32 characters)
• Password – Sets a PPPoE password. (Range: 1-32 characters)
• Service Name – The service name assigned for the PPPoE connection. The
service name is normally optional, but may be requ ired by some service providers.
(Range: 1-32 alphanumeric characters)
• Confirm Password – Re-enter your new password.
• AC Name – The name of the access concentrator to use in PPPoE Active
Discovery Offers (PADO).
• MTU (1400-1492) – Sets the maximum packet size that the WAN port may
transmit. The Maximum Transmission Unit is expressed in by tes. By default, the
Gateway will send several test messages to determine the MTU for the upstream
connection. (Range: 1400-1492 bytes)
• Idle Time (0-99) – The maximum length of inactive time the unit will stay connected
to the service provider before disconnecting. Select “Auto-reconnect” to reconnect
67
System Configuration
5
to the upstream gateway whenever an Internet access request is made.
(Range: 1-99 minutes; Default: 2 minutes)
DDNS
The DDNS Settings page is used to configure dynamic DNS services for DynDNS and
TZO servers.
specific host name to their computer’s dynamically assigned IP address. DDNS
allows your host name to follow your IP address automatically by changing your
DNS records when your IP address changes. To set up an DDNS account, visit the
web sites of these service providers at www.dyndns.org or www.tzo.com.
Click WAN, DDNS. Enable DDNS, set the timeout, enter the client information
provided by your DDNS service provider, and click Apply.
DDNS provides clients accessing the Internet with a method to tie a
Figure 5-24 DDNS Settings
Field Attributes
• Status – Enables DDNS. (Default: Disabled)
• Interface – Selects the WAN interface.
• Timeout – The maximum time between updates.
• Connection – Shows if a connection has been established with the DDNS server.
• DDNS Server – The DDNS service provider, DynDNS or TZO.
• Host Name – The prefix to identify your presence on the DDNS server.
• User Name/Account – Your user name for DDNS service.
Password/Key – Your password for DDNS service.
68
LAN Configuration
5
LAN Configuration
The LAN pages are used to configure an IP address for management access
through the LAN interface, configure the local DHCP server, and DNS service.
These pages are also used to configure port connection parameters, including
speed and duplex mode.
LAN Type
LAN Type settings ena ble VLANs on the unit s four LAN po rts. You may configure up
to four VLANs in total.
Figure 5-25 LAN Type
Field Attributes
• VLAN – Enables or disables VLANs. (Default: Disabled)
• VLAN Type – Selects port-based VLANs by default.
• Port 1~4 – Selects a physical port to apply a VLAN tag to.
• VID – Specifies a VLAN ID. (Range: 0-4095)
• 802.1p – Specifies quality of service level.
• Add – Adds the VLAN to the physical port.
69
System Configuration
5
LAN Settings
This page is used to configure IP settings for the LAN, including an IP address for
management access, a local DHCP server, and DNS service.
Click LAN, LAN Settings. Enable the LAN interface, set an IP address for
management access from the LAN side, configure the DHCP server and DNS
service, then click Apply.
Figure 5-26 LAN Settings
70
Figure 5-27 LAN Settings (DHCP Enabled)
LAN Configuration
Figure 5-28 LAN Settings (DHCP Relay)
Field Attributes
• IP Address – IP address used for management access from the LAN side.
• Netmask – This mask identifies the subnet and host portion of the IP address.
The following attributes on l y a pp l y to R ou t er m o de :
• DHCP Server – Enables or disables the local DHCP server.
• Domain – DNS suffix appended to unqualified names that are used by this client.
• Class ID – Vendor Class Identifier (Option 60) is used identify the vendor class and
configuration of the client to the DHCP server, which then uses this information to
decide on how to service the client or the type of information to return.
• Client ID – Client Identifier (Option 61) is a unique identifier for the client which is
sent to the DHCP server. DHCP servers use this value to index their database of
address bindings. This value must therefore be unique for all clients in an
administrative domain.
• Option 125 – Vendor Idenifying Vendor-Specific Information tag specified in the
form of of a string of numerals xx xx xx xx.
• IP Pool Starting Address – The initial IP address in a range that the DHCP server
allocates to DHCP clients. Note that the address pool ran ge is always in the same
subnet as the Gateway’s IP address. The maximum clients that the unit can
support is 253.
• IP Pool Ending Address – The ending IP address in a range that the DHCP server
allocates to DHCP clients.
• Lease Time – The amount of time an IP address is l eased to the requesting cl ient.
When the time limit expires, the client has to request a new IP address.
• Assign DNS – Specifies whether to use the DNS servers assigned by the DHCP
server, or to manually specify the DNS servers.
• Primary DNS Address – The first server to query for domain name resolution.
5
71
System Configuration
5
• Secondary DNS Address – The backup DNS server.
Switch Ports
This page is used to configure port connection parameters, including speed and
duplex mode.
Click LAN, Switch Ports. Set the required connection parameters for any port, and
click Apply.
Figure 5-29 Switch Ports
Field Attributes
• Port – The four ports on the LAN interface.
• Mode – The connection mode for a port.
- auto – Uses auto-negotiation to obtain the optimal settings.
- 100full - Forces 100 Mbps full-duplex operation
- 100half - Forces 100 Mbps half-duplex operation
- 10full - Forces 10 Mbps full-duplex operation
- 10half - Forces 10 Mbps half-duplex operation
- off – Disables this port.
72
Route Configuration
5
Route Configuration
The ROUTE pages are used to configure either static rout ing entries, or to enable or
disable dynamic routing, or to enable policy routi ng o n the LAN and WAN interfaces.
Static Routing
The Gateway can dynamically configure routes to other network segments using
RIP. However, static routes can also be manually entered in the routing table. Static
routes may be required to access network segments where dynamic routing is not
supported, or can be set to force the use of a specific route to a subnet, rather than
using dynamic routing. Static routes do not automatically change in response to
changes in network topology, so only configure a small number of stable routes to
ensure network accessibility.
Click ROUTE, Static Routing. Enable the static route table, enter the destination
network, the network mask, the gateway device, and click Apply.
Figure 5-30 Static Routing
Field Attributes
• Route – Enables the static routing table.
• Destination Net – IP address of the destination network, subnetwork, or host.
• Netmask – Network mask for the associated IP subnet. This mask identifies the
host address bits used for routing to specific subnets.
• Gateway – IP address of the next router hop used for this route.
73
System Configuration
5
Dynamic Routing
The Gateway supports RIP (also referred to as RIP-1) and RIP-2 dynamic routing
protocols. Routing Information Protocol (RIP) is the most widely used method for
dynamically maintaining routing tables. RIP uses a distance vector-based approach
to routing. Routes are chosen to minimize the distance vector, or hop count, which
serves as a rough estimate of transmission cost. Each router broadcasts its
advertisement every 30 seconds, together with any update s to it s ro uting tabl e. Thi s
allows all routers on the network to build consistent tables of next hop links which
lead to relevant subnets.
RIP can utilize any of the following methods to prevent loops from occurring:
• Split horizon – Never propagate routes back to an interface port from which they
have been acquired.
• Poison reverse – Propagate routes back to a n interface port from which they have
been acquired, but set the distance-vector metrics to infinity. (This provides faster
convergence.)
•
Triggered updates – Whenever a route gets changed, broadcast an update message
after waiting for a short random delay, but without waiting for the periodic cycle.
RIP-2 is a compatible upgrade to RIP-1. RIP-2 adds useful capabilities for plain text
authentication, multiple independent RIP domains, v ariable length subnet masks,
and multicast transmissions for route advertising (RFC 1723).
There are several serious problems with RIP that should be considered. First of all,
RIP-1 has no knowledge of subnets, both RIP versions can take a long time to
converge on a new route after the failure o f a l ink or router duri ng wh ich t ime routing
loops may occur, and its small hop count limitation of 15 restricts its use to smaller
networks. Moreover, RIP-1 wast es valuable network bandwidth by propagating
routing information through broadcasts; it also considers too few network variables
to make the best routing decision.
If the local network connected to the LAN interface does not include any routers,
then it is not necessary to configure either st atic or d ynamic routing for t his interface.
Also, if the path from the Gateway back to t he router (that i s, the remote gate way) at
the ISP’s central office does not pass through any other routers, then this gateway
will always be the first hop, and again it will not be necessary to conf igure either
static or dynamic routing.
74
Route Configuration
Figure 5-31 Dynamic Routing
Field Attributes
• Enable – Enables dynamic routing for both the LAN and WAN interface.
• LAN Version – Specifies RIP-1 or RIP-2 on the LAN interface.
• WAN Version – Specifies RIP-1 or RIP-2 on the WAN interface.
5
75
System Configuration
5
Policy Routing
Policy routing enables the user to route LAN trafiic to the WAN port according to
source IP, source port, and Protocol.
Figure 5-32 Policy Routing
Field Attributes
• Enable Policy Routing – Enables policy routing to the WAN interface.
• Source IP – Specifies the source IP address.
• Mask – Specifies an IP mask.
• Protocol – Specifies the port type, TCP, UDP or both.
• Src. Port – Specifies the soruce port.
• Des. Port – Specifies the destination port.
• Interface – Specifes the virtual WAN interface.
• Add – Adds the entry to the Policy Routing Rule List.
• Del – Deletes an entry from the Policy Routing List.
76
Wireless Configuration
Wireless Configuration
The IEEE 802.11b/g interfaces include configuration options for radio signal
characteristics and wireless security features.
The unit’s access point function can operate in three modes, mixed 802.11b/g,
802.11b only, or 802.11g. Also note that 802.11g is backward compatible with
802.11b, at slower data transmit rates.
5
Figure 5-33 Wireless Setup
Field Attributes
• WLAN – Specifies a wireless LAN (WLAN) interface.
•ESSID – The name of the wireless network service provided by the VAP. Clients
that want to connect to the network must set t hei r SSID to t he same as that of the
VAP interface. (Default: “ECG9210”; Range: 1-32 characters)
77
System Configuration
5
• Status – Displays whether the wireless interface is enabled or not.
• Mode – Specifies the security mode.
• Access Control – Configures the access control method.
WLAN Settings
• WLAN Enable – Enables the communication for the VAP wireless interface.
• (Default: Enabled)
•SSID – The name of the wireless network service provided by the VAP.
• SSID Broadcast – Enables broadcasting of the SSID to the l ocal wireless network.
(Default: Enabled)
• WDS Status – Enables the WDS status.
WLAN General Settings
• Operation Mode – Defines the radio mode for the VAP interface. (Default:
802.11b/g Mixed)
• Channel ID – The radio channel that the access point uses to communicate with
wireless clients. When multiple access points are deployed in the same area, set
the channel on neighboring access points at least five channels apart to avoid
interference with each other. For example, you can deploy up to three access
points in the same area using channels 1, 6, 11. Note that wireless clients
automatically set the channel to the sa me as that used by the access point to which
it is linked. Selecting Auto Select enable s th e acce ss poi nt to automat ic all y sel ect
an unoccupied radio channel.
• Tx Preamble Type – The radio preamble (sometimes called a head er) is a section
of data at the head of a packet that contains information that the wireless device
and client devices need when sending and receiving packe ts. You can set the radio
preamble to long or short. A short preamble improves throughput performance,
whereas a long preamble is required when legacy wireless devices are part of your
network.
• Beacon Interval – The rate at which beacon signals are transmitted from the
access point. The beacon signals allow wireless clients to maintain cont act with the
access point. They may also carry power-management information.
(Range: 40-500 TUs; Default: 100 TUs)
•Transmit Power – Adjusts the power of the radio signals transmitted from the
access point. The higher the transmission power, the farther the transmission
range. Power selection is not just a trade off between covera ge area and maximum
supported clients. You also have to ensure that high-p ower signals do not inte rfere
with the operation of other radio devi ces in the servic e area. (Default : Full; Ran ge:
Half, Quarter, One Eigth, Min.)
• RTS Threshold – Sets the packet size threshold at which a Request to Send
(RTS) signal must be sent to a receiving station prior to the sending station starting
communications. The access point sends RTS frames to a receiving station to
negotiate the sending of a data frame. After receiving an RTS frame, the station
sends a CTS (clear to send) frame to notify the sending station that it can start
sending data.
78
Wireless Configuration
If the RTS threshold is set to 0, the access p oin t always send s RTS sig nal s. If set
to 2347, the access point never sends RTS signals. If set to any other val ue, and
the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to
Send / Clear to Send) mechanism will be enabled.
The access points contending for the medium may not be aware of each other. The
RTS/CTS mechanism can solve this “Hidden Node Problem.” (Range: 0-2346
bytes: Default: none)
• Fragmentation Threshold – Packet Fragmentation can also be used to improve
throughput in noisy/congested situations. Although packet fragmentation is often
thought of as something bad, and does add a large overhead, reduci ng throughput,
sometimes it is necessary. (Range: 256-2346)
5
WLAN Security
The unit’s wireless interface is configured by default as an “open system,” which
broadcasts a beacon signal including the configured SSI D. Wireless clients with a
configured SSID of “ANY” can read the SSID from the beacon, and automatically se t
their SSID to allow immediate connection to the wireless network.
To improve wireless network security, you have to implement two main functions:
• Authentication – It must be verified that clients atte mpting to connect to the network
are authorized users.
• Traffic Encryption – Data passing between the unit and clients must be protected
from interception and eavesdropping.
For a more secure network, the access point can implement one or a combination of
the following security mechanisms:
• Wired Equivalent Privacy (WEP)
• IEEE 802.1X
• Wi-Fi Protected Access (WPA) or WPA2
The security mechanisms that may be employed depend on the level of security
required, the network and management resources available, and the software
support provided on wireless clients.
WEP Security
WEP provides a basic level of security, preventing unauthorized access to the
network, and encrypting data transmitted between wireless clients and the access
point. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric
strings) that are manually distributed to all clients that want to use the network.
WEP is the security protocol initially specified in the IEEE 802.11 standard for
wireless communications. Unfortunately, WEP has been found to be seriously
flawed and cannot be recommended for a high level of network security. For more
robust wireless security, the access point provides Wi-Fi Protected Access (WPA)
for improved data encryption and user authentication.
79
System Configuration
5
Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy
(WEP) on the access point to prevent unauthorized access to the network.
If you choose to use WEP shared keys instead of an open system, be sure to define
at least one static WEP key for user authentication and data encryption. Also, be
sure that the WEP shared keys are the same for each client in the wireless network.
Note that all clients share the same keys, whi ch are used for user authent ication and
data encryption. Up to four keys can be specified. These four keys are used for all
VAP interfaces on the same radio.
Figure 5-34 WEP Security
Field Attributes
• Security Mode – Specifies the security mode to be used for authentication.
• Authentication Mode – Specifies open or shared authentication.
• Key Mode – Specifies 64 Bit or 128 Bit security. (Default: 64 bit)
• Passphrase – Specifes a passphrase used for authentication. (Default: none;
Range 1-32 characters)
• Active Key – Specifies a WEP key for authentication.
WPA2 Security
WPA was int roduced as an interim solution for the vulnerability of WEP pending the
ratification of the IEEE 802.1 1i wireless security st andard. In ef fect, the WPA security
features are a subset of the 802.11i standard. WPA2 includes the now ratified
802.1 1i standard, but also of fers backward comp atibility with WPA. Therefore, WPA2
includes the same 802.1X and PSK modes of operation and support for TKIP
encryption.
80
Wireless Configuration
Figure 5-35 WPA2 PSK Security
Field Attributes
•TKIP/AES – Uses Temporal Key Integrity Protocol (TKIP) or AES keys for
encryption. WPA specifies TKIP as the data encryption method to replace WEP.
TKIP avoids the problems of WEP static keys by dynamically changing data
encryption keys. WPA/WPA2 mixed modes allow both WPA and WPA2 clients to
associate to a common SSID interface. In mixed mode, the unicast encryption
cipher (TKIP or AES-CCMP) is negotiated for each client.
•AES – Uses Advanced Encryption Standard (AES) keys for encryption. WPA2
uses AES Counter-Mode encryption with Cipher Block Chaining Message
Authentication Code (CBC-MAC) for message integrity. The AES Counter-Mode/
CBCMAC Protocol (AES-CCMP) provides extremely robust data confidentiality
using a 128-bit key. Use of AES-CCMP encryption is specified as a standard
requirement for WPA2. Before implementing WPA2 in the network, be sure client
devices are upgraded to WPA2-compliant hardware.
•PSK – Displays the pre-shared key if WPA/WPA2 has been enabled.
(EAP) and requires a configured RADIUS authen tication server to be accessible in
the enterprise network. If you select WPA or WPA2 Enterprise mode, be sure to
configure the RADIUS settings.
• RADIUS Server IP – Specifies a RADIUS server IP address.
• RADIUS Server Port – Specifies a RADIUS server port number. (Default: 1812)
• Secret – Specifies a secret text string.
WPS Security
The WPS protocol itself consists as a series of EAP message exchanges that is
triggered by a user action and relies on an exchange of descriptive information that
should precede that user's action.
The descriptive information is transferred through a new IE that's added to the
Beacon, Probe Response and optionally to the Probe Request and Associa tion
Request/Response messages. Other than purely informative TLVs, those IEs will
also hold the possible, and the currently deployed, configuration methods of the
device. The WPS IE, has a type field with a value of '221', and OUI of 00-50-F2-04.
The Data part of the IE is constructed out of TLVs that describe the device and its
capabilities.
After the identification of the device's cap abil ities on b oth ends, a h uman trigger is to
initiate the actual session of the protocol. The session consists of 8 messages, that
are followed in the case of a successful session by a message to indicate the
protocol is done. The exact stream of messages may change when configuring
different kinds of devices (AP or STA) or using different physical media (wired or
wireless).
82
Wireless Configuration
Figure 5-37 WPS Security
Field Attributes
• Self PinCode – Displays a PIN code for authentication.
•SSID – Displays the SSID.
• Configure via Push Button – Starts a scan for neighboring access points.
• Configure via Client PinCode – Allows the user to enter a PIN code for
authentication.
• UPnP Configured for vista – Enables support for Windows Vista.
5
83
System Configuration
5
Access Control
Wireless clients can be authenticated for network access by checking their MAC
address against a local database configured on the access poi nt. You can configure
a list of up to 32 wireless client MAC addresse s in the filt er list to eit her allow or deny
network access.
Figure 5-38 Access Control
Field Attributes
• Wireless Access Control – Enables access control.
• List Mode – Specifies whether the MAC address is to be allowed (Whitelist) or
denied (Blacklist).
• MAC Address – Specifies a MAC address to add to the access control list.
• MAC Address Control List – Displays the MAC address entries to be allowed or
denied access to the access point.
84
Wireless Configuration
Client List
The Client List displays all current clients associated with the access point.
5
Figure 5-39 Client List
Field Attributes
• MAC Address – Displays the MAC address of the currently associated client.
• Client Type – Displays the type of client associated with the access point.
85
System Configuration
5
NAT Configuration
Network Address Translation (NAT) is a method of mapping between a single global
address on the WAN interface to multiple local addresses on the LAN interface. For
the Gateway, the internal (local) IP addresses are those assigned to PCs or other
network devices by the DHCP server, and the external IP address is the single
address assigned to the WAN port.
Virtual Server
If you configure the Gateway as a virtual server, remote users accessing services
such as web sites or FTP servers on your local network t hrough public IP addresses
can be automatically redirected to local servers configured with private IP
addresses. In other words, depending on the requested service (designated by the
TCP/UDP port number), the Gateway redirects the external service request to the
appropriate server (located at an internal IP address). This secures your network
from direct attack by hackers, and provide s more flexible management by allowing
you to change internal IP addresses without affecting outside access to local
network services.
For example, if you set Type/Public Port to TCP/80 (HTTP or web) and the Private
IP/Port to 192.168.2.2/80, then all HTTP requests from outside users will be
transferred to 192.168.2.2 on port 80. Therefore, by just entering the IP address
provided by the ISP, Internet users can access the service they need at the local
address to which you redirect them.
The more common TCP service port numbers include: HTTP: 80, FTP: 21,
Telnet: 23, and POP3: 110.
86
NAT Configuration
Click NAT, Virtual Server. Specify the IP address of the local server, the private port
number, TCP or UDP type, the public port number, and click Apply.
Figure 5-40 Virtual Server
Field Attributes
• Public Port – Specifies the WAN port number.
• Private IP – The IP address of a server on the local network. The specified address
must be in the same subnet as the Gateway and its DHCP server address pool.
• Private Port – Specifies the local LAN TCP/UDP port number. (Range: 1-65535)
• Type – Specifies the port type, TCP or UDP. (Default: TCP)
• Description – A helpful character string to identify the virtual server.
5
Port Mapping
Some applications, such as Internet gaming, videoconferencing, Internet telephony
and others, require multiple connections. These applications cannot work with
one-to-one address/port translation. If you need to run applications that require
multiple connections, use port mapping to specify the additional public ports to be
opened for each application.
87
System Configuration
5
Click NA T, Port Mapping. Specify the TCP/UDP port ra nge, the IP address of a local
server, and cl ick Apply.
Figure 5-41 Port Mapping
Field Attributes
•Enable – Enables port mapping.
• Port Mapping – Specifies one of two port mapping lists.
• Source IP – Species a source IP address to route from.
• External Port – Specifies an external port, or port range.
• Internal IP – Specifies an internal port to route through.
•Internal Port – Specifies an internal port, or port range.
• Protocol – Specifies the use of a single TCP/UDP port or range of ports.
• Port – A TCP/UDP port or range of ports to assign to a specific application.
• Description – A useful text string that describes the port mapping.
• List Enable – Enables all specified port maps.
88
NAT Configuration
DMZ
This page is used to allow a specified host on the local network to access the
Internet without any firewall protection. Some Internet applications, such as
interactive games or videoconferencing, may not function properly behind the
Gateway’s firewall. By specifying a Demilitarized Zone (DMZ) host, the PC's TCP
ports are completely exposed to the Internet, allowing unrestricted two-way
communications. The host PC should be assigned a static IP address and this
address configured as the DMZ host IP.
Figure 5-42 DMZ
Field Attributes
• DMZ IP Address – Selects one of two IP addresses to enable for DMZ service.
• on/off – Enables/disables the DMZ IP address.
5
89
System Configuration
5
Firewall Configuration
The Gateway provides extensive firewall protection by restricting connect ion
parameters to limit the risk of intrusion and def ending against a wide array of
common hacker attacks.
Firewall Settings
This page is used to enable or disable the firewall, and set the default forwarding
policy for addresses not found in the MAC or IP filtering list.
Click FIREWALL, Firewall Settings. Enable the firewall, set the default forwarding
policy, and click Apply.
Figure 5-43 Firewall Settings
Field Attributes
• Enable – Enables or disables the firewall. (Default: Disabled)
• Default Policy – Accepts or drops packets not found in the MAC or IP address
filtering tables. (Default: Accept)
90
Firewall Configuration
5
IP Filtering
This page is used to filter the IP addresses of clients attempting to access the
Internet based on the source or destination IP address and TCP/UDP port of each
packet. Address filtering allows the Gateway to permit or deny specified packets
passing through to the Internet.
Click FIREWALL, IP Filtering. Mark the check box to enable I P address filt ering. Set
the addresses to be filtered, the TCP/UDP port, specify whether the matching
packets are to be passed on or dropped, and then click ADD to enter each address
in the table. Once all of the address entries have been specified, click Apply.
Figure 5-44 IP Filtering
Field Attributes
•Policy – Specifies to deny packets matching an entry.
• Enable IP Filter – Enables filtering of all packets in the IP Filtering List.
•Protocol – Specifies a port typem TCP, UDP, ICMP or all.
• Source/Destination – Specifies whether the address is contain ed in the pack et’s
source or destination field.
• Mask – The network prefix which indicates the number of significant bits used to
identify the network portion of the address.
• Port – Specifies the TCP/UDP port number. (Range: 0-65535)
91
System Configuration
5
ALG Configuration
This page is used to enable or disable custo mized Application La yer Gateway (ALG)
traversal filters for SIP, H323, IRC, PPTP, SNMP, and TFTP applications.
Click FIREWALL, ALG Configuration. Enable ALG traversal filters for the required
applications, and click Apply.
Figure 5-45 ALG Configuration
Field Attributes
• ALG Configuration – Allows Application Layer Gateway (ALG) traversal fi lters to
be used to support address and port translation for specified application layer
control/data protocols.
• Services – Services for which customized NAT traversal filters are supported.
- SIP – Session Initiation Protocol is used for Internet conferencing, telephony,
events notification and instant messaging.
- H.323 – ITU-T standard that defines protocols used to provide audio-visual
communication sessions on any packet-based network. It i s widely deployed by
service providers to support both voice and video services over IP networks.
- IRC – Internet Relay Chat
- PPTP – Point-to-Point Tunneling Protocol is a method for implementing virtual
private networks.
- SNMP – Simple Network Management Protocol.
- TFTP – Trivial File Transfer Protocol.
92
Firewall Configuration
- IPSEC – Internet Protocol Security is a protocol suite for securing Internet
Protocol (IP) communications by authenticating and encrypting each IP packet
of a data stream.
• Status – Enables or disables filter for specified protocol.
Remote Control
The Remote Control function configures the IP addresses of users who may have
exclusive control of the VDSL/Router from the WAN port.
Figure 5-46 Remote Control
5
Field Attributes
• Only following IP can access web setup – Enables only specified IP addresses
to have management access of the device.
• IP Address – Specifies an IP address for management access.
93
System Configuration
5
Denial of Service
A denial-of-service attack (DoS attack) is an att empt to make computer resources
unavailable to its intended users. Th is device provides following options to protect
this device from those attacks. You can optionlly enable those protections for your
needs.
Figure 5-47 DoS
Field Attributes
• DoS Protection Enable – Enables DoS protection .
• Attacks – Lists the type of DoS attack the unit provides protection from.
• Protection – Enables/disables the DoS for the specified attack.
94
VDSL Configuration
VDSL Configuration
VDSL connection parameters can be applied globally to all VDSL ports on the
Gateway.
VDSL Status and Rate Information
This page is used to display the status of the VDSL line, provision the BME and
VDSL ports, run loop-back tests for diagnostic purp oses; and also to display the
current rate for various stream types and other VDSL line information.
Use any of the functions listed in the VDSL Status table for the System Provision,
Port Provision, or to stop ports. Or display the basic or detailed list of rate
information.
5
Figure 5-48 VDSL Status and Rate Information
Field Attributes
VDSL Status, Provisioning, Diagnostics
• Line Status – Displays the line status of the VDSL link, including administrative
status, and port state (Activating, Provisioned or Showtime).
• BME – Includes the following OAM functions for the Gateway’s Burst Mode Engine
(that is, VDSL port controller).
- Reset – Resets power to the BME.
- System Provision – Assigns default values to BME system parameters,
including vendor ID for T1/E1 and ITU, revision number, option mask to e nabl e
PM mode, PM alert and diagnostic modes.
- Port Provision – Loads the parameters stored in FLASH to the VDSL port.
95
System Configuration
5
• Port – Starts or stops the VDSL port.
Rate and Line Information
• BME – The number of VDSL ports supported by the BME.
• Downstream/Upstream Line Rate – This rate includes payload (user data) and
any applicable framing overhead.
• Fast Downstream/Upstream Payload Rate – The actual payload carried on the
fast channels.
• Slow Downstream/Upstream Payload Rate – The actual payload carried on the
interleaved channels.
• Downstream Attainable Payload Rate – The maximum rate that can be achiev ed
in the download direction. This is based on measurements made during line
probing. This rate includes payload (user data) and any applicable framing
overhead.
• Downstream Attainable Line Rate – The maximum attainable line rate on the
downstream channel.
• Downstream/Upstream Line Protection (Slow Path) – The number of additional
DMT symbols added to each packet to increase the noise margin.
• Downstream/Upstream Delay – The maximum interleave delay. Int e rleaving
causes a delay in the transmission of data. Interleave delay applies only to the
interleave (slow) channel and defines the mapping (relative spacing) between
subsequent input bytes at the interleaver input and their pla cement in the bit
stream at the interleaver output. Larger numbers provide greater separation
between consecutive input bytes in the output bit stream allowing for improved
impulse noise immunity at the expense of payload latency.
• VDSL Estimated Loop Length – Estimated length of the VDSL connection; used
to calculate power backoff.
• Ghs Estimated Near End Loop Length – Estimated length of the VDSL
connection as viewed from the input receiver on the Gatewa y; used for
handshaking.
• Ghs Estimated Far End Loop Length – Est imated length of the VDSL connection
as viewed from the central office; used for handshaking.
• Current Framing Mode – Indicates one of the packet framing modes (0: HDLC,
1: EFM, 2: By Pass).
• Band Plan Type –
Table5-49 VDSL2 Band Plans
CodeBand Plan
0x00BP1_998_3
0x01BP2_998_3
BP998_3B_8_5M
96
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.