1.1 Features ..........................................................................................................................................4
4 Getting to know the router ........................................................................................................................14
4.1 Front Panel ....................................................................................................................................14
8.2 WAN ..............................................................................................................................................37
8.9 IP QoS ...........................................................................................................................................56
11 Status ...................................................................................................................................................72
12 LAN-to-LAN connection with bridge Mode ...............................................................................................73
12.1 CO side .......................................................................................................................................73
12.2 CPE Side ......................................................................................................................................75
13 LAN to LAN Connection with Routing Mode .............................................................................................76
13.1 CO side .......................................................................................................................................76
13.2 CPE side ......................................................................................................................................78
14 Configuration via Serial Console or Telnet with Menu Driven Interface ........................................................80
14.1 Serial Console ..............................................................................................................................80
14.8 Status ..........................................................................................................................................87
14.9 Show ...........................................................................................................................................88
Appendix B: Registration and Warranty Information ....................................................................................115
NB712 / NB714 User Guide 3
YML829 Rev1
1 Introduction
NetComm’s NB712 (2-wire) and NB714 (2 or 4-wire selectable) G.SHDSL 4-port Security Modem Routers deliver
symmetrical DSL services to small and medium size business making them an economical alternative to Leased
Line or ISDN services.
Available in two modem router configurations, the NB712 (2-wire) and NB714 (2 or 4-wire selectable) are capable
of providing data rates from 64kbps to 2.304Mbps (NB712) or 128kbps to 4.608Mbps (NB714) and fully comply
with the ITU-T G.991.2 standards.
The NetComm NB712 and NB714 Modem Routers combine integrated high-end Bridging/Routing capabilities
with advanced functions such as Multi-DMZ, virtual server mapping, and VPN pass-through. They also support
port-based VLAN and IEEE802.1q VLAN over an ATM network. An advanced Firewall with Stateful Packet
Inspection (SPI) and DoS protection, all combine to protect your network from outside intruders.
With 4 x 10/100 Base-T auto-sensing, auto-negotiation and auto-MDIX switching ports, the NetComm G.SHDSL
Modem Routers enable you to leverage the latest broadband technology to meet the growing need for high
performance data communication.
1.1 Features
• Easy configuration and management with password control for various applications and
environments
• Efficient IP routing and transparent learning bridge to support broadband Internet services
• VPN pass-through for PPTP/L2TP/IPSec Tunnelling
• Virtual LANs (VLANs) offering significant benefits in terms of efficient use of bandwidth, flexibility,
performance and security
• Built-in advanced SPI firewall
• Four 10/100Mbps Auto-negotiation and Auto-MDIX switching port for flexible local area network
connectivity
• DMZ host/Multi-DMZ/Multi-NAT enables multiple workstations on the LAN to access the Internet
• Full ATM protocol stack implementation over SHDSL
• PPPoA and PPPoE support user authentication with PAP/CHAP/MS-CHAP
• SNMP management with SNMPv1/SNMPv2 agent and MIB II
• Obtain enhancements and new features via Internet software upgrade
1.2 Package Contents
The following items are included in your G.SHDSL Modem Router pack:
• NB712 (2-wire)714 (2 or 4-wire selectable) G.SHDSL Router
• 15V AC 1.0 Amp power supply
• RS232 Console Cable
• RJ11 ADSL line connection cable
• RJ45 10/100 Ethernet cable
• User Guide CD
If any of the above items are missing or damaged, please content NetComm immediately.
4 NB712 / NB714 User Guide
YML829 Rev1
1.3 Specification
Routing
• Supports IP/TCP/UDP/ARP/ICMP/IGMP protocols
• IP routing with static routing and RIPv1/RIPv2 (RFC1058/2453)
• Application level gateway for URL and keyword blocking
• User access control: deny certain PCs access to Internet service
Management
• Easy-to-use web-based GUI for quick setup, configuration and management
• Menu-driven interface/Command-line interface (CLI) for local console and Telnet access
• Password protected management and access control list for administration
• SNMP management with SNMPv1/SNMPv2 (RFC1157/1901/1905) agent and MIB II (RFC1213/
1493)
• Software upgrade via web-browser/TFTP server
ATM
• Up to 8 PVCs
• OAM F5 AIS/RDI and loopback
• AAL5
NB712 / NB714 User Guide 5
YML829 Rev1
ATM QoS
• UBR (Unspecified bit rate)
• CBR (Constant bit rate)
• VBR-rt (Variable bit rate real-time)
• VBR-nrt (Variable bit rate non-real-time)
AAL5 Encapsulation
• VC multiplexing and SNAP/LLC
• Ethernet over ATM (RFC 2684/1483)
• PPP over ATM (RFC 2364)
• Classic IP over ATM (RFC 1577)
PPP
• PPP over Ethernet for fixed and dynamic IP (RFC 2516)
• PPP over ATM for fixed and dynamic IP (RFC 2364)
• User authentication with PAP/CHAP/MS-CHAP
WAN Interface
• SHDSL: ITU-T G.991.2 (Annex A, Annex B)
• Encoding scheme: 16-TCPAM
• Data Rate (2-wire mode): N x 64Kbps (N=0~36, 0 for adaptive)
• Data Rate (4-wire mode): N x 128kbps (N=0~36, 0 for adaptive)
• Impedance: 135 ohms
LAN Interface
• 4-ports switching hub (4-port router)
• 10/100 Base-T auto-sensing and auto-negotiation
• Auto-MDIX (4-port router)
Hardware Interface
• WAN: RJ-11
• LAN: RJ-45 x 4
• Console: RS232 female
• RST: Reset button for factory default
Indicators
• General: PWR
• WAN: LNK, ACT
• LAN: 1, 2, 3, 4
• SHDSL: ALM
6 NB712 / NB714 User Guide
YML829 Rev1
Physical/Electrical
(
• Dimensions: 18.7 x 3.3 x 14.5cm (WxHxD)
• Power: 100~240VAC (via power adapter)
• Power consumption: 9 watts max
o
• Temperature: 0~45
C
• Humidity: 0%~95%RH (non-condensing)
Memory
• 2MB Flash Memory, 8MB SDRAM
Product Information
• G.shdsl 2-wire router/bridge with 4-port switching hub LAN, VLAN and business class firewall
• G.shdsl 2 or 4-wire selectable router/bridge with 4-port switching hub LAN, VLAN and business
class firewall
1.4 Application
NB714 or NB712
Internet
G.SHDSL Modem Router
Note: NB714 model shown)
Firewall
PCPC
NB712 / NB714 User Guide 7
YML829 Rev1
PC
PC
2 Firewall
(N
A firewall protects networked computers from an intrusion that could compromise confidentiality or result in data
corruption or denial of service. It must have at least two network interfaces, one for the network it is intended to
protect, and one for the network it is exposed to. A firewall sits at the junction point or gateway between the two
networks, usually a private network and a public network such as the Internet.
A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is
routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can
also manage public access to private networked resources such as host applications. It can log all attempts to
enter the private network and trigger alarms when hostile or unauthorized entry is attempted. Firewalls can filter
packets based on their source and destination addresses and port numbers. This is known as address filtering.
Firewalls can also filter specific types of network traffic. This is known as protocol filtering because the decision
to forward or reject traffic is dependant upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also
filter traffic by packet attribute or state.
It is important to note that an Internet firewall cannot prevent individual users with modems from dialling into or
out of the network. By doing so they bypass the firewall altogether and open the network to attack. However, these
are management issues that should be raised during the planning of any security policy and cannot be solved with
Internet firewalls alone.
PCPC
NB714 or NB712
G.SHDSL Modem Router
ote: NB714 model shown)
Unknown Traffic
Access to Specific Destination
Allowed Traffic
Restricted Traffic
PC
PC
Firewall
Specified Allowed Traffic
Out to Internet
Internet
8 NB712 / NB714 User Guide
YML829 Rev1
2.1 Types of Firewall
There are three types of firewall:
2.1.1 Packet Filtering
In packet filtering, only the protocol and the address information of each packet is examined. Its
contents and context (its relation to other packets and to the intended application) are ignored.
The firewall pays no attention to applications on the host or local network and it “knows” nothing
about the source of the incoming data. Filtering consists of examining incoming or outgoing packets
and allowing or disallowing their transmission on the basis of a set of configurable rules. Network
Address Translation (NAT) routers offer the advantages of packet filtering firewalls but can also hide
the IP addresses of computers behind the firewall, and offer a level of circuit-based filtering.
192.100.0.10:1025
192.168.0.5
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Firewall
Filter remembers
this information
UDP
SP=3264
SA=192.168.0.5
DP=1525
DA=172.16.3.4
Matches outgoing
so allowed
UDP
SP=1525
SA=172.16.3.4
DP=3264
DA=192.168.0.5
No matches
so disallowed
UDP
SP=1525
SA=172.168.3.4
DP=2049
DA=192.168.0.5
Firewall 192.120.8.5
Protocol
Source/Destination address
Source/Destination port
IP options
Connection status
172.16.3.4
192.120.8.5:2205
192.120.8.5:2206
Internet
192.100.0.11:4433
Internal/Protected
Network
Client IP Internal Port External Port
192.68.0.10 1025 2205
192.168.0.11 4406 2206
External/Unprotected
Network
NB712 / NB714 User Guide 9
YML829 Rev1
2.1.2 Circuit Gateway
Also called a “Circuit Level Gateway,” this is a firewall approach that validates connections before
allowing data to be exchanged. What this means is that the firewall doesn’t simply allow or disallow
packets but also determines whether the connection between both ends is valid according to
configurable rules, then opens a session and permits traffic only from the allowed source and
possibly only for a limited period of time.
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Destination IP address and/
or source IP address and/or
time of day
protocol
user
password
2.1.3 Application Gateway
The Application Level Gateway acts as a proxy for applications, performing all data exchanges with
the remote system on their behalf. This can render a computer behind the firewall all but invisible to
the remote system. It can allow or disallow traffic according to very specific rules; permitting some
commands to a server but not others, limiting file access to certain types, varying rules according
to authenticated users and so forth. This type of firewall may also perform very detailed logging of
traffic and monitoring of events on the host system, and can often be instructed to sound alarms or
notify an operator under defined conditions. Application-level gateways are generally regarded as the
most secure type of firewall.
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Tel ne t
FTP
HTT:
SMTP
2.2 Denial of Service Attack
Denial of service (DoS) attacks typically come in two varieties: resource starvation and resource overload. DoS
attacks can occur when there is a legitimate demand for a resource that is greater than the supply (i.e. too many
web requests to an already overloaded web server). Software vulnerability or system misconfigurations can also
cause DoS situations. The difference between a malicious denial of service and simple system overload is the
requirement of an individual with malicious intent (attacker) using or attempting to use resources specifically to
deny those resources to other users.
10 NB712 / NB714 User Guide
YML829 Rev1
Ping of deathOn the Internet, ping of death is a kind of denial of service
(DoS) attack caused by an attacker deliberately sending an
IP packet larger than the 65,536 bytes allowed by the IP
protocol. One of the features of TCP/IP is fragmentation; it
allows a single IP packet to be broken down into smaller
segments. Attackers began to take advantage of that feature
when they found that a packet broken down into fragments
could add up to more than the allowed 65,536 bytes.
Many operating systems didn’t know what to do when they
received an oversized packet, so they froze, crashed, or
rebooted. Other known variants of the ping of death include
teardrop, bonk and nestea.
SYN FloodThe attacker sends TCP connections faster than the
victim machine can process them, causing it to run out
of resources and dropping legitimate connections. A new
defence against this is to create “SYN cookies”. Each side
of a connection has its own sequence number. In response
to a SYN, the attacked machine creates a special sequence
number that is a “cookie” of the connection and forgets
everything it knows about the connection. It can then
recreate the forgotten information about the connection
where the next packets come in from a legitimate
connection.
ICMP FloodThe attacker transmits a volume of ICMP request packets to
cause all CPU resources to be consumed serving the phony
requests.
UDP FloodThe attacker transmits a volume of requests for UDP
diagnostic services which cause all CPU resources to be
consumed serving the phony requests.
Land attackThe attacker attempts to slow your network down by sending
a packet with identical source and destination addresses
originating from your network.
Smurf attackWhere the source address of a broadcast ping is forged so
that a huge number of machines respond back to the victim
indicated by the address, thereby overloading it.
Fraggle AttackA perpetrator sends a large amount of UDP echo packets
at IP broadcast addresses, all of it having a spoofed source
address of a victim.
IP SpoofingIP Spoofing is a method of masking the identity of an
intrusion by making it appear that the traffic came from a
different computer. This is used by intruders to keep their
anonymity and can be used in a Denial of Service attack.
NB712 / NB714 User Guide 11
YML829 Rev1
3 VLAN (Virtual Local Area Network)
Virtual LAN (VLAN) is defined as a group of devices on one or more LANs that are configured so that they can
communicate as if they were attached to the same wire, when in fact they are located on a number of different
LAN segments. Because VLAN is based on logical instead of physical connections, it is extremely flexible.
The IEEE 802.1Q defines the operation of VLAN bridges that permit the definition, operation and administration of
VLAN topologies within a bridged LAN infrastructure. VLAN architecture benefits include:
1. Increased performance
2. Improved manageability
3. Network tuning and simplification of software configuration
4. Physical topology independence
5. Increased security options
As DSL (over ATM) links are deployed more and more extensively, VLAN (VLAN-to-PVC) over DSL links is
becoming a popular requirement of networks.
The following section will discuss the implementation of VLAN-to-PVC only for bridge mode operation, i.e., the
VLAN spreads over both the COE and CPE sides, where there is no layer 3 routing involved.
3.1 Specification
1. The unit supports up to 8 active VLANs with shared VLAN learning (SVL) bridge out of 4096 possible
VLANs specified in IEEE 802.1Q.
2. Each port always belongs to a default VLAN with its port VID (PVID) as an untagged member. Also, a
port can belong to multiple VLANs and be tagged members of these VLANs.
3. A port must not be a tagged member of its default VLAN.
4. If a non-tagged or null-VID tagged packet is received, it will be assigned with the default PVID of the
ingress port.
5. If the packet is tagged with non-null VID, the VID in the tag will be used.
6. The look up process starts with VLAN look up to determine whether the VID is valid. If the VID is
not valid, the packet will be dropped and its address will not be learned. If the VID is valid, the VID,
destination address, and source address lookups are performed.
7. The VID and destination address lookup determines the forwarding ports. If it fails, the packet will be
broadcast to all members of the VLAN, except the ingress port.
8. Frames are sent out tagged or untagged depending on if the egress port is a tagged or untagged
member of the VLAN that the frames belong to.
9. If VID and source address look up fails, the source address will be learned.
3.2 Frame Specification
An untagged frame or a priority-tagged frame does not carry any identification of the VLAN to which it belongs.
Such frames are classified as belonging to a particular VLAN based on parameters associated with the receiving
port. Also, priority tagged frames, which, by definition, carry no VLAN identification information, are treated the
same as untagged frames.
A VLAN-tagged frame carries an explicit identification of the VLAN to which it belongs; i.e., it carries a tag header
that carries a non-null VID. This results in a minimum tagged frame length of 68 octets. Such a frame is classified
12 NB712 / NB714 User Guide
YML829 Rev1
as belonging to a particular VLAN based on the value of the VID that is included in the tag header. The presence
of the tag header carrying a non-null VID means that some other device, either the originator of the frame or a
VLAN-aware bridge, has mapped this frame into a VLAN and has inserted the appropriate VID.
The following figure shows the difference between a untagged frame and VLAN tagged frame, where the Tag
Protocol Identifier (TPID) is of 0x8100 and it identifies the frame as a tagged frame. The Tag Control Information
(TCI) consists of the following elements:
1) User priority allows the tagged frame to carry user priority information across bridged LANs in
which individual LAN segments may be unable to signal priority information (e.g., 802.3/Ethernet
segments).
2) The Canonical Format Indicator (CFI) is used to signal the presence or absence of a Routing
Information Field (RIF) field, and, in combination with the Non-canonical Format Indicator (NCFI)
carried in the RIF, to signal the bit order of address information carried in the encapsulated frame.
3) The VID uniquely identifies the VLAN to which the frame belongs.
3.3 Applications
SHDSL RouterSHDSL Router
SHDSLEthernetEthernet
LANLAN
SHDSL Router
Internet
DSLAM
NB712 / NB714 User Guide 13
YML829 Rev1
SHDSLEthernet
LAN
4 Getting to know the router
This section will introduce the hardware of the router.
4.1 Front Panel
The front panel contains LEDs which show the status of the SHDSL router. Note: The front panel LEDs of the
NB712 (2-wire) and NB714 (2 or 4-wire selectable) are identical. The NB714 is shown below.
LED status
LEDs Active Description
PWR On Power on
WAN
LNK On SHDSL line connection is established
Blink SHDSL handshake
ACT On Transmit or received data over SHDSL link
LAN
1 On Ethernet cable is connected to LAN 1
Blink Transmit or received data over LAN 1
2 On Ethernet cable is connected to LAN 2
Blink Transmit or received data over LAN 2
3 On Ethernet cable is connected to LAN 3
Blink Transmit or received data over LAN 3
4 On Ethernet cable is connected to LAN 4
Blink Transmit or received data over LAN 4
ALM On SHDSL line connection is dropped
BlinkSHDSL self test
14 NB712 / NB714 User Guide
YML829 Rev1
4.2 Rear Panel
The rear panel of the SHDSL router is where all of the cable connections are made.
Connectors Description
DC-IN Power adaptor inlet: Input voltage 9VDC
LAN (1,2,3,4) 10/100BaseT auto-sensing and auto- MDIX for LAN port
(RJ-45)
CONSOLE RS-232C (DB9) for system configuration and maintenance
LINE SHDSL interface for WAN port (RJ-11)
RST Reset button to reboot or load factory default
The reset button can be used in one of two ways.
(1) Press the Reset Button for one second to reboot the system only.
(2) Pressing the Reset Button for four seconds will cause the product to reload the factory default
settings, thereby losing all of your settings. If you forget your user name or password, or if the router
is having difficulties connecting to the Internet, you may want to reconfigure it to clear all previous
settings. Press the Reset Button and hold for four (4) seconds with a paper clip or sharp pen/pencil.
NB712 / NB714 User Guide 15
YML829 Rev1
5 Connecting your G.SHDSL Modem Router
This guide is designed to lead users through the Web Configuration of the G.SHDSL Modem Router in the easiest
and quickest way possible. Please follow the instructions carefully.
Note: There are three methods to configure the router: serial console, Telnet and Web
Browser. Only one configuration application is used to setup the Modem Router at
any given time. Select the method you wish to use and continue.
For Web configuration, you can skip step 3.
For Serial Console Configuration, you can skip step 1 and 2.
Step 1: Check the Ethernet Adapter in PC
Make sure that an Ethernet Adapter has been installed in the PC that is to be used for configuration of the router.
TCP/IP protocol is necessary for web configuration, so please check that the PC has TCP/IP protocol installed.
Step 2: Check the Web Browser in PC
For Web Configuration, ensure that the PC has a Web Browser installed, such as IE or Netscape.
Note: Suggest IE5.0, Netscape 6.0 or above and 800x600 screen resolution or above.
Step 3: Check the Terminal Access Program
For Serial Console and Telnet Configuration, users need to setup the terminal access program with VT100
terminal emulation.
Step 4: Determine Connection Setting
Users need to know the Internet Protocol supplied by your Service Provider and determine the mode of setting.
Protocol Selection
RFC1483 Ethernet over ATM
RFC1577 Classical Internet Protocol over ATM (CLIP)
RFC2364 Point-to-Point Protocol over ATM (PPPoA)
RFC2516 Point-to-Point Protocol over Ethernet (PPPoE)
Different Protocols are required to setup different WAN parameters. Your ISP will advise the correct protocol and
the necessary WAN parameters to configure your Modem Router.
16 NB712 / NB714 User Guide
YML829 Rev1
Bridge EoA
Route EoA
IPoA
PPPoA
NB712 / NB714 User Guide 17
YML829 Rev1
PPPoE
(
Step 5: Install the SHDSL Router
Do not turn on the Modem Router until you have completed the Hardware Installation.
• Connect the power adapter to the port labelled DC-IN on the rear panel of the product.
• Connect the Ethernet cable to the PC.
Note: The 4-port modem router supports auto-MDIX switching, so both straight and
cross-over Ethernet cables can be used.
• Connect the phone cable to the product and the other side of the phone cable to the wall jack.
• Connect the power adapter to the power source.
• Turn on the PC which will be used to configure the Router.
4-port router with network topology
NB714 or NB712
Internet
Firewall
PCPC
G.SHDSL Modem Router
Note: NB714 model shown)
PC
PC
18 NB712 / NB714 User Guide
YML829 Rev1
6 Configuration via Web Browser
For Win95, 98 and Me, click the start button. Select Setting and Control Panel.
Double click the Network icon.
In the Configuration window, select the TCP/IP protocol line associated with your network card and then click the
Properties button.
NB712 / NB714 User Guide 19
YML829 Rev1
Choose IP Address tab. Select Obtain IP address automatically. Click the OK button.
The window will ask you to restart the PC. Click Yes button.
After rebooting your PC, open your web browser and type http://192.168.1.1 to connect to the Router.
The default IP address and sub net-mask of the Router is 192.168.1.1 and 255.255.255.0. Because the router
acts as DHCP server in your network, the router will automatically assign an IP address for the PC in the network.
Type User Name admin and Password admin and then click OK.
The default user name and password are both admin. For the system security, we suggest you change them after
configuration.
Note: After changing the User Name and Password, it is strongly recommended that you
record them somewhere as a reminder for the next time you login. If you cannot
remember the User Name and Password, you will need to reset the Modem
Router, which will lose any previous configuration.
20 NB712 / NB714 User Guide
YML829 Rev1
7 Basic Setup
The Basic Setup contains LAN, WAN, Bridge and Router operation modes. This section can be used to completely
setup the router. After successfully completing it, you can access the Internet. This is the easiest and quickest way
to setup the router.
Note: The advanced functions are only for advanced users. The incorrect settings of
advanced functions can affect the performance of the network and cause a
system error or disconnection.
Click Basic for basic installation.
NB712 / NB714 User Guide 21
YML829 Rev1
7.1 Bridge Mode
Before configuring the router in bridge mode, check with your ISP to ensure you have the necessary information.
Click Bridge and CPE Side to setup Bridging mode of the Router and then click Next.
Two SHDSL modes are available: CO, Central Office, and CPE, Customer Premises Equipment. For a connection
with a DSLAM, the correct SHDSL mode is CPE. For a LAN to LAN connection, one side must be CO and the other
side must be CPE.
LAN Parameters
Enter IP: 192.168.1.1
Enter Subnet Mask: 255.255.255.0
Enter Gateway: 192.168.1.254
The Gateway IP is provided by ISP.
Enter Host Name: SOHO
Some ISPs will require the host name as identification. You may need to check with your ISP to see if your Internet
service has been configured with a host name. In most cases, this field can be ignored.
22 NB712 / NB714 User Guide
YML829 Rev1
WAN1 Parameters
Enter VPI: 0
Enter VCI: 32
Click LLC
Click Next.
The screen will display the new parameters. Check the parameters and click Restart. The router will reboot with
the new settings. Select Continue to configure other parameters.
NB712 / NB714 User Guide 23
YML829 Rev1
7.2 Routing Mode
Routing mode includes DHCP server, DHCP client, DHCP relay, Point-to-Point Protocol over ATM and Ethernet and
IP over ATM and Ethernet over ATM. The type of Internet protocol is provided by your ISP.
Click ROUTE and CPE Side then press Next.
Two SHDSL modes are available: CO, Central Office, and CPE, Customer Premises Equipment. For connection with
a DSLAM, the SHDSL mode is CPE. For a LAN to LAN connection, one side must be CO and the other side must
be CPE.
24 NB712 / NB714 User Guide
YML829 Rev1
7.2.1 DHCP Client
Some ISPs provide a DHCP server service whereby the PC in the LAN can access IP information automatically. To
setup the DHCP client mode, follow the procedure.
LAN IP Type: Dynamic
Click Next to setup WAN1 parameters.
NB712 / NB714 User Guide 25
YML829 Rev1
7.2.2 DHCP Server
Dynamic Host Configuration Protocol (DHCP) is a communication protocol that allows network administrators to
centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization’s network.
Internet Protocol requires that each machine that can connect to the Internet has a unique IP address. When an
organization sets up its computer users with a connection to the Internet, an IP address must be assigned to each
machine.
Without DHCP, the IP address must be entered manually for each computer. If computers move to another location
in another part of the network, a new IP address must be entered. DHCP lets a network administrator supervise
and distribute IP addresses from a central point and automatically send a new IP address when a computer
is plugged into a different place in the network. If the DHCP server is enabled, you have to setup the following
parameters for processing DHCP requests from clients.
The embedded DHCP server assigns network configuration information for up to 253 users accessing the Internet
at the same time.
IP type: Fixed
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
Some ISPs require the host name as identification. Check
with your ISP to see if your Internet service has been
configured with a host name. In most cases, this field can be
ignored.
26 NB712 / NB714 User Guide
YML829 Rev1
Trigger DHCP Service: Server
The default setup is Enable DHCP server. If you want to turn
off the DHCP service, choose Disable.
For example: If the LAN IP address is 192.168.1.1, the
IP range of LAN is 192.168.1.2 to 192.168.1.51. The
DHCP server assigns the IP form Start IP Address to End IP
Address. The legal IP address range is form 0 to 255, but 0
and 255 are reserved for broadcast so the legal IP address
range is from 1 to 254. On the other hand, you cannot
assign an IP greater than 254 or less then 1. Lease time
72 hours indicates that the DHCP server will reassign IP
information every 72 hours.
DNS Server: Your ISP will provide at least one Domain Name Service
Server IP. You can type the router IP in this field. The router
will act as DNS server relay function.
You may assign fixed IP addresses to some devices while
using DHCP, provided that the fixed IP address is not within
the range used by the DHCP server.
Click Next to setup WAN1 parameters.
NB712 / NB714 User Guide 27
YML829 Rev1
7.2.3 DHCP relay
If you already have a DHCP server on your LAN and you want to use it for DHCP services, the router provides a
DHCP relay function.
IP Type: Fixed
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
Some ISPs require the host name as identification. Check
with your ISP to see if your Internet service has been
configured with a host name. In most cases, this field can be
ignored.
Trigger DHCP Service: Relay
Click Next to setup DHCP server parameters.
Enter the DHCP server IP address in IP address field.
Press Next
28 NB712 / NB714 User Guide
YML829 Rev1
7.2.4 PPPoE or PPPoA
PPPoA (point-to-point protocol over ATM) and PPPoE (point-topoint protocol over Ethernet) are authentication and connection
protocols used by many service providers for broadband
Internet access. These are specifications for connecting multiple
computer users on an Ethernet local area network to a remote
site through common customer premises equipment, which
is the telephone company’s term for a modem and similar
devices. Users share a common Digital Subscriber Line (DSL),
cable modem, or wireless connection to the Internet. PPPoE
and PPPoA combine the Point-to-Point Protocol (PPP), commonly used in dialup connections, with the Ethernet
protocol or ATM protocol, which supports multiple users in a local area network. The PPP protocol information is
encapsulated within an Ethernet frame or ATM frame.
Before configuring the router, check with your ISP to ensure you have the correct information.
Key in the WAN1 parameters:
VPI: 0
VCI: 33
AAL5 Encap: LLC
Protocol: PPPoA + NAT or PPPoE + NAT
Click Next to setup the User name and password.
For more information, refer to the section on NAT/DMZ.
NB712 / NB714 User Guide 29
YML829 Rev1
Type the ISP1 parameters.
Username: test
Password: test
Password Confirm: test
Your ISP will provide the user name and password.
Idle Time: 10
If you want your Internet connection to remain on at all
times, enter 0 in the Idle Time field.
IP Type:There are three IP types, Dynamic, Fixed and IP
Unnumbered, which you can setup. The default IP type
is Dynamic. It means that ISP PPP server will provide IP
information including a dynamic IP address when a SHDSL
connection is established. I.e. you do not need to type the IP
address of WAN1. Some ISPs will provide fixed IP address
over PPP.
For fixed IP address:
IP Type: Fixed
IP Address: 192.168.1.1
Click Next.
For IP Unnumbered:
IP Type: IP Unnumbered
IP Address: 192.168.168.1
Click Next.
30 NB712 / NB714 User Guide
YML829 Rev1
Don’t forget to enable LAN: For IP Routing Usage and type IP address on STEP 2
Note: For security, the password will be displayed as asterisk characters.
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press Continue to setup other parameters.
NB712 / NB714 User Guide 31
YML829 Rev1
7.2.5 IPoA or EoA
Before configuring the router, check with your ISP to ensure you have the correct parameters.
Type the Wan Parameters;
VPI: 0
VCI: 33
AAL5 Encap: LLC
Protocol: IPoA , EoA , IPoA + NAT or EoA + NAT
Click Next to setup the IP parameters.
For more information, refer to the section on NAT/DMZ.
IP Address: 10.1.2.1
The router’s IP address as seen from the Internet. Your ISP
will provide it and you need to specify it here.
Subnet mask: 255.255.255.0
This is the router subnet mask seen by external users on the
Internet. Your ISP will provide it to you.
Gateway: 10.1.2.2
Your ISP will provide you the default gateway.
DNS Server 1: 168.95.1.1
Your ISP will provide at least one DNS (Domain Name
System) Server IP address.
Click Next
32 NB712 / NB714 User Guide
YML829 Rev1
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press Continue to setup other parameters.
NB712 / NB714 User Guide 33
YML829 Rev1
8 Advanced Setup
Advanced setup contains SHDSL, WAN, Bridge, VLAN, Route, NAT/DMZ, Virtual server and firewall parameters.
34 NB712 / NB714 User Guide
YML829 Rev1
8.1 SHDSL
You can setup the Annex type, data rate and SNR margin for SHDSL parameters in
SHDSL.
Click SHDSL.
The following screen displays the Advanced SHDSL settings page for the NB712.
The NB714 supports an additional 4-wire mode with 4.0608Mbps data rate. The following screen displays the
Advanced SHDSL settings page for the NB714 with the option to select the Link Type.
Annex Type: There are three Annex types, Annex A (ANSI), Annex B
(ETSI), or Annex AB in SHDSL. Check with your ISP.
Link Type: The router supports two link types, 4-wire mode with
4.0608Mbps data rate and 2-wire mode with 2.304Mbps
data rate.
Data Rate: You can set the SHDSL data rate in multiples of 64kbps.
For adaptive mode, n=0. The router will adapt the data rate
according to the line status.
NB712 / NB714 User Guide 35
YML829 Rev1
SHDSL SNR margin: The margin range is from 0 to 10.
SNR margin is an index of line connection. You can see the
actual SNR margin in STATUS SHDSL. The larger the SNR
margin, the better the line connection.
If you set the SNR margin in the field to 2, the SHDSL
connection will drop and reconnect when the SNR margin
is lower than 2. I.e., the device will reduce the line rate and
reconnect for better line connection.
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press Continue to setup other parameters.
36 NB712 / NB714 User Guide
YML829 Rev1
8.2 WAN
The SHDSL router supports up to 8 PVCs. WAN 1 was configured via BASIC except QoS. If you want to setup
other PVCs, 2 to 8, the parameters are setup in WAN. I.e., you must apply two or more Internet Services with ISPs
otherwise you do not need to setup WAN.
The WAN Number 1 will be the parameters setup in Basic Setup. If you want to setup another PVC, you can
configure them in WAN 2 to WAN 8.
Enter the parameters.
If the WAN protocol is PPPoA or PPPoE with dynamic IP, leave the default WAN IP address and Subnet Mask as
default settings. The system will ignore the IP address and Subnet mask information but deleting or leaving blank
the items will cause system error.
NB712 / NB714 User Guide 37
YML829 Rev1
If the WAN protocol is IPoA or EoA, leave the ISP parameters as default setting. The system will ignore the
information but deleting or leaving blank fields will cause a system error.
QoS (Quality of Service): The Traffic Management Specification V4.0 defines ATM
service catalogues that describe both the traffic transmitted
by users onto a network as well as the Quality of Service that
the network needs to provide for that traffic.
UBR (Unspecified Bit Rate):UBR is the simplest service provided by ATM networks. There
is no guarantee of any rate. It is a primary service used for
transferring Internet traffic over the ATM network.
CBR (Constant Bit Rate):CBR is used by connections that require a static amount of
bandwidth that is available during the connection life time.
This bandwidth is characterized by Peak Cell Rate. Based on
the PCR of the CBR traffic, specific cell slots are assigned for
the VC in the schedule table. The ATM always sends a single
cell during the CBR connection’s assigned cell slot.
VBR-rt (Variable Bit Rate real-time):VBR-rt is intended for real-time applications, such as
compressed voice over IP and video conferencing, that
require tightly constrained delays and delay variation. VBR-rt
is characterized by a peak cell rate (PCR), sustained cell rate
(SCR), and maximum burst rate (MBR).
PCR (Peak Cell Rate) in kbps: The maximum rate at which you expect to transmit data,
voice and video. Consider PCR and MBS as a means of
reducing lantency, not increasing bandwidth. The range of
PCR is 64kbps to 2400kbps
SCR (Sustained Cell Rate): The sustained rate at which you expect to transmit data,
voice and video. Consider SCR to be the true bandwidth of a
VC and not the long-term average traffic rate. The range of
SCR is 64kbps to 2400kbps.
MBS (Maximum Burst Size): The amount of time or the duration at which the router
sends at PCR. The range of MBS is 1 cell to 255 cells.
Click Finish to finish setting.
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press Continue to setup other parameters.
38 NB712 / NB714 User Guide
YML829 Rev1
8.3 Bridge
If your router is setup in bridge mode and you want to setup advanced filter functions, you can use the BRIDGE
menu to setup the filter and blocking functions.
Click Bridge to setup.
Press Add to add the static bridge information.
If you want to filter the MAC address of a LAN PC to access the Internet, press Add to establish the filtering table.
Enter the MAC address in the MAC address field and select Filter in the LAN field.
If you want to filter the MAC address of WAN PC to access the LAN, press Add to establish the filtering table.
Enter the MAC address in the MAC address field and select Filter in the WAN field. For example: if your VC is
setup at WAN 1, select WAN 1 Filter.
NB712 / NB714 User Guide 39
YML829 Rev1
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press Continue to setup other parameters.
40 NB712 / NB714 User Guide
YML829 Rev1
8.4 VLAN
Virtual LAN (VLAN) is defined as a group of devices on one or more LANs that are configured so that they can
communicate as if they were attached to the same wire, when in fact they are located on a number of different
LAN segments. Because VLAN is based on logical instead of physical connections, it is extremely flexible.
Click VLAN to configure VLAN.
Two types of VLAN are supported: either 802.1Q or Port-Based. Note that only one type of VLAN can be
configured at a time.
For setting 802.1Q VLAN click the 802.1Q Tag-Based VLAN and click Reset. The screen will display as follows:
NB712 / NB714 User Guide 41
YML829 Rev1
VID: Virtual LAN ID is a defined ID number from 1 to 4094.
PVID: Port VID is an untagged member of a default VLAN.
Link Type: Access means the port can receive or send untagged
packets.
Link Type: Trunk means that the port can receive or send tagged
packets.
Port-Based VLANs are VLANs where the packet forwarding decision is based on the destination MAC address and
its associated port.
Click Port-Based VLAN to configure the router and press Reset.
42 NB712 / NB714 User Guide
YML829 Rev1
8.5 Route
If the Router is connected to more than one network, it may be necessary to set up a
static route between them. A static route is a pre-determined pathway that network
information must travel to reach a specific host or network.
With Dynamic Routing, you can enable the Router to automatically adjust to physical
changes in the network’s layout. The Router, using the RIP protocol, determines the
network packets’ route based on the least number of hops between the source and the
destination. The RIP protocol regularly broadcasts routing information to other routers
on the network.
Click Route to modify the routing information.
To modify the RIP (Routing Information Protocol) Parameters:
RIP Mode: Enable
Auto RIP Summary: Enable
Press Modify
RIP Mode: This parameter determines how RIP (Routing Information
Protocol) is handled. RIP allows it to exchange routing
information with other routers. If set to Disable, the gateway
does not participate in any RIP exchange with other routers.
If set to Enable, the router broadcasts the routing table of the
router on the LAN and incorporates RIP broadcasts by other
routers into it’s routing table. If set to silent, the router does
not broadcast the routing table, but it accepts RIP broadcast
packets that it receives.
NB712 / NB714 User Guide 43
YML829 Rev1
RIP Version: It determines the format and broadcasting method of any
RIP transmissions by the gateway.
RIP v1: it only sends RIP v1 messages only.
RIP v2: it send RIP v2 messages in multicast and broadcast
format.
Authentication required:None: for RIP, there is no need of authentication code.Password: the RIP is protected by password, authentication
code.
MD5: The RIP will be decoded by MD5 rather than be
protected by password, authentication code.
Poison Reverse:Poison Reverse promptly broadcasts or multicasts the RIP
while the route is changed. (e.g. shutting down one of the
routers in routing table)
Enable: the gateway will actively broadcast or multicast the
information.
Disable: the gateway will not broadcast or multicast the
information.
After modifying the RIP parameters, press finish.
The screen will display the modified parameters. Check the parameters and press Restart to restart the router or
press Continue to setup other parameters.
44 NB712 / NB714 User Guide
YML829 Rev1
8.6 NAT/DMZ
NAT (Network Address Translation) is the translation of an Internet Protocol address
(IP address) used within one network to a different IP address known within another
network. One network is designated as the inside network and the other is the
outside. Typically, a company maps its local inside network addresses to one or more
global outside IP address and changes the global IP addresses of incoming packets
back into local IP addresses. This ensures security since each outgoing or incoming
request must go through a translation process that also offers the opportunity
to qualify or authenticate the request or match it to a previous request. NAT also
conserves the number of global IP addresses that a company needs and lets the
company use a single IP address for its communication in the Internet world.
DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral
zone” between a company private network and the outside public network. It prevents
outside users from getting direct access to a server that has company private data.
In a typical DMZ configuration for an enterprise, a separate computer or host receives requests from users within
the private network to access Web sites or other companies accessible on the public network. The DMZ host then
initiates sessions for these requests to the public network. However, the DMZ host is not able to initiate a session
back into the private network. It can only forward packets that have already been requested.
NB712 / NB714 User Guide 45
YML829 Rev1
Users of the public network outside the company can access only the DMZ host. The DMZ may typically also have
the company’s Web pages so these could serve the outside world. However, the DMZ provides access to no other
company data. In the event that an outside user penetrated the DMZ host’s security, the Web pages might be
corrupted, but no other company information would be exposed.
Press NAT/DMZ to setup the parameters.
If you want to enable the NAT/DMZ functions, click Enable. Enable the DMZ host Function uses the IP address
assigned to the WAN for enabling DMZ functions for the virtual IP address.
Multi-DMZ: Some users who have two or more global IP addresses
assigned by their ISP can be used as a multi DMZ. The
table is for the mapping of global IP address and virtual IP
address.
Multi-NAT: Some of the virtual IP addresses (e.g.: 192.168.1.10
~ 192.168.1.50) collectively use two of the global IP
addresses (e.g.: 69.210.1.9 and 69.210.1.10). The Multi-
NAT table will be setup as;
Virtual Start IP Address: 192.168.1.10
Count: 40
Global Start IP Address: 69.210.1.9
Count: 2
Press Finish to continue.
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM. Press Restart to restart the router with new parameters or Continue to configure other parameters.
46 NB712 / NB714 User Guide
YML829 Rev1
8.7 Virtual Server
Virtual Server allows specific ports on the WAN interface to be re-mapped to
services inside the LAN. For example, 69.210.1.8 is assigned to WAN by the ISP
and is visible to the Internet but does not actually have any services (other than NAT)
running on the gateway. TCP requests made to 69.210.1.8:80 are remapped to
the server 1 on 192.168.1.2:80 for working days from Monday to Friday 8 AM to
6PM, other requests with UDP made to 69.210.1.8:25 are remapped to server 2 on
192.168.1.3:25 which is always on.
You can setup the router as Index 1, protocol TCP, interface WAN1, service name
test1, private IP 192.168.1.2, private port 80, public port 80, schedule from
Day Monday to Friday and time 8:0 to 16:0 and index 2, protocol UDP, interface
WAN1, service name test2, private IP 192.168.1.3, private port 25, public port 25,
schedule always.
Click Modify to configure the parameters.
Press Restart to restart the router or press continue to setup another function.
NB712 / NB714 User Guide 47
YML829 Rev1
8.8 Firewall
A firewall is a set of related programs that protect the resources of a private network from other networks. It
prevents unauthorised users from accessing private data and resources accidentally.
Basic Firewall Security
This level only enables the NAT firewall and the remote management security. The NAT firewall will take effect if
the NAT function is enabled. The default remote management security is to block any WAN side connection to the
device. Non-empty legal IP pool in ADMIN will block all remote management connection except those IPs specified
in the pool.
Press Finish to finish setting up the firewall The screen will display the parameters, which will be written to
EPROM. Check the parameters.
Press restart to restart the router or press continue to setup another function.
48 NB712 / NB714 User Guide
YML829 Rev1
Automatic Firewall Security
Select Automatic Firewall Security. This level enables basic firewall security as well as all DoS protection and the
SPI filter function. Press Finish to finish setting up the firewall.
The screen will display the parameters, which will be written to EPROM. Check the parameters.
Press restart to restart the router or press Continue to setup another function.
NB712 / NB714 User Guide 49
YML829 Rev1
Advanced Firewall Security
You can determine the security level for special purpose, environment, and applications by configuring DoS
protection and defining an extra packet filter with higher priority than the default SPI filter. Note that an improper
filter policy may degrade the capability of the firewall and/or even block the normal network traffic.
Click Advanced Firewall Security and then press Finish.
SYN Attack:A SYN flood attack attempts to slow your network by
requesting new connections but not completing the process
to open the connection. Once the buffer for these pending
connections is full a server will not accept any more
connections and will be unresponsive.
ICMP Flood: A sender transmits a volume of ICMP request packets to
cause all CPU resources to be consumed serving the phony
requests.
UDP Flood: A sender transmits a volume of requests for UDP diagnostic
services which cause all CPU resources to be consumed
serving the phony requests.
50 NB712 / NB714 User Guide
YML829 Rev1
Ping of Death:A ping of death attack attempts to crash your system by
sending a fragmented packet, when reconstructed is larger
than the maximum allowable size. Other known variants of
the ping of death include teardrop, bonk and nestea.
Land Attack:A land attack is an attempt to slow your network down
by sending a packet with identical source and destination
addresses originating from your network.
IP Spoofing:IP Spoofing is a method of masking the identity of an
intrusion by making it appeared that the traffic came from
a different computer. This is used by intruders to keep their
anonymity and can be used in a Denial of Service attack.
Smurf Attack:A smurf attack involves two systems. The attacker sends
a packet containing a ICMP echo request (ping) to the
network address of one system. This system is known as the
amplifier. The return address of the ping is faked (spoofed)
to appear to come from a machine on another network (the
victim). The victim is then flooded with responses to the
ping. As many responses are generated for only one attack,
the attacker is able use many amplifiers on the same victim.
Traditional firewalls are stateless meaning they have no memory of the connections of data or packets that pass
through them. Such IP filtering firewalls simply examine header information in each packet and attempt to match
it to a set of defined rule. If the firewall finds a match, the prescribed action is taken. If no match is found, the
packet is accepted into the network, or dropped, depending on the firewall configuration.
A stateful firewall maintains a memory of each connection and data passing through it. A stateful firewall records
the context of connections during each session, continuously updating state information in dynamic tables. With
this information, stateful firewalls inspect each connection traversing each interface of the firewall, testing the
validity of data packets throughout each session. As data arrives, it is checked against the state tables and if the
data is part of the session, it is accepted. Stateful firewalls enable a more intelligent, flexible and robust approach
to network security, while defeating most intrusion methods that exploit state-less IP filtering firewalls.
NB712 / NB714 User Guide 51
YML829 Rev1
If you want to configure the Packet Filtering Parameters, choose Enable and press Add.
Select the protocol and configure the parameters.
If you want to ban all of the protocol from the IP (e.g.: 200.1.1.1) to access the all PCs (e.g.: 192.168.1.2 ~
192.168.1.50) in the LAN, key in the parameter as;
Protocol: ANY
Direction: INBOUND (INBOUND is from WAN to LAN, and OUTBOUND is
LAN to WAN.)
Description: Hacker
Src. IP Address: 200.1.1.1
Dest. IP Address: 192.168.1.2-192.168.1.50
Press OK to finish.
The screen will display the configured parameters. Check the parameters.
Click Restart to restart the gateway or Continue to configure another parameters.
IndexProtocolDirectionActionSourceDestination Source Port Dest. Port
1TCPInboundPermitExternalInternal>102325
2TCPOutboundPermitInternalExternal25>1023
3TCPOutboundPermitInternalExternal>102325
4TCPInboundPermitExternalInternal25>1023
5AnyEitherDenyAnyAnyAnyAny
Filtering Result
IndexProtocolDirectionActionSourceDestination Source Port Dest. Port
1TCPInboundPermit(A)192.168.3.4 171.16.1.1123425
2TCPOutboundPermit(B)171.16.1.1192.168.3.4 251234
3TCPOutboundPermit(C)171.16.1.1192.168.3.4 135725
4TCPInboundPermit(D)192.168.3.4 171.16.1.1251357
5TCPInboundDeny(E)10.1.2.3171.16.3.451506000
6TCPOutboundDeny(E)171.16.3.410.1.2.360005150
54 NB712 / NB714 User Guide
YML829 Rev1
Rule Order
The order of the rules affects the filtering result. The filtering process will proceed from top to bottom, changing
the order will give a different result. For example:
Rule Source Address Destination Address Action
A 10.0.0.0 172.16.6.0 Permit
B 10.1.99.0 172.16.0.0 Deny
C Any Any Deny
Where “0” at the last eight bits indicates “from 1 to 254”, “0” at any eight bits preceding “0”, “0.0” or “0.0.0”
indicates “from 1 to 254”. On the other hand, “0” and all “0” successive with “0” represents any.
When the rule is ordered as ABC.
Index Source Address Destination Address Action
1 10.1.99.1 172.16.1.1 Deny (B)
2 10.1.99.1 172.16.6.1 Permit (A)
3 10.1.1.1 172.16.6.1 Permit (A)
4 10.1.1.1 172.16.1.1 Deny (C)
5 192.168.3.4 172.16.6.1 Deny (C)
The rule order will permit 10.1.99.1 to access 172.16.6.1.
When the rule is ordered as BAC.
Index Source Address Destination Address Action
1 10.1.99.1 172.16.1.1 Deny (B)
2 10.1.99.1 172.16.6.1 Deny (B)
3 10.1.1.1 172.16.6.1 Permit (A)
4 10.1.1.1 172.16.1.1 Deny (C)
5 192.168.3.4 172.16.6.1 Deny (C)
The rule order will deny 10.1.99.1 to access 172.6.6.1.
NB712 / NB714 User Guide 55
YML829 Rev1
8.9 IP QoS
IP QoS allows you to prioritise different types of traffic, thereby ensuring Quality of
Service. This is particularly useful for Voice over IP (VoIP) where the amount of bandwidth
can affect the line quality in a phone call.
Select Enable to enable IP QoS and then click on the Add button to set the IP QoS Policy
parameters.
Enter the information to define the Policy Rule and click on the OK button.
56 NB712 / NB714 User Guide
YML829 Rev1
The screen will display the configured parameters. Check the parameters. In this example 192.168.1.60 is the
highest priority; 192.168.1.50 is the second high priority; 192.168.1.40 is the third highest priority and so on.
NB712 / NB714 User Guide 57
YML829 Rev1
9 Administration
This section details security, simple network management protocol (SNMP) and time
synchronous.
58 NB712 / NB714 User Guide
YML829 Rev1
9.1 Security
For system security, it is suggested that the default user name and password is changed
from the default.
There are three ways to configure the route: Web browser, telnet and serial console.
Press Security to setup the parameters.
For greater security, define the Supervisor ID and password for the gateway. If you don’t
set them, all users on your network will be able to access the gateway.
You can authorize up to five users to access the router via telnet or console. There are
two UI modes, menu driven mode and command mode to configure the router.
NB712 / NB714 User Guide 59
YML829 Rev1
Trusted Host address pool will setup the IP addresses from which authorized users can configure the gateway.
This is the most secure way to setup and control authorised access to the router.
Configured 0.0.0.0 will allow all hosts on Internet or LAN to access the router.
Leaving blank the Trust Host List will block all PCs from WAN to access the router. I.e. only PCs on the LAN would
be able to access the router.
If you type the exact IP address in the field, only that host can access the router.
Click Finish to finish the setting.
The browser will display the configured parameters and check it before writing them to EPROM.
Press Restart to restart the gateway working with the new parameters and press Continue to setup other
parameters.
60 NB712 / NB714 User Guide
YML829 Rev1
9.2 SNMP
Simple Network Management Protocol (SNMP) provides for the exchange of messages
between a network management client and a network management agent for remote
management of network nodes. These messages contain requests to get and set
variables that exist in network nodes in order to obtain statistics, set configuration
parameters, and monitor network events. SNMP communications can occur over the
LAN or WAN connection.
The router can generate SNMP traps to indicate alarm conditions, and it relies on
SNMP community strings to implement SNMP security. This router support MIB I and
MIB II.
Click SNMP to configure the parameters.
In the table of current community pool, you can setup the access authority.
In the table of current trap host pool, you can setup the trap host.
Click on the Modify button to modify the community pool.
NB712 / NB714 User Guide 61
YML829 Rev1
SNMP status: Enable
Access Right: Deny for deny all access
Access Right: Read for access read only
Access Right: Write for access read and write.
Community: Serves as password for access right.
Click on the OK button to submit the changes.
62 NB712 / NB714 User Guide
YML829 Rev1
SNMP trap is an informational message sent from an SNMP agent to a manager. Click Modify to modify the trap
host pool.
Version: Select version for trap host (SNMP v1 or SNMP v2).
IP: Type the trap host IP
Community: Type the community password. The community is setup in
community pool.
Click on OK to finish the setup.
The browser will display the configured parameters.
Press Restart to restart the gateway with the new parameters or press Continue to setup other parameters.
NB712 / NB714 User Guide 63
YML829 Rev1
9.3 Time Sync
Time synchronization is an essential element for any business that relies on an IT system.
The reason for this is that these systems all have clocks that are the source of time for files
or operations they handle. Without time synchronization, time on these systems can vary
and cause firewall packet filtering schedule processes to fail, security to be compromised,
and virtual servers to work in wrong schedule.
Click on TIME SYNC.
There are two synchronization modes: Simple Network Time Protocol (SNTP) and
synchronization with PC. For synchronization with PC, select Sync with PC. The gateway will
synchronize the time with the connecting PC.
SNTP is the acronym for Simple Network Time Protocol, which is an adaptation of the Network Time Protocol
(NTP) used to synchronize computer clocks in the Internet. SNTP can be used to ensure the ultimate performance
of full NTP implementation.
64 NB712 / NB714 User Guide
YML829 Rev1
For SNTP, select SNTP v4.0.
SNTP service: Enable
Time Server: Any time server in the world can be used but it is suggested
that you use the nearest timeserver.
Time Zone: You have to choose the right time zone.
Click on Finish to finish the setup. The browser will display the configured parameters.
Press Restart to restart the gateway with the new parameters or press Continue to setup other parameters.
NB712 / NB714 User Guide 65
YML829 Rev1
10 Utility
This section describes the utility of the router including system information, loading the
factory default configuration, upgrading the firmware, logout and restarting the gateway.
66 NB712 / NB714 User Guide
YML829 Rev1
10.1 System Info
Click on System Info to review the information.
The browser will display your system information on the screen.
NB712 / NB714 User Guide 67
YML829 Rev1
10.2 Config Tool
This configuration tool has three functions: Load Factory Default, Restore Configuration and
Backup Configuration.
Press Config Tool.
Choose the function and then click on Finish.
Load Factory Default function: Will reload the factory default parameters to the gateway.
Note: All of the settings will be changed to factory default. On the other hand you will
lose all the configured parameters.
Restore Configuration: Will help you to recover your backup configuration:
* Click Finish after selecting Restore Configuration.
* Browse the router for the backup file and then click
Finish. The router will automatically restore the saved
configuration.
Backup Configuration: Any changes to the default configuration should be backed
up. Use this function to backup your router parameters on a
PC.
* Select Backup Configuration and then press Finish.
* Browse the place of backup file named backup.
Press Finish. The router will automatically backup the
configuration.
68 NB712 / NB714 User Guide
YML829 Rev1
10.3 Upgrade
You can upgrade the gateway using the upgrade function.
Press Upgrade.
Browse the file and press OK button to upgrade. The system will reboot automatically after
finishing.
NB712 / NB714 User Guide 69
YML829 Rev1
10.4 Logout
To logout the router, press logout.
70 NB712 / NB714 User Guide
YML829 Rev1
10.5 Restart
To restart the router, select Restart in UTILITY.
Click on the Restart button to reboot the router.
NB712 / NB714 User Guide 71
YML829 Rev1
11 Status
You can monitor the following:
• SHDSL status including mode, Tx power, Bitrate, and Performance
information including SNR margin, attenuation and CRC error count.
• LAN status will display the MAC address, IP address, Subnet mask and
DHCP client table.
• WAN status will display the WAN interface information.
• Route status will display the routing table of router.
• Interface status includes LAN and WAN statistics information.
• Firewall status display DoS protection status and dropped packets
statistics.
72 NB712 / NB714 User Guide
YML829 Rev1
12 LAN-to-LAN connection with bridge Mode
12.1 CO side
Click Bridge and CO Side to setup Bridging mode of the Router and then click Next.
LAN Parameters
NB712 / NB714 User Guide 73
YML829 Rev1
Enter IP: 192.168.1.1
Enter Subnet Mask: 255.255.255.0
Enter Gateway: 192.168.1.1
Enter Host Name: SOHO
WAN1 Parameters
Enter VPI: 0
Enter VCI: 32
Encap: Click LLC
Click Next
The screen will display the configured parameters. Check the parameters and click Restart . The router will reboot
with the new settings.
74 NB712 / NB714 User Guide
YML829 Rev1
12.2 CPE Side
Click Bridge and CO Side to setup Bridging mode of the Router and then click Next.
LAN Parameters
IP Address: Enter192.168.1.2
Subnet Mask: Enter 255.255.255.0
Gateway: Enter 192.168.1.2
Host Name: Enter SOHO
WAN1 Parameters
VPI: 0
VCI: 32
Encap: LLC
Click Next
The screen will display the configured parameters. Check the parameters and click Restart . The router will reboot
with the new settings.
NB712 / NB714 User Guide 75
YML829 Rev1
13 LAN to LAN Connection with Routing Mode
13.1 CO side
Click ROUTE and CO Side then press Next.
LAN parameters:
IP Address: 192.168.20.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
DHCP Service: For more DHCP service, review DHCP Service.
76 NB712 / NB714 User Guide
YML829 Rev1
WAN Parameters
VPI: 0
VCI: 32
AAL5 Encap: LLC
Protocol: IPoA , EoA , IPoA + NAT or EoA + NAT
Note: The Protocol used in CO and CPE have to be the same.
Click Next to setup the IP parameters.
Refer to the section NAT/DMZ for more information.
IP Address: 192.168.30.1
Subnet mask: 255.255.255.0
Gateway: 192.169.30.2
Click Next
The screen will display the parameters that will be written to EPROM. Check the parameters before writing to
EPROM.
Press Restart to restart the router with the new parameters or press continue to setup other parameters.
NB712 / NB714 User Guide 77
YML829 Rev1
13.2 CPE side
Click ROUTE and CPE Side then press Next.
LAN parameters:
IP Address: 192.168.10.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
DHCP Service: For more DHCP service, review DHCP Service.
WAN Parameters
78 NB712 / NB714 User Guide
YML829 Rev1
VPI: 0
VCI: 32
AAL5 Encap: LLC
Protocol: IPoA , EoA , IPoA + NAT or EoA + NAT
Note: The Protocol used in CO and CPE have to be the same.
Click Next to setup the IP parameters.
Refer to the section NAT/DMZ for more information.
IP Address: 192.168.30.2
Subnet mask: 255.255.255.0
Gateway: 192.168.30.1
Click Next
The screen will display the parameters that will be written to EPROM. Check the parameters and click the Restart
button to restart the router with the new parameters or press continue to setup other parameters.
NB712 / NB714 User Guide 79
YML829 Rev1
14 Configuration via Serial Console or Telnet with Menu Driven
Interface
14.1 Serial Console
Check the connectivity of the RS-232 cable from your computer to the serial port of ROUTER. Start your terminal
access program with VT100 terminal emulation. Configure the serial link with the following value:
Parameter Value
Baudrate 9600
Data Bits 8
Parity Check No
Stop Bits 1
Flow-control No
Press the SPACE key until the login screen appears. When you see the login screen, you can logon to Router.
Note: You have to use the SPACE key. Pressing other keys will not work.
User: admin
Password: *****
Note: The factory default user and passwords are both “admin”.
14.2 Telnet
Make sure the correct Ethernet cable is used to connect the LAN port of your computer to the Router. The LAN
LNK indicator on the front panel will glow if the correct cable is used. Start your Telnet client with a VT100
terminal emulation and connect to the management IP of Router. When the login screen appears enter your User
name and Password.
User: admin
Password: *****
Note: The default IP address is 192.168.1.1.
80 NB712 / NB714 User Guide
YML829 Rev1
14.3 Operation Interface
For serial console and Telnet management, the Router implements two operational interfaces: command line
interface (CLI) and menu driven interface. The CLI mode provides users with a simple command line interface.
The menu driven interface is a more user-friendly interface for general operations. The command syntax for CLI
is the same as that of the menu driven interface. The only difference is that the menu driven interface displays all
available commands for you to select. This means that you don’t need to remember the command syntax and can
save you time by not requiring you to type the whole command line.
The following figure gives you an example of the menu driven interface. In the menu, you scroll up/down by
pressing key I / K, select one command by key L, and go back to a higher level of menu by key J. For example, to
show the system information, just logon to the Router, move down the cursor by pressing key K twice and select
“show” command by pressing key L, you shall see a submenu and select “system” command in this submenu,
then the system will display the general information.
NB712 / NB714 User Guide 81
YML829 Rev1
14.4 Window structure
From top to bottom, the window will be divided into four parts:
1. Product name
2. Menu field: Menu tree is prompted on this field. “>>” symbol indicates the cursor place.
3. Configuring field: You will configure the parameters in this field. < parameters > indicates the
parameters you can choose and < more…> indicates that there have submenu in the title.
4. Operation command for help
The following table shows the parameters in the brackets.
Command Description
<ip> An item enclosed in brackets is required. If the item is shown
in lower case bold, it represents an object with special
format. For example, <ip> may be 192.168.1.3.
<Route|Bridge> Two or more items enclosed in brackets and separated by
vertical bars means that you must choose exactly one of the
items. If the item is shown in lower case bold with leading
capital letter, it is a command parameter. For example, Route
is a command parameter in <Route|Bridge>.
[1~1999] An item enclosed in brackets is optional.
[1~65534|-t] Two or more items enclosed in brackets and separated by
vertical bars means that you can choose one or none of the
items.
82 NB712 / NB714 User Guide
YML829 Rev1
14.5 Menu Driven Interface Commands
Before changing the configuration, familiarize yourself with the operations list in the following table. The Keystroke
list are also displayed on the window.
Menu Driven Interface Commands
Keystroke Description
[UP] or I Move to above field in the same level menu.
[DOWN] or K Move to below field in the same level menu.
[LEFT] or J Move back to previous menu.
[RIGHT] or L Move forward to submenu.
[ENTER] Move forward to submenu.
[TAB] To choose another parameters.
Ctrl + C To quit the configuring item.
Ctrl + Q For help
NB712 / NB714 User Guide 83
YML829 Rev1
14.6 Menu Tree
The menu tree is shown below. All configuration commands are included in the Enable directory and are
protected by a supervisor password. Unauthorized users can view the status and configuration of the router, but
cannot change any configuration information.
84 NB712 / NB714 User Guide
YML829 Rev1
14.7 Configuration
To setup the router, move the cursor “ >>” to Enable and press the enter key. When the screen appears, type the
supervisor password. The default supervisor password is admin. The password will be prompted as a “ * “ symbol
for system security.
---------------------------------------------------------------------Command: enable <CR>
Message: Please input the following information.
Supervisor password: ****
In this sub menu, you can setup management features and upgrade software, backup the system configuration
and restore the system configuration via utility tools.
Any changes will need to be written to EPROM and the router will need to be rebooted to work with the new
settings.
The screen will prompt as follow.
>> enable Modify command privilege
setup Configure system
status Show running system status
show View system configuration
write Update flash configuration
reboot Reset and boot system
ping Packet internet groper command
admin Setup management features
utility TFTP upgrade utility
exit Quit system
The description of the commands are:
Command Description
enable Modify command privilege. When you login via serial
console or Telnet, the router defaults to a program execution
(read-only) privileges. To change the configuration and write
changes to nonvolatile RAM (NVRAM), you must work in
enable mode.
setup To configure the product, you have to use the setup
command.
status View the status of product.
show Show the system and configuration of product.
write Update flash configuration. After you have completed all
necessary settings, write the new configuration to NVRAM
by the “write” command and reboot the system, or all of your
changes will not take effect.
reboot Reset and boot system. After you have completed all
necessary changes, write the new configuration to NVRAM
and reboot the system by “reboot” command, or all of your
changes will not take effect.
NB712 / NB714 User Guide 85
YML829 Rev1
Command Description
ping Packet internet groper command.
admin You can set management features with this command.
utility Upgrade software and backup and restore configuration are
done via “utility” command.
exit Quit system
86 NB712 / NB714 User Guide
YML829 Rev1
14.8 Status
You can view the status of SHDSL, WAN, route and interface via the status command.
Move cursor “ >> “ to status and press enter.
>> shdsl Show SHDSL status
wan Show WAN interface status
route Show routing table
interface Show interface statistics status
firewall Show firewall status
Command Description
shdsl The SHDSL status includes line rate, SNR margin, TX
power, attenuation and CRC error of the product, and SNR
margin, attenuation and CRC error of remote side. The
product access remote side information via EOC (embedded
operation channel).
wan WAN status shows the 8 PVC information which are
configured.
route You can see the routing table via the route command.
interface The statistic status of WAN and LAN interface can be
monitor by interface command.
firewall The current and history status of firewall are shown in this
command.
NB712 / NB714 User Guide 87
YML829 Rev1
14.9 Show
You can view the system information, configuration and configuration via the show command.
Move cursor “ >> “ to show and press enter.
>> system Show general information
config Show all configuration
script Show all configuration in command script
Command Description
system The general information of the system is displayed.
script Configuration information will display in the command script.
88 NB712 / NB714 User Guide
YML829 Rev1
14.10 Write
Any changes to the router configuration must be written to EPROM using the write command and the router
needs to be rebooted for the changes to take affect.
Move cursor to “ >> “ to write and press enter.
---------------------------------------------------------------------Command: write <CR>
Message: Please input the following information.
Are you sure? (y/n): y
To reboot the router, use reboot command. Move cursor to “ >> “ to write and press enter.
---------------------------------------------------------------------Command: reboot <CR>
Message: Please input the following information.
Do you want to reboot? (y/n): y
Ping command will be used to test the connection of the router. Move cursor “ >> “ to ping and press enter.
---------------------------------------------------------------------Command: ping <ip> [1~65534|-t] [1~1999]
Message: Please input the following information.
IP address <IP> : 10.0.0.1
Number of ping request packets to send (TAB select): -t
Data size [1~1999]: 32
There are 3 types of number of ping request packet to send, default, 1~65534 and –t. Default will send 4 packet
and –t continuous packet until you key in Ctrl+c to stop.
14.13 Administration
You can modify the user profile, telnet access, SNMP (Sample Network Management Protocol), supervisor
information and SNTP (Simple Network Time Protocol) in admin. The route is enable ==> admin.
For configuration the parameters, move the cursor “ >> “ to admin and press enter.
>> user Manage user profile
security Setup system security
snmp Configure SNMP parameter
passwd Change supervisor password
id Change supervisor ID
sntp Configure time synchronization
NB712 / NB714 User Guide 89
YML829 Rev1
14.13.1 User Profile
You can use the user command to clear, modify and list the user profiles. You can define up to five users to access
the router via console port or telnet in user profile table however users who have the supervisor password can
change the configuration of the router. Move the cursor “ >> “ to user and press enter key.
>> clear Clear user profile
modify Modify the user profile
list List the user profile
You can delete the user by number using the clear command. Make sure the number of the user is correct. You
can use list command to check it. Modify command is to modify any user information or add a new user to user
profile.
To modify or add a new user, move the cursor to modify and press enter.
---------------------------------------------------------------------Command: admin user modify <1~5> <more...>
Message: Please input the following information.
Legal access user profile number <1~5> : 2
There are two UI mode, command and menu mode, to setup the product. We will not discuss command mode in
this manual.
14.13.2 Security
Security command can be configured sixteen legal IP address for telnet access and telnet port number.
Move the cursor “ >> “ to security and press enter. The default legal address is 0.0.0.0 which means that there is
no IP restriction to access the router via telnet.
>> port Configure telent TCP port
ip_pool Legal address IP address pool
list Show security profile
90 NB712 / NB714 User Guide
YML829 Rev1
14.13.3 SNMP
Simple Network Management Protocol (SNMP) is the protocol not only governing network management, but also
the monitoring of network devices and their functions.
The router can generate SNMP traps to indicate alarm conditions, and it relies on SNMP community strings to
implement SNMP security. This router supports MIB I & II.
Move the cursor “ >> “ to snmp and press enter.
>> community Configure community parameter
trap Configure trap host parameter
Up to 5 SNMP community entries can be configured in this system. Move the cursor to community and press
enter.
---------------------------------------------------------------------Command: admin snmp community <1~5> <more...>
Message: Please input the following information.
Community entry number <1~5> : 2
>> edit Edit trap host parameter
list Show trap configuration
NB712 / NB714 User Guide 91
YML829 Rev1
14.13.4 Supervisor Password and ID
The supervisor password and ID are the last door for security but the most important. Users who access the
router via web browser have to use the ID and password to configure the router and users who access the router
via telnet or console mode have to use the password to configure the router. Change the ID and password after
configuration and save it. When you access to the router again, you have to use the new password.
---------------------------------------------------------------------Command: admin passwd <pass_conf>
Message: Please input the following information.
Input old Supervisor password: ****
Input new Supervisor password: ********
Re-type Supervisor password: ********
---------------------------------------------------------------------Command: admin id <pass_conf>
Message: Please input the following information.
Legal user name (Enter for default) <root> : test
Time synchronization is an essential element for any business that relies on an IT system. The reason for this is
that these systems all have clocks that are the source of time for files or operations they handle. Without time
synchronization, time on these systems can vary and this can cause virtual server schedule processes to fail and
system log exposures with wrong data.
There are two methods to synchronize time: synchronize with a PC or SNTPv4. If you choose synchronize with
PC, the router will synchronize with a PC. If you choose SNTPv4, the router will use the protocol to synchronize
with the time server. Synchronization with time server, SNTP v4, needs to configure service, time_server and
time_zone. Synchronization with PC does not require the above parameters.
Move the cursor “ >> “ to sntp and press enter.
>> method Select time synchronization method
service Tigger SNTP v4.0 service
time_server1 Configure time server 1
time_server2 Configure time server 2
time_server3 Configure time server 3
updaterate Configure update period
time_zone Configure GMT time zone offset
list Show SNTP configuration
To configure SNTP v4 time synchronization, follow the procedures detailed below:
Move the cursor to method and press enter.
---------------------------------------------------------------------Command: admin sntp method <SNTPv4|SyncWithPC>
Message: Please input the following information.
SYNC method (Enter for default) <SyncWithPC> : SNTPv4
---------------------------------------------------------------------Command: admin sntp service <Disable|Enable>
Message: Please input the following information.
Active SNTP v4.0 service (Tab Select) <Enable> : Enable
---------------------------------------------------------------------Command: admin sntp time_server1 <string>
Message: Please input the following information.
Time server address(Enter for default) <ntp-2.vt.edu> : ntp-2.vt.edu
You can configure up to three time servers in this system.
Move the cursor to update_rate and press enter.
---------------------------------------------------------------------Command: admin sntp update_rate <10~268435455>
Message: Please input the following information.
Update period (secs) (Enter for default) : 86400
Move the cursor to time_zone and configure where your router is placed. The easiest way to know the time zone
offset hour is from your PC clock. Double click the clock at the right corner of monitor and check the time zone.
---------------------------------------------------------------------Command: admin sntp time_zone <-12~12>
Message: Please input the following information.
GTM time zone offset (hours) (Enter for default) : -8
There are three utility tools, upgrade, backup and restore, embedded in the firmware. You can update the new
firmware via TFTP upgrade tools and backup the configuration via TFTP backup tool and restore the configuration
via TFTP restore tool. For upgrade, TFTP server with the new firmware will be supported by supplier but for
backup and restore, you must have your own TFTP server to backup and restore the file.
Move the cursor “ >> “ to utility and press enter.
>> upgrade
Upgrade main software
backup
Backup system configuration
Restore
Restore system configuration
14.15 Exit
If you want to exit the system without saving, use exit command to quit system.
14.16 Setup
All of the setup parameters are located in the subdirectories of setup. Move the cursor “ >> “ to setup and press
enter.
>> mode Switch system operation mode
shdsl Configure SHDSL parameters
wan Configure WAN interface profile
bridge Configure transparent bridging
vlan Configure virtual LAN paramters
route Configure routing parameters
lan Configure LAN interface profile
ip_share Configure NAT/PAT parameters
firewall Configure Firewall parameters
dhcp Configure DHCP parameters
dns_proxy Configure DNS proxy parameters
hostname Configure local host name
default Restore factory default setting
14.16.1 Mode
The product can act as routing mode or bridging mode. The default setting is routing mode. You can change the
system operation mode by using mode command. Move the cursor “ >> “ to mode and press enter.
---------------------------------------------------------------------Command: setup mode <Route|Bridge>
Message: Please input the following information.
System operation mode (TAB select) <Route>: Route
You can setup the SHDSL parameters by the command shdsl. Move the cursor “ >> “ to shdsl and press enter.
>> mode Configure SHDSL mode
Link Configure SHDSL link
n*64 Configure SHDSL data rate
type Configure SHDSL annex type
clear Clear current CRC error count
margin Configure SHDSL SNR margin
There are two types of SHDSL mode, STU-R and STU-C. STU-R means the terminal of central office and STU-C
customer premises equipment.
Link type will be 2-wire or 4-wire mode according to the product. 4-wire product can be worked under 2-wire
mode.
You can set the data rate in multiples of 64Kbps where n is from 0 to 32. If you configure n to 0, the product will
perform in adaptive mode.
There are two types of SHDSL Annex type, Annex-A and Annex-B.
Clear command can clear CRC error count.
Generally, you do not need to change the SNR margin, which ranges from 0 to 10. The SNR margin is an index of
line connection. You can see the actual SNR margin in STATUS SHDSL. The larger the SNR margin, the better the
line connection. If you set SNR margin in the field as 2, the SHDSL connection will drop and reconnect when the
SNR margin is lower than 2. I.e., the device will reduce the line rate and reconnect for better line connection.
96 NB712 / NB714 User Guide
YML829 Rev1
14.16.3 WAN
The router supports up to 8 PVCs, private virtual circuits, and so you can setup up to 8 WANs; WAN1 to WAN8.
Move the cursor “ >> “ to wan and press enter. To setup WAN1, type 1.
---------------------------------------------------------------------Command: setup wan <1~8>
Message: Please input the following information.
Interface number <1~8>: 1
--------------------------------------------------------------------->> protocol Link type protocol
address IP address and subnet mask
vpi_vci Configure VPI/VCI value
encap Configure encapsulation type
qos Configure VC QoS
isp Configure account name, password and idle time
ip_type Configure IP type in PPPoA and PPPoE
list WAN interface configuration
There are four types of protocols, IPoA, EoA, PPPoA and PPPoE, which you can setup.
For dynamic IP of PPPoA and PPPoE, you do not need to setup the IP address and subnet mask.
There is an unique VPI and VCI value for Internet connection supported by ISP. The range of VIP is from 0 to 255
and VCI from 0 to 65535.
There are two types of encapsulation types, VC-Mux and LLC.
You can setup virtual circuit quality of service, VC QoS, using qos command. The product supports UBR, CBR,
VBR-rt and VBR-nrt. The peak cell rate can be configured from 64kbps to 2400kbps. Move the cursor to qos and
press enter.
ISP command can configure account name, password and idle time. Idle time can be from 0 minute to 300
minutes.
Most ISPs use dynamic IP for PPP connection but some will use static IP. Configure the IP type, dynamic or fixed,
via ip_type command.
You can review the WAN interface configuration via the list command.
NB712 / NB714 User Guide 97
YML829 Rev1
14.16.4 Bridge
You can setup the bridge parameters in bridge command. If the product is configured as a router, you do not want
to setup the bridge parameters. Move the cursor “ >> “ to bridge and press enter.
You can setup default gateway IP via gateway command.
You can define 20 sets of static bridge in static command. After entering static menu, the screen will prompt as
below:
>> add Add static MAC entry
delete Delete static MAC entry
modify Modify static MAC entry
list Show static bridging table
After enter add menu, the screen will prompt as follow
>> mac Configure MAC address
lan_port Configure LAN interface bridging type
wan1_port Configure WAN1 interface bridging type
wan2_port Configure WAN2 interface bridging type
wan3_port Configure WAN3 interface bridging type
wan4_port Configure WAN4 interface bridging type
wan5_port Configure WAN5 interface bridging type
wan6_port Configure WAN6 interface bridging type
wan7_port Configure WAN7 interface bridging type
wan8_port Configure WAN8 interface bridging type
list Show static bridging table
98 NB712 / NB714 User Guide
YML829 Rev1
14.16.5 VLAN
Virtual LAN (VLAN) is defined as a group of devices on one or more LANs that are configured so that they can
communicate as if they were attached to the same wire, when in fact they are located on a number of different
LAN segments. Because VLAN is based on logical instead of physical connections, it is extremely flexible.
You can setup the Virtual LAN (VLAN) parameters in vlan command. The router support the implementation of
VLAN-to-PVC only for bridge mode operation, i.e., the VLAN spreads over both the COE and CPE sides, where
there is no layer 3 routing involved. The unit supports up to 8 active VLANs with shared VLAN learning (SVL)
bridge out of 4096 possible VLANs specified in IEEE 802.1Q.
Move the cursor “ >> “ to vlan and press enter.
>> mode Trigger virtual LAN function
modify Modify virtual LAN rule
pvid Modify port default ID
link_mode Modify port link type
list Show VLAN configuration
To active the VLAN function, move the cursor “ >> “ to mode and press enter. The router supports two types of
VLAN, 802.11q and Port-Based. The IEEE 802.1Q defines the operation of VLAN bridges that permit the definition,
operation, and administration of VLAN topologies within a bridged LAN infrastructure. Port-Based VLANs are
VLANs where the packet forwarding decision is based on the destination MAC address and its associated port.
NB712 / NB714 User Guide 99
YML829 Rev1
14.16.6 802.11Q VLAN
Follow the following steps to configure 802.11q VLAN.
---------------------------------------------------------------------Command: setup vlan active <Disable|8021Q|Port>
Message: Please input the following information.
Tigger VLAN function (Tab select) <Disable>: 8021Q
To modify the VLAN rule, move the cursor “ >> “ to modify and press enter.
---------------------------------------------------------------------Command: setup vlan modify <1~8> <1~4094> <string>
Message: Please input the following information.
Rule entry index <1~8>: 1
VLAN ID (Enter for default) <1>: 10
VLAN port status (Enter for default): 11001
For each VLAN, VLAN ID is a unique number among 1~4095.
VLAN port status is a 12-digit binary number whose bit-1 location indicates the VLAN port membership in which
4MSBs and 8MSB represents LAN ports and WAN port, respectively. For example: the above setting means that
the VID 20 member port includes LAN1, LAN2 and WAN. The member ports are tagged members. Use PVID
command to change the member port to untagged members
To assign PVID (Port VID), move the cursor “>>” to PVID and press enter. The port index 1 to 4 represents LAN1
to LAN4 respectively and port index 5 to 12 represents WAN1 to WAN8. VID value is the group at which you want
to assign the PVID of the port. PVID is
---------------------------------------------------------------------Command: setup vlan pvid <1~12> <1~4094>
Message: Please input the following information.
Port index <1~12>: 1
VID Value (Enter for default) <10>: 10
To modify the link type of the port, move the cursor to link mode and press enter. There are two types of link:
access and trunk. Trunk link will send the tagged packet form the port and access link will send un-tagged packet
form the port. Port index 1 to 4 represents LAN1 to LAN4 respectively. According to the operation mode of the
device, link type of WAN port is automatically configured. If the product operates in bridge mode, the WAN link
type will be trunk, and in routing mode, access.
---------------------------------------------------------------------Command: setup vlan link_mode <1~12> <Access|Trunk>
Message: Please input the following information.
Port index <1~12>: 1
Port link type (Tab select) <Trunk>: Access