1.1 Features ..........................................................................................................................................4
4 Getting to know the router ........................................................................................................................14
4.1 Front Panel ....................................................................................................................................14
8.2 WAN ..............................................................................................................................................37
8.9 IP QoS ...........................................................................................................................................56
11 Status ...................................................................................................................................................72
12 LAN-to-LAN connection with bridge Mode ...............................................................................................73
12.1 CO side .......................................................................................................................................73
12.2 CPE Side ......................................................................................................................................75
13 LAN to LAN Connection with Routing Mode .............................................................................................76
13.1 CO side .......................................................................................................................................76
13.2 CPE side ......................................................................................................................................78
14 Configuration via Serial Console or Telnet with Menu Driven Interface ........................................................80
14.1 Serial Console ..............................................................................................................................80
14.8 Status ..........................................................................................................................................87
14.9 Show ...........................................................................................................................................88
Appendix B: Registration and Warranty Information ....................................................................................115
NB712 / NB714 User Guide 3
YML829 Rev1
1 Introduction
NetComm’s NB712 (2-wire) and NB714 (2 or 4-wire selectable) G.SHDSL 4-port Security Modem Routers deliver
symmetrical DSL services to small and medium size business making them an economical alternative to Leased
Line or ISDN services.
Available in two modem router configurations, the NB712 (2-wire) and NB714 (2 or 4-wire selectable) are capable
of providing data rates from 64kbps to 2.304Mbps (NB712) or 128kbps to 4.608Mbps (NB714) and fully comply
with the ITU-T G.991.2 standards.
The NetComm NB712 and NB714 Modem Routers combine integrated high-end Bridging/Routing capabilities
with advanced functions such as Multi-DMZ, virtual server mapping, and VPN pass-through. They also support
port-based VLAN and IEEE802.1q VLAN over an ATM network. An advanced Firewall with Stateful Packet
Inspection (SPI) and DoS protection, all combine to protect your network from outside intruders.
With 4 x 10/100 Base-T auto-sensing, auto-negotiation and auto-MDIX switching ports, the NetComm G.SHDSL
Modem Routers enable you to leverage the latest broadband technology to meet the growing need for high
performance data communication.
1.1 Features
• Easy configuration and management with password control for various applications and
environments
• Efficient IP routing and transparent learning bridge to support broadband Internet services
• VPN pass-through for PPTP/L2TP/IPSec Tunnelling
• Virtual LANs (VLANs) offering significant benefits in terms of efficient use of bandwidth, flexibility,
performance and security
• Built-in advanced SPI firewall
• Four 10/100Mbps Auto-negotiation and Auto-MDIX switching port for flexible local area network
connectivity
• DMZ host/Multi-DMZ/Multi-NAT enables multiple workstations on the LAN to access the Internet
• Full ATM protocol stack implementation over SHDSL
• PPPoA and PPPoE support user authentication with PAP/CHAP/MS-CHAP
• SNMP management with SNMPv1/SNMPv2 agent and MIB II
• Obtain enhancements and new features via Internet software upgrade
1.2 Package Contents
The following items are included in your G.SHDSL Modem Router pack:
• NB712 (2-wire)714 (2 or 4-wire selectable) G.SHDSL Router
• 15V AC 1.0 Amp power supply
• RS232 Console Cable
• RJ11 ADSL line connection cable
• RJ45 10/100 Ethernet cable
• User Guide CD
If any of the above items are missing or damaged, please content NetComm immediately.
4 NB712 / NB714 User Guide
YML829 Rev1
1.3 Specification
Routing
• Supports IP/TCP/UDP/ARP/ICMP/IGMP protocols
• IP routing with static routing and RIPv1/RIPv2 (RFC1058/2453)
• Application level gateway for URL and keyword blocking
• User access control: deny certain PCs access to Internet service
Management
• Easy-to-use web-based GUI for quick setup, configuration and management
• Menu-driven interface/Command-line interface (CLI) for local console and Telnet access
• Password protected management and access control list for administration
• SNMP management with SNMPv1/SNMPv2 (RFC1157/1901/1905) agent and MIB II (RFC1213/
1493)
• Software upgrade via web-browser/TFTP server
ATM
• Up to 8 PVCs
• OAM F5 AIS/RDI and loopback
• AAL5
NB712 / NB714 User Guide 5
YML829 Rev1
ATM QoS
• UBR (Unspecified bit rate)
• CBR (Constant bit rate)
• VBR-rt (Variable bit rate real-time)
• VBR-nrt (Variable bit rate non-real-time)
AAL5 Encapsulation
• VC multiplexing and SNAP/LLC
• Ethernet over ATM (RFC 2684/1483)
• PPP over ATM (RFC 2364)
• Classic IP over ATM (RFC 1577)
PPP
• PPP over Ethernet for fixed and dynamic IP (RFC 2516)
• PPP over ATM for fixed and dynamic IP (RFC 2364)
• User authentication with PAP/CHAP/MS-CHAP
WAN Interface
• SHDSL: ITU-T G.991.2 (Annex A, Annex B)
• Encoding scheme: 16-TCPAM
• Data Rate (2-wire mode): N x 64Kbps (N=0~36, 0 for adaptive)
• Data Rate (4-wire mode): N x 128kbps (N=0~36, 0 for adaptive)
• Impedance: 135 ohms
LAN Interface
• 4-ports switching hub (4-port router)
• 10/100 Base-T auto-sensing and auto-negotiation
• Auto-MDIX (4-port router)
Hardware Interface
• WAN: RJ-11
• LAN: RJ-45 x 4
• Console: RS232 female
• RST: Reset button for factory default
Indicators
• General: PWR
• WAN: LNK, ACT
• LAN: 1, 2, 3, 4
• SHDSL: ALM
6 NB712 / NB714 User Guide
YML829 Rev1
Physical/Electrical
(
• Dimensions: 18.7 x 3.3 x 14.5cm (WxHxD)
• Power: 100~240VAC (via power adapter)
• Power consumption: 9 watts max
o
• Temperature: 0~45
C
• Humidity: 0%~95%RH (non-condensing)
Memory
• 2MB Flash Memory, 8MB SDRAM
Product Information
• G.shdsl 2-wire router/bridge with 4-port switching hub LAN, VLAN and business class firewall
• G.shdsl 2 or 4-wire selectable router/bridge with 4-port switching hub LAN, VLAN and business
class firewall
1.4 Application
NB714 or NB712
Internet
G.SHDSL Modem Router
Note: NB714 model shown)
Firewall
PCPC
NB712 / NB714 User Guide 7
YML829 Rev1
PC
PC
2 Firewall
(N
A firewall protects networked computers from an intrusion that could compromise confidentiality or result in data
corruption or denial of service. It must have at least two network interfaces, one for the network it is intended to
protect, and one for the network it is exposed to. A firewall sits at the junction point or gateway between the two
networks, usually a private network and a public network such as the Internet.
A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is
routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can
also manage public access to private networked resources such as host applications. It can log all attempts to
enter the private network and trigger alarms when hostile or unauthorized entry is attempted. Firewalls can filter
packets based on their source and destination addresses and port numbers. This is known as address filtering.
Firewalls can also filter specific types of network traffic. This is known as protocol filtering because the decision
to forward or reject traffic is dependant upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also
filter traffic by packet attribute or state.
It is important to note that an Internet firewall cannot prevent individual users with modems from dialling into or
out of the network. By doing so they bypass the firewall altogether and open the network to attack. However, these
are management issues that should be raised during the planning of any security policy and cannot be solved with
Internet firewalls alone.
PCPC
NB714 or NB712
G.SHDSL Modem Router
ote: NB714 model shown)
Unknown Traffic
Access to Specific Destination
Allowed Traffic
Restricted Traffic
PC
PC
Firewall
Specified Allowed Traffic
Out to Internet
Internet
8 NB712 / NB714 User Guide
YML829 Rev1
2.1 Types of Firewall
There are three types of firewall:
2.1.1 Packet Filtering
In packet filtering, only the protocol and the address information of each packet is examined. Its
contents and context (its relation to other packets and to the intended application) are ignored.
The firewall pays no attention to applications on the host or local network and it “knows” nothing
about the source of the incoming data. Filtering consists of examining incoming or outgoing packets
and allowing or disallowing their transmission on the basis of a set of configurable rules. Network
Address Translation (NAT) routers offer the advantages of packet filtering firewalls but can also hide
the IP addresses of computers behind the firewall, and offer a level of circuit-based filtering.
192.100.0.10:1025
192.168.0.5
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Firewall
Filter remembers
this information
UDP
SP=3264
SA=192.168.0.5
DP=1525
DA=172.16.3.4
Matches outgoing
so allowed
UDP
SP=1525
SA=172.16.3.4
DP=3264
DA=192.168.0.5
No matches
so disallowed
UDP
SP=1525
SA=172.168.3.4
DP=2049
DA=192.168.0.5
Firewall 192.120.8.5
Protocol
Source/Destination address
Source/Destination port
IP options
Connection status
172.16.3.4
192.120.8.5:2205
192.120.8.5:2206
Internet
192.100.0.11:4433
Internal/Protected
Network
Client IP Internal Port External Port
192.68.0.10 1025 2205
192.168.0.11 4406 2206
External/Unprotected
Network
NB712 / NB714 User Guide 9
YML829 Rev1
2.1.2 Circuit Gateway
Also called a “Circuit Level Gateway,” this is a firewall approach that validates connections before
allowing data to be exchanged. What this means is that the firewall doesn’t simply allow or disallow
packets but also determines whether the connection between both ends is valid according to
configurable rules, then opens a session and permits traffic only from the allowed source and
possibly only for a limited period of time.
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Destination IP address and/
or source IP address and/or
time of day
protocol
user
password
2.1.3 Application Gateway
The Application Level Gateway acts as a proxy for applications, performing all data exchanges with
the remote system on their behalf. This can render a computer behind the firewall all but invisible to
the remote system. It can allow or disallow traffic according to very specific rules; permitting some
commands to a server but not others, limiting file access to certain types, varying rules according
to authenticated users and so forth. This type of firewall may also perform very detailed logging of
traffic and monitoring of events on the host system, and can often be instructed to sound alarms or
notify an operator under defined conditions. Application-level gateways are generally regarded as the
most secure type of firewall.
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Tel ne t
FTP
HTT:
SMTP
2.2 Denial of Service Attack
Denial of service (DoS) attacks typically come in two varieties: resource starvation and resource overload. DoS
attacks can occur when there is a legitimate demand for a resource that is greater than the supply (i.e. too many
web requests to an already overloaded web server). Software vulnerability or system misconfigurations can also
cause DoS situations. The difference between a malicious denial of service and simple system overload is the
requirement of an individual with malicious intent (attacker) using or attempting to use resources specifically to
deny those resources to other users.
10 NB712 / NB714 User Guide
YML829 Rev1
Ping of deathOn the Internet, ping of death is a kind of denial of service
(DoS) attack caused by an attacker deliberately sending an
IP packet larger than the 65,536 bytes allowed by the IP
protocol. One of the features of TCP/IP is fragmentation; it
allows a single IP packet to be broken down into smaller
segments. Attackers began to take advantage of that feature
when they found that a packet broken down into fragments
could add up to more than the allowed 65,536 bytes.
Many operating systems didn’t know what to do when they
received an oversized packet, so they froze, crashed, or
rebooted. Other known variants of the ping of death include
teardrop, bonk and nestea.
SYN FloodThe attacker sends TCP connections faster than the
victim machine can process them, causing it to run out
of resources and dropping legitimate connections. A new
defence against this is to create “SYN cookies”. Each side
of a connection has its own sequence number. In response
to a SYN, the attacked machine creates a special sequence
number that is a “cookie” of the connection and forgets
everything it knows about the connection. It can then
recreate the forgotten information about the connection
where the next packets come in from a legitimate
connection.
ICMP FloodThe attacker transmits a volume of ICMP request packets to
cause all CPU resources to be consumed serving the phony
requests.
UDP FloodThe attacker transmits a volume of requests for UDP
diagnostic services which cause all CPU resources to be
consumed serving the phony requests.
Land attackThe attacker attempts to slow your network down by sending
a packet with identical source and destination addresses
originating from your network.
Smurf attackWhere the source address of a broadcast ping is forged so
that a huge number of machines respond back to the victim
indicated by the address, thereby overloading it.
Fraggle AttackA perpetrator sends a large amount of UDP echo packets
at IP broadcast addresses, all of it having a spoofed source
address of a victim.
IP SpoofingIP Spoofing is a method of masking the identity of an
intrusion by making it appear that the traffic came from a
different computer. This is used by intruders to keep their
anonymity and can be used in a Denial of Service attack.
NB712 / NB714 User Guide 11
YML829 Rev1
3 VLAN (Virtual Local Area Network)
Virtual LAN (VLAN) is defined as a group of devices on one or more LANs that are configured so that they can
communicate as if they were attached to the same wire, when in fact they are located on a number of different
LAN segments. Because VLAN is based on logical instead of physical connections, it is extremely flexible.
The IEEE 802.1Q defines the operation of VLAN bridges that permit the definition, operation and administration of
VLAN topologies within a bridged LAN infrastructure. VLAN architecture benefits include:
1. Increased performance
2. Improved manageability
3. Network tuning and simplification of software configuration
4. Physical topology independence
5. Increased security options
As DSL (over ATM) links are deployed more and more extensively, VLAN (VLAN-to-PVC) over DSL links is
becoming a popular requirement of networks.
The following section will discuss the implementation of VLAN-to-PVC only for bridge mode operation, i.e., the
VLAN spreads over both the COE and CPE sides, where there is no layer 3 routing involved.
3.1 Specification
1. The unit supports up to 8 active VLANs with shared VLAN learning (SVL) bridge out of 4096 possible
VLANs specified in IEEE 802.1Q.
2. Each port always belongs to a default VLAN with its port VID (PVID) as an untagged member. Also, a
port can belong to multiple VLANs and be tagged members of these VLANs.
3. A port must not be a tagged member of its default VLAN.
4. If a non-tagged or null-VID tagged packet is received, it will be assigned with the default PVID of the
ingress port.
5. If the packet is tagged with non-null VID, the VID in the tag will be used.
6. The look up process starts with VLAN look up to determine whether the VID is valid. If the VID is
not valid, the packet will be dropped and its address will not be learned. If the VID is valid, the VID,
destination address, and source address lookups are performed.
7. The VID and destination address lookup determines the forwarding ports. If it fails, the packet will be
broadcast to all members of the VLAN, except the ingress port.
8. Frames are sent out tagged or untagged depending on if the egress port is a tagged or untagged
member of the VLAN that the frames belong to.
9. If VID and source address look up fails, the source address will be learned.
3.2 Frame Specification
An untagged frame or a priority-tagged frame does not carry any identification of the VLAN to which it belongs.
Such frames are classified as belonging to a particular VLAN based on parameters associated with the receiving
port. Also, priority tagged frames, which, by definition, carry no VLAN identification information, are treated the
same as untagged frames.
A VLAN-tagged frame carries an explicit identification of the VLAN to which it belongs; i.e., it carries a tag header
that carries a non-null VID. This results in a minimum tagged frame length of 68 octets. Such a frame is classified
12 NB712 / NB714 User Guide
YML829 Rev1
as belonging to a particular VLAN based on the value of the VID that is included in the tag header. The presence
of the tag header carrying a non-null VID means that some other device, either the originator of the frame or a
VLAN-aware bridge, has mapped this frame into a VLAN and has inserted the appropriate VID.
The following figure shows the difference between a untagged frame and VLAN tagged frame, where the Tag
Protocol Identifier (TPID) is of 0x8100 and it identifies the frame as a tagged frame. The Tag Control Information
(TCI) consists of the following elements:
1) User priority allows the tagged frame to carry user priority information across bridged LANs in
which individual LAN segments may be unable to signal priority information (e.g., 802.3/Ethernet
segments).
2) The Canonical Format Indicator (CFI) is used to signal the presence or absence of a Routing
Information Field (RIF) field, and, in combination with the Non-canonical Format Indicator (NCFI)
carried in the RIF, to signal the bit order of address information carried in the encapsulated frame.
3) The VID uniquely identifies the VLAN to which the frame belongs.
3.3 Applications
SHDSL RouterSHDSL Router
SHDSLEthernetEthernet
LANLAN
SHDSL Router
Internet
DSLAM
NB712 / NB714 User Guide 13
YML829 Rev1
SHDSLEthernet
LAN
4 Getting to know the router
This section will introduce the hardware of the router.
4.1 Front Panel
The front panel contains LEDs which show the status of the SHDSL router. Note: The front panel LEDs of the
NB712 (2-wire) and NB714 (2 or 4-wire selectable) are identical. The NB714 is shown below.
LED status
LEDs Active Description
PWR On Power on
WAN
LNK On SHDSL line connection is established
Blink SHDSL handshake
ACT On Transmit or received data over SHDSL link
LAN
1 On Ethernet cable is connected to LAN 1
Blink Transmit or received data over LAN 1
2 On Ethernet cable is connected to LAN 2
Blink Transmit or received data over LAN 2
3 On Ethernet cable is connected to LAN 3
Blink Transmit or received data over LAN 3
4 On Ethernet cable is connected to LAN 4
Blink Transmit or received data over LAN 4
ALM On SHDSL line connection is dropped
BlinkSHDSL self test
14 NB712 / NB714 User Guide
YML829 Rev1
4.2 Rear Panel
The rear panel of the SHDSL router is where all of the cable connections are made.
Connectors Description
DC-IN Power adaptor inlet: Input voltage 9VDC
LAN (1,2,3,4) 10/100BaseT auto-sensing and auto- MDIX for LAN port
(RJ-45)
CONSOLE RS-232C (DB9) for system configuration and maintenance
LINE SHDSL interface for WAN port (RJ-11)
RST Reset button to reboot or load factory default
The reset button can be used in one of two ways.
(1) Press the Reset Button for one second to reboot the system only.
(2) Pressing the Reset Button for four seconds will cause the product to reload the factory default
settings, thereby losing all of your settings. If you forget your user name or password, or if the router
is having difficulties connecting to the Internet, you may want to reconfigure it to clear all previous
settings. Press the Reset Button and hold for four (4) seconds with a paper clip or sharp pen/pencil.
NB712 / NB714 User Guide 15
YML829 Rev1
5 Connecting your G.SHDSL Modem Router
This guide is designed to lead users through the Web Configuration of the G.SHDSL Modem Router in the easiest
and quickest way possible. Please follow the instructions carefully.
Note: There are three methods to configure the router: serial console, Telnet and Web
Browser. Only one configuration application is used to setup the Modem Router at
any given time. Select the method you wish to use and continue.
For Web configuration, you can skip step 3.
For Serial Console Configuration, you can skip step 1 and 2.
Step 1: Check the Ethernet Adapter in PC
Make sure that an Ethernet Adapter has been installed in the PC that is to be used for configuration of the router.
TCP/IP protocol is necessary for web configuration, so please check that the PC has TCP/IP protocol installed.
Step 2: Check the Web Browser in PC
For Web Configuration, ensure that the PC has a Web Browser installed, such as IE or Netscape.
Note: Suggest IE5.0, Netscape 6.0 or above and 800x600 screen resolution or above.
Step 3: Check the Terminal Access Program
For Serial Console and Telnet Configuration, users need to setup the terminal access program with VT100
terminal emulation.
Step 4: Determine Connection Setting
Users need to know the Internet Protocol supplied by your Service Provider and determine the mode of setting.
Protocol Selection
RFC1483 Ethernet over ATM
RFC1577 Classical Internet Protocol over ATM (CLIP)
RFC2364 Point-to-Point Protocol over ATM (PPPoA)
RFC2516 Point-to-Point Protocol over Ethernet (PPPoE)
Different Protocols are required to setup different WAN parameters. Your ISP will advise the correct protocol and
the necessary WAN parameters to configure your Modem Router.
16 NB712 / NB714 User Guide
YML829 Rev1
Bridge EoA
Route EoA
IPoA
PPPoA
NB712 / NB714 User Guide 17
YML829 Rev1
PPPoE
(
Step 5: Install the SHDSL Router
Do not turn on the Modem Router until you have completed the Hardware Installation.
• Connect the power adapter to the port labelled DC-IN on the rear panel of the product.
• Connect the Ethernet cable to the PC.
Note: The 4-port modem router supports auto-MDIX switching, so both straight and
cross-over Ethernet cables can be used.
• Connect the phone cable to the product and the other side of the phone cable to the wall jack.
• Connect the power adapter to the power source.
• Turn on the PC which will be used to configure the Router.
4-port router with network topology
NB714 or NB712
Internet
Firewall
PCPC
G.SHDSL Modem Router
Note: NB714 model shown)
PC
PC
18 NB712 / NB714 User Guide
YML829 Rev1
6 Configuration via Web Browser
For Win95, 98 and Me, click the start button. Select Setting and Control Panel.
Double click the Network icon.
In the Configuration window, select the TCP/IP protocol line associated with your network card and then click the
Properties button.
NB712 / NB714 User Guide 19
YML829 Rev1
Choose IP Address tab. Select Obtain IP address automatically. Click the OK button.
The window will ask you to restart the PC. Click Yes button.
After rebooting your PC, open your web browser and type http://192.168.1.1 to connect to the Router.
The default IP address and sub net-mask of the Router is 192.168.1.1 and 255.255.255.0. Because the router
acts as DHCP server in your network, the router will automatically assign an IP address for the PC in the network.
Type User Name admin and Password admin and then click OK.
The default user name and password are both admin. For the system security, we suggest you change them after
configuration.
Note: After changing the User Name and Password, it is strongly recommended that you
record them somewhere as a reminder for the next time you login. If you cannot
remember the User Name and Password, you will need to reset the Modem
Router, which will lose any previous configuration.
20 NB712 / NB714 User Guide
YML829 Rev1
7 Basic Setup
The Basic Setup contains LAN, WAN, Bridge and Router operation modes. This section can be used to completely
setup the router. After successfully completing it, you can access the Internet. This is the easiest and quickest way
to setup the router.
Note: The advanced functions are only for advanced users. The incorrect settings of
advanced functions can affect the performance of the network and cause a
system error or disconnection.
Click Basic for basic installation.
NB712 / NB714 User Guide 21
YML829 Rev1
7.1 Bridge Mode
Before configuring the router in bridge mode, check with your ISP to ensure you have the necessary information.
Click Bridge and CPE Side to setup Bridging mode of the Router and then click Next.
Two SHDSL modes are available: CO, Central Office, and CPE, Customer Premises Equipment. For a connection
with a DSLAM, the correct SHDSL mode is CPE. For a LAN to LAN connection, one side must be CO and the other
side must be CPE.
LAN Parameters
Enter IP: 192.168.1.1
Enter Subnet Mask: 255.255.255.0
Enter Gateway: 192.168.1.254
The Gateway IP is provided by ISP.
Enter Host Name: SOHO
Some ISPs will require the host name as identification. You may need to check with your ISP to see if your Internet
service has been configured with a host name. In most cases, this field can be ignored.
22 NB712 / NB714 User Guide
YML829 Rev1
WAN1 Parameters
Enter VPI: 0
Enter VCI: 32
Click LLC
Click Next.
The screen will display the new parameters. Check the parameters and click Restart. The router will reboot with
the new settings. Select Continue to configure other parameters.
NB712 / NB714 User Guide 23
YML829 Rev1
7.2 Routing Mode
Routing mode includes DHCP server, DHCP client, DHCP relay, Point-to-Point Protocol over ATM and Ethernet and
IP over ATM and Ethernet over ATM. The type of Internet protocol is provided by your ISP.
Click ROUTE and CPE Side then press Next.
Two SHDSL modes are available: CO, Central Office, and CPE, Customer Premises Equipment. For connection with
a DSLAM, the SHDSL mode is CPE. For a LAN to LAN connection, one side must be CO and the other side must
be CPE.
24 NB712 / NB714 User Guide
YML829 Rev1
7.2.1 DHCP Client
Some ISPs provide a DHCP server service whereby the PC in the LAN can access IP information automatically. To
setup the DHCP client mode, follow the procedure.
LAN IP Type: Dynamic
Click Next to setup WAN1 parameters.
NB712 / NB714 User Guide 25
YML829 Rev1
7.2.2 DHCP Server
Dynamic Host Configuration Protocol (DHCP) is a communication protocol that allows network administrators to
centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization’s network.
Internet Protocol requires that each machine that can connect to the Internet has a unique IP address. When an
organization sets up its computer users with a connection to the Internet, an IP address must be assigned to each
machine.
Without DHCP, the IP address must be entered manually for each computer. If computers move to another location
in another part of the network, a new IP address must be entered. DHCP lets a network administrator supervise
and distribute IP addresses from a central point and automatically send a new IP address when a computer
is plugged into a different place in the network. If the DHCP server is enabled, you have to setup the following
parameters for processing DHCP requests from clients.
The embedded DHCP server assigns network configuration information for up to 253 users accessing the Internet
at the same time.
IP type: Fixed
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
Some ISPs require the host name as identification. Check
with your ISP to see if your Internet service has been
configured with a host name. In most cases, this field can be
ignored.
26 NB712 / NB714 User Guide
YML829 Rev1
Trigger DHCP Service: Server
The default setup is Enable DHCP server. If you want to turn
off the DHCP service, choose Disable.
For example: If the LAN IP address is 192.168.1.1, the
IP range of LAN is 192.168.1.2 to 192.168.1.51. The
DHCP server assigns the IP form Start IP Address to End IP
Address. The legal IP address range is form 0 to 255, but 0
and 255 are reserved for broadcast so the legal IP address
range is from 1 to 254. On the other hand, you cannot
assign an IP greater than 254 or less then 1. Lease time
72 hours indicates that the DHCP server will reassign IP
information every 72 hours.
DNS Server: Your ISP will provide at least one Domain Name Service
Server IP. You can type the router IP in this field. The router
will act as DNS server relay function.
You may assign fixed IP addresses to some devices while
using DHCP, provided that the fixed IP address is not within
the range used by the DHCP server.
Click Next to setup WAN1 parameters.
NB712 / NB714 User Guide 27
YML829 Rev1
7.2.3 DHCP relay
If you already have a DHCP server on your LAN and you want to use it for DHCP services, the router provides a
DHCP relay function.
IP Type: Fixed
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Host Name: SOHO
Some ISPs require the host name as identification. Check
with your ISP to see if your Internet service has been
configured with a host name. In most cases, this field can be
ignored.
Trigger DHCP Service: Relay
Click Next to setup DHCP server parameters.
Enter the DHCP server IP address in IP address field.
Press Next
28 NB712 / NB714 User Guide
YML829 Rev1
7.2.4 PPPoE or PPPoA
PPPoA (point-to-point protocol over ATM) and PPPoE (point-topoint protocol over Ethernet) are authentication and connection
protocols used by many service providers for broadband
Internet access. These are specifications for connecting multiple
computer users on an Ethernet local area network to a remote
site through common customer premises equipment, which
is the telephone company’s term for a modem and similar
devices. Users share a common Digital Subscriber Line (DSL),
cable modem, or wireless connection to the Internet. PPPoE
and PPPoA combine the Point-to-Point Protocol (PPP), commonly used in dialup connections, with the Ethernet
protocol or ATM protocol, which supports multiple users in a local area network. The PPP protocol information is
encapsulated within an Ethernet frame or ATM frame.
Before configuring the router, check with your ISP to ensure you have the correct information.
Key in the WAN1 parameters:
VPI: 0
VCI: 33
AAL5 Encap: LLC
Protocol: PPPoA + NAT or PPPoE + NAT
Click Next to setup the User name and password.
For more information, refer to the section on NAT/DMZ.
NB712 / NB714 User Guide 29
YML829 Rev1
Type the ISP1 parameters.
Username: test
Password: test
Password Confirm: test
Your ISP will provide the user name and password.
Idle Time: 10
If you want your Internet connection to remain on at all
times, enter 0 in the Idle Time field.
IP Type:There are three IP types, Dynamic, Fixed and IP
Unnumbered, which you can setup. The default IP type
is Dynamic. It means that ISP PPP server will provide IP
information including a dynamic IP address when a SHDSL
connection is established. I.e. you do not need to type the IP
address of WAN1. Some ISPs will provide fixed IP address
over PPP.
For fixed IP address:
IP Type: Fixed
IP Address: 192.168.1.1
Click Next.
For IP Unnumbered:
IP Type: IP Unnumbered
IP Address: 192.168.168.1
Click Next.
30 NB712 / NB714 User Guide
YML829 Rev1
Loading...
+ 87 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.