NETGEAR™ is a trademark of Netgear, Inc. Windows® is a registered trademark of Microsoft Corporation. Other
brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to
change without notice. All rights reserved.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
make changes to the products described in this document without notice.
NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
•This device may not cause harmful interference.
•This device must accept any interference received, including interference that may cause undesired operation.
Note
: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try
to correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
EN 55 022 Decla0ration of Conformance
This is to certify that the Model RT328 ISDN Router and the Model RH348 ISDN Router are shielded against the
generation of radio interference in accordance with the application of Council Directive 89/336/EEC, Article 4a.
Conformity is declared by the application of EN 55 022 Class B (CISPR 22).
ii
Bestätigung des Herstellers/Importeurs
Es wird hiermit bestätigt, daß das Model RT328 ISDN Router und Model RH348 ISDN Router gemäß der im
BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben
einiger Geräte (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die
Anmerkungen in der Betriebsanleitung.
Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt
gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.
Certificate of the Manufacturer/Importer
It is hereby certified that the Model RT328 ISDN Router and the Model RH348 ISDN Router have been suppressed
in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some
equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain
restrictions. Please refer to the notes in the operating instructions.
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market
and has been granted the right to test the series for compliance with the regulations.
VCCI-2 Statement
This equipment is in the 2nd Class category (information equipment to be used in a residential area or an adjacent area
thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing
Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
When used near a radio or TV receiver, it may become the cause of radio interference.
Read instructions for correct handling.
Customer Support
For assistance with installing and configuring your NETGEAR system or with post-installation questions or problems,
contact your point of purchase representative.
To contact customer support or to purchase additional copies of this document and publications for other NETGEAR
products, you can contact NETGEAR at the following numbers:
Hong Kong: 001-800-1233-4566United States:1-888-NETGEAR
Japan:0120-66-5402All Other Countries: +1 801-236-8499
(00800-0-NETGEAR)New Zealand: 00800-1233-4566
(00800-0-NETGEAR)United Kingdom:020-7216-0014
World Wide W eb
NETGEAR maintains a World Wide Web Home Page that you can access at the universal resource locator (URL)
http://www.NETGEAR.com. A direct connection to the Internet and a Web browser such as Internet Explorer
or Netscape are required.
iii
iv Contentsv
Contents
Preface
Purpose ........................................................................................................................... xv
Congratulations on your purchase of the NETGEAR™ Model RT328 ISDN Router or Model
RH348 ISDN Router.
These ISDN router models provide connection for one or more computer workstations to the
Internet or to the office over Integrated Services Digital Network (ISDN) lines. They operate at a
speed of up to 512 kilobits per second (Kbps) or 128 Kbps without compression. At these speeds,
you can download video clips, music, or high-resolution color graphics from the World Wide Web
or other online services many times faster than you can with an analog modem. The routers
support concurrent data and voice communications, reducing cost and administration of multiple
phone lines.
Purpose
This guide describes the features of the Model RT328 router and the Model RH348 router and
provides installation and configuration instructions. When discussing features, functions, or
specifications that apply to both router models, the guide refers to the Model RT328/RH348 router.
Audience
To configure and install the Model RT328/RH348 router, you should have the following
background and experience:
•Working knowledge of basic network management concepts and terminology
•Working knowledge of tools and procedures for installing and operating sensitive electronic
equipment
Prefacexv
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Conventions
This section describes the conventions used in this guide.
Special Message Formats
This guide uses the following formats to highlight special messages:
This format is used to highlight information of importance or special interest.
Note:
Caution:
equipment failure or loss of data.
Warning:
equipment damage.
Danger:
mishandling equipment.
This format is used to highlight information that will help you prevent
This format is used to highlight information about the possibility of injury or
This format is used to alert you that you may incur an electrical shock by
Use of Enter, Type, and Press
This guide uses “enter,” “type,” and “press” to describe the following actions:
•When you read “enter,” type the text and press the Enter key.
•When you read “type,” type the text, but do not press the Enter key.
•When you read “press,” press only the alphanumeric or named key.
xviPreface
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Other Conventions
This guide uses the following typographical conventions:
italics
courier font
Initial CapsMenu titles and window and button names.
[Enter]Named keys in text are shown enclosed in square brackets. The notation
[Ctrl]+CTwo or more keys that must be pressed simultaneously are shown in text
ALL CAPS DOS file and directory names.
Book titles and UNIX file, command, and directory names.
Screen text, user-typed command-line entries.
[Enter] is used for the Enter key and the Return key.
linked with a plus (+) sign.
Related Publications
For more information about configuring the Model RT328/RH348 router using FirstGear™
configuration software, refer to
RH348 ISDN Routers
For more information about address assignment, refer to RFC 1597,
Private Internets,
For more information about IP address translation, refer to RFC 1631,
Tr anslator (NAT)
(part number M1-RH348NA-0).
and RFC 1466,
.
Getting Started Using FirstGear for the Model RT328 and Model
Address Allocation for
Guidelines for Management of IP Address Space
The IP Network Address
.
Prefacexvii
Chapter 1
Introduction
This chapter describes the features of the NETGEAR Model RT328 ISDN Router and Model
RH348 ISDN Router and discusses planning considerations for installation.
About the Router
The Model RT328/RH348 router transports data from one local area network (LAN) to another
through a wide area network (WAN) connection.
The router compares the network addresses of data packets sent through the LAN to the entries in
its address tables. If a match is found for a destination network, the router passes the packet to the
path indicated by the entry in the routing table.
The entry in the path list contains the ISDN phone number(s) of the target router. The router sends
the number to the ISDN port for the call to be connected. The WAN path is established, and the
data is sent to the remote unit. At the receiving end, the process operates in the reverse order, from
the ISDN port to the LAN port.
Features
The Model RT328/RH348 router is a flexible, high-performance, easy-to-use router that provides a
cost-effective solution for intelligent networking access across an ISDN line. With minimum
setup, you can install and use the router within minutes to meet a wide variety of networking
requirements.
Introduction1-1
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Key Features
The Model RT328/RH348 router provides the following features:
•Standard basic rate ISDN (BRI) connection
–ISDN, 2B+D, providing two 64 Kbps data channels and a 16 Kbps control channel
–Four-wire S/T interface on Model RT328-S/RH348-S router
–Two-wire U interface on Model RT328-U/RH348-U router
–Two-wire NTT interface on Model RH348-D router
•Protocol Support
–IP routing
–Multilink Point-to-Point Protocol (PPP) for 128 Kbps operation
–Dynamic bandwidth-on-demand with BACP
–Dynamic NAT+ for operation with a single static or dynamic IP address
–DHCP for dynamically assigning network configuration information to LAN
workstations
•Industry-standard compression
–Hi/fn (Stac LZS) compression with CCP
•Easy installation and management
®
–FirstGear graphical user interface (GUI) management software for Windows
users
–Built-in Manager interface for Macintosh, UNIX, and PC users, accessible by
terminal or Telnet Protocol
–Configurable through the LAN—no serial connection required
•Security
–Access control on management functions
–Dial-in access control by Calling Line Identification (CLID) and Callback
–PAP and CHAP authentication support
1-2Introduction
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
•Twisted pair and AUI Ethernet ports (Model RT328 router only)
–RJ-45 interface allowing connection to a 10BASE-T network
–AUI interface allowing connection to a coaxial or fiber network using a transceiver
–Four RJ-45 interfaces for connection to 10BASE-T workstations
•Analog voice ports
–Provides two RJ-11 interfaces
–Allows a standard analog PSTN device (for example, telephone, fax, or modem) to
make and receive calls from other ISDN or PSTN connected devices
–Eliminates the need for a separate PSTN line in a SOHO (small office/home office)
environment
•Eleven LEDs for easy monitoring of status and activity
•Flash EPROM for firmware upgrade
•Five-year warranty
•Free technical support seven days a week, twenty-four hours a day
ISDN Support
The Model RT328/RH348 router is designed to take advantage of Integrated Services Digital
Network (ISDN) for transmission of data over digital telephone networks. A basic rate interface
(BRI), which is the usual ISDN implementation, consists of two 64 kilobit per second (Kbps)
B channels for data and one 16 Kbps D channel for control information.
One advantage of using ISDN to connect routers is that the connection is set up only if there is data
to be sent to the remote network. The router sets up a call, transfers the data, and then hangs up
automatically when the connection is no longer needed.
Multilink PPP Support
When the single-channel ISDN line utilization exceeds a configurable threshold, the router can
automatically establish an additional ISDN call to provide additional bandwidth. During heavy
traffic, the two 64 Kbps B channels are combined using Multilink PPP to provide a fast 128 Kbps
pipe. When traffic slows down, one of the B channels is idled to save toll charges. The router also
reverts back to one B channel for data when an analog port is used.
Introduction1-3
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
TCP/IP Support
The Model RT328/RH348 router supports the Transmission Control Protocol/Internet Protocol
(TCP/IP) and Routing Information Protocol (RIP), which ensures that ISDN connections are
established only when passing data.
For further information about TCP/IP, refer to “Basic Router Concepts” on page 1-6.
IP Address Masquerading by Dynamic NAT+
Both NETGEAR routers allow an entire department of networked PCs to share an Internet account
using only a single IP address, which may be statically or dynamically assigned by your Internet
service provider (ISP). This technique, an extension of network address translation (NAT), is
known as IP address masquerading and typically allows the use of a very inexpensive ISP account.
Automatic Configuration of Attached PCs by DHCP
The routers can dynamically assign network configuration information, including IP, gateway, and
domain name server (DNS) addresses, to attached PCs on the LAN using the Dynamic Host
Configuration Protocol (DHCP). This feature greatly simplifies configuration of LAN-attached
workstations.
Security
The Model RT328/RH348 router is equipped with several features designed to maintain security.
These security features are described in this section.
Calling Line Identification
The use of Calling Line Identification (CLID or Caller ID) ensures that incoming ISDN calling
numbers are checked against known numbers before a call is answered and access is granted,
thus providing a first level of security. In many areas, you must specifically request that CLID
be enabled by the telephone company for your ISDN line. In some regions, CLID may not be
available.
1-4Introduction
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
PAP and CHAP Authentication
For connecting to other routers, the Model RT328/RH348 router supports two authentication
protocols: Password Authentication Protocol (PAP) and Challenge Handshake Authentication
Protocol (CHAP). PAP sends the user name and password in plain text. CHAP scrambles the
password before it is sent over the wire. Although CHAP provides better security, PAP is readily
available on more platforms.
Callback
For security and simplified cost accounting, the router implements Callback. When a remote user
dials in, the router can disconnect the call and call the user back, so that any further call charges
are incurred by the location of the router. The caller can provide the callback numbers; or, for
security, the router can be programmed to call back a predetermined number.
Management Support
The router is designed to be installed and made operational within minutes after connection to the
network.
If you are a PC user, the FirstGear software lets you easily configure the unit from the Windows
environment.
If you are a Macintosh, UNIX, or PC user, you can connect to the built-in Manager interface,
which can be accessed through a terminal connected to the MGR (manager) port or through a
Telnet session across the network. The built-in Manager interface manages and configures the
unit through an easily understood screen process.
Introduction1-5
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Basic Router Concepts
In general, the cost of providing network bandwidth is proportional to the data speed and the
distance over which the network extends. Large amounts of bandwidth are provided easily and
relatively inexpensively in a local area network (office, department, and similar situations).
However, providing the same high data speeds between two local networks that are physically
distant may be prohibitively expensive. Because of this expense, high-speed local area networks
(LANs) are usually interconnected by slower-speed links to form a wide area network (WAN).
In order to make the best use of the slower WAN links, a mechanism must be in place at each
location for selecting data meant only for another location and sending it by the best available link.
The function of selecting and forwarding this data is performed by a router.
What is a Router?
A router is a device that forwards traffic between networks based on network layer information in
the data and on routing tables maintained by the router. In these routing tables, a router builds up a
logical picture of the overall network by gathering and exchanging information with other routers
in the network. Using this information, it chooses the best path for forwarding network traffic.
Routers vary in performance and scale, number of routing protocols supported, and types of
physical WAN connections supported. The Model RT328/RH348 router is a small office router
that routes the IP protocol over a dial-up ISDN connection.
Routing Information Protocol
One of the protocols used by a router to build and maintain a picture of the network is the Routing
Information Protocol (RIP). RIP is a distance vector protocol, meaning that all the decisions about
which path to use are based upon a logical distance between source and destination networks. This
distance is measured in “hops,” meaning the number of relaying routers in the path between the
source LAN router and the router of the destination LAN. For example, the LAN of router A is
considered to be 1 hop away. If router A can reach the network of router B by a direct WAN link to
the network of router B, the network of router B is two hops away. If another network must be
reached by calling router B and having router B forward the data, that network is n hops away,
where n is the number of routers traversed by the data to get to the network farthest away. When
there are multiple paths to a network, the path with the fewest number of hops is chosen and is
regarded as the best path, and all other information about how to get to that network is discarded.
1-6Introduction
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Using RIP, routers update one another periodically and check to see if there are any changes to be
added to the routing table. An important consideration is the convergence time, or how long it
takes for a change to the routing topology (such as a new node or a node failure), to be propagated
throughout the entire RIP environment. To prevent this convergence process from being
excessively long, RIP is limited to 15 hops maximum.
The Model RT328/RH348 router supports both the older RIP-1 and the newer RIP-2 protocols.
Among other improvements, RIP-2 supports subnetting and multicasting.
IP Addresses and the Internet
Because TCP/IP networks are interconnected widely across the world, every machine on the
Internet must have a unique address to make sure that transmitted data reaches the correct
destination. Blocks of addresses are assigned to organizations by the Internet Assigned Numbers
Authority (IANA). Individual users and small organizations may obtain their addresses either from
the IANA or from an Internet service provider (ISP).
The Internet Protocol (IP) uses a 32-bit address structure. The address is usually written in dot
notation (also called dotted-decimal notation), in which each group of eight bits is written in
decimal form, separated by decimal points. For example, the binary address:
11000011 00100010 00001100 00000111
is normally written as:
195.34.12.7
which is easier to remember and easier to enter into your computer.
In addition, the 32 bits of the address are subdivided into two parts. The first part of the address
identifies the network, and the second part identifies the host node or station on the network. The
dividing point may vary depending on the address range and the application.
Introduction1-7
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
There are five standard classes of IP addresses. These address classes have different ways of
determining the network and host sections of the address, allowing for different numbers of hosts
on a network. Each address type begins with a unique bit pattern, which is used by the TCP/IP
software to identify the address class. After the address class has been determined, the software
can correctly identify the host section of the address. The three main address classes are illustrated
in Figure 1-1, which shows the network and host sections of the address for each address type.
Class A
NetworkNode
Class B
NetworkNode
Class C
NetworkNode
7261
Figure 1-1.Three Main Address Classes
Class A addresses can have up to 16,777,214 hosts on a single network. They use an 8-bit network
number and a 24-bit node number. Class A addresses are in this range:
1.x.x.x to 126.x.x.x.
Class B addresses can have up to 65,354 hosts on a network. A Class B address uses a 16-bit
network number and a 16-bit node number. Class B addresses are in this range:
128.1.x.x to 191.254.x.x.
Class C addresses can have 254 hosts on a network. Class C addresses use 24 bits for the network
address and 8 bits for the node. They are in this range:
192.0.1.x to 223.255.254.x.
Class D addresses are used for multicasts (messages sent to many hosts). Class D addresses are in
this range:
224.0.0.0 to 239.255.255.255.
1-8Introduction
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Class E addresses are for experimental use.
This addressing structure allows IP to uniquely identify each physical network and each node on
each physical network.
For each unique value of the network portion of the address, the base address of the range (host
address of all zeros) is known as the network address and is not usually assigned to a host. Also,
the top address of the range (host address of all ones) is not assigned but is used as the broadcast
address for sending a packet simultaneously to all hosts with the same network address.
Netmask
In each of the above address classes, the size of the two parts (network address and host address)
is implied by the class. This partitioning scheme can also be expressed by a netmask associated
with the IP address. A netmask is a 32-bit quantity that, when logically ANDed with an IP address,
yields the network address. For instance, the netmasks for Class A, B, and C addresses are
255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively.
For example, the address 192.168.170.237 is a Class C IP address whose network portion is the
upper 24 bits. When ANDed with the Class C netmask, as shown here, only the network portion of
the address remains:
As a shorter alternative to dotted-decimal notation, the netmask may also be expressed in terms of
the number of ones from the left. This number is appended to the IP address, following a backward
slash ( / ), as “/n.” In the example, the address could be written as 192.168.170.237/24, indicating
that the netmask is 24 ones followed by 8 zeros.
Introduction1-9
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Subnet Addressing
By looking at the addressing structures, you can see that even with a Class C address, there are a
large number of hosts per network. Such a structure is an inefficient use of addresses if each end of
a routed link requires a different network number. It is unlikely that the smaller office LANs would
have that many devices. You can resolve this problem by using a technique known as subnet
addressing.
Subnet addressing allows us to split one IP network address into smaller multiple physical
networks known as subnetworks. Some of the node numbers are used as a subnet number instead.
A Class B address gives us 16 bits of node numbers translating to 64,000 nodes. Most
organizations do not use 64,000 nodes, so there are free bits that can be reassigned. Subnet
addressing makes use of those bits that are free, as illustrated in Figure 1-2.
Class B
NetworkSubnetNode
7262
Figure 1-2.Example of Subnetting a Class B Address
A Class B address can be effectively translated into multiple Class C addresses. For example, the
IP address of 172.16.0.0 is assigned, but node addresses are limited to 255 maximum, allowing
8 extra bits to use as a subnet address. The IP address of 172.16.97.235 would be interpreted as
IP network address 172.16, subnet number 97, and node number 235. In addition to extending
the number of addresses available, subnet addressing provides other benefits. Subnet addressing
allows a network manager to construct an address scheme for the network by using different
subnets for other geographical locations in the network or for other departments in the
organization.
Although the preceding example uses the entire third octet for a subnet address, note that you are
not restricted to octet boundaries in subnetting. To create more network numbers, you need only
shift some bits from the host address to the network address. For instance, to partition a Class C
network number (192.68.135.0) into two, you shift 1 bit from the host address to the network
address. The new netmask (or subnet mask) is 255.255.255.128. The first subnet has network
number 192.68.135.0 with hosts 192.68.135.1 to 129.68.135.126, and the second subnet has
network number 192.68.135.128 with hosts 192.68.135.129 to 192.68.135.254.
1-10Introduction
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
The number 192.68.135.127 is not assigned because it is the broadcast address
Note:
of the first subnet. And 192.68.135.128 is not assigned because it is the network address
of the second subnet.
Table 1-1 lists the additional subnet mask bits in dotted-decimal notation. To use the table, write
down the original class netmask and replace the 0 value octets with the dotted-decimal value of the
additional subnet bits. For instance, to partition your Class C network 204.247.203.0 with subnet
mask 255.255.255.0 into 16 subnets (4 bits), the new subnet mask becomes 255.255.255.240.
Table 1-1.Netmask Notation Translation Table for One Octet
Number of Bits
1128
2192
3224
4240
5248
6252
7254
8255
Dotted-Decimal Value
Introduction1-11
Reference Guide for the Model RT328 and Model RH348 ISDN Routers
Table 1-2 displays several common netmask values in both the dotted-decimal and the
masklength formats.
Table 1-2.Netmask Formats
Dotted-DecimalMasklength
255.0.0.0/8
255.255.0.0/16
255.255.255.0/24
255.255.255.128/25
255.255.255.192/26
255.255.255.224/27
255.255.255.240/28
255.255.255.248/29
255.255.255.252/30
255.255.255.254/31
255.255.255.254/32
NETGEAR strongly advises that all hosts on a LAN segment use the same netmask for the
following reasons:
•So that hosts recognize local IP broadcast packets
When a device broadcasts to its segment neighbors, it uses a destination address of the local
network address with all ones for the host address. In order for this scheme to work, all devices
on the segment must agree on which bits comprise the host address.
•So that a local router or bridge will know which addresses are local and which are remote
Private IP Addresses
If your networks are isolated from the Internet (for example, only between your two branch
offices), you can assign any IP addresses to the hosts without problems. However, the IANA has
reserved the following three blocks of IP addresses specifically for private networks:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
NETGEAR recommends that you choose your private network number from this list.
1-12Introduction
Loading...
+ 112 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.