Home

NOTE

image

Contents

1. 142 Rename a User PC ooccoocccccco eee 143 Ethernet MAC Override llle eese 144 Glear Optlons cia sl REINES 145 Table of Contents MIME OME sso et crac a o is Secun a a Passwords x e op AA AA Create and Change Passwords 020 00000 Firewall oo ita Sond died oe ia debe ibe eh pee th Use a Netopia Firewall 0000000 0 eee BreakWater Basic Firewall 0 00 00 ee eee eee Configuring for a BreakWater Setting TIPS for making your BreakWater Basic Firewall Selection Basic Firewall Background 0 0 cee eee eee IPSEC ti AA E eed S ues SafeHarbour IPSec VPN 0 0 ee ee Configuring a SafeHarbour VPN 005 Parameter Descriptions 00002000 eee Stateful Inspection serii sanaa eee eee eee Stateful Inspection Firewall installation procedure Exposed Addresses sese oes Lene Aes SS Stateful Inspection Opti0NS ooooocococccoooo o Open Ports in Default Stateful Inspection Installation Firewall Tutorial 200 cece eee General firewall terms 2 0 02 e te ee Basic IP packet components 000000 cece eaeee Basic protocol types i imas ie ee S ae YEA Firewall design rules 00 00 e cece eee eee eee Firewall Logic x oet t Ee 2 Implied rules liliis Example filter set page liliis Filter Hasiera eae
2. set dhcp server address ip address If you selected relay agent specifies the IP address of the relay agent server set dhcp range 2 8 start address ip address Specifies the starting IP address of DHCP range n when subnet n option is on See Addi tional subnets on page 288 set dhcp range 2 8 end address ip address Specifies the ending IP address of DHCP range n when subnet n option is on See Addi tional subnets on page 288 set dhcp reserved ip address x x x x mac address y y y y y y If you selected server reserves the specified IP address from the DHCP pool to the specified MAC address These are list items a total of 16 reserved addresses are sup ported Secondary ranges will all make use of the dhcp lease time value 276 CONFIG Commands DHCP Option Filtering Beginning with Firmware Version 7 7 support for DHCP option filtering is provided via the filterset settings set dhcp filterset name string rule n dhcp option 0 255 Creates a DHCP filterset named string for example settopbox with rule number n Up to two filtersets can be added Your Gateway supports a single LAN DHCP server instance but an additional filterset is available for use when bridging to block undesired DHCP traffic Up to 8 rules can be created in the filterset which are evaluated in order dhcp option determines which DHCP option should be compared A typical value would be to use option 60 data
3. Embedded NAT Pinholes Web Server E s my games 210 219 41 20 8100 o aT You can also use the LAN side address of the Gateway 192 168 1 x 8100 to access the web and 192 168 1 x 23 to access the telnet server 92 Configure Pinhole Configuration Procedure Use the following steps 1 From the Configure toolbar button gt Advanced link select the Internal Servers link Since Port Forwarding is required for this example the Netopia embedded Web server is configured first Se NOTE The two text boxes Web HTTP Server Port and Telnet Server Port on this page refer to the port numbers of the Netopia Gateway s embedded admin istration ports To pass Web traffic through to your LAN station s select a Web HTTP Port number that is greater than 1024 In this example you choose 8100 2 Type 8100 in the Web HTTP Server Port text box Enter a value from 1 to 65534 0 to disable the server Web HTTP Server Port 8100 Telnet Server Port 23 Submit 3 Click the Submit button 4 Click Advanced Select the Pinholes link to go to the Pinhole page 93 5 Click Add Type your specific data into the Pinhole Entries table of this page Click Submit Pinhole Entry Pinhole Name my webserver Protocol TCP External Port Start 80 External PortEnd 80 Internal IP Address 192 168 1 1 Internal Port 80 f Submit Add or Edit more Pinholes 6 Click on the Add or Edit more Pin
4. Submit If you uncheck the Enable Wireless checkbox the Wireless Options are disabled and the Gateway will not provide or broadcast any wireless LAN services SSID Network ID The SSID is preset to a number that is unique to your unit You can either leave it as is or change it by entering a freeform name of up to 32 characters for example Ed s Wireless LAN On client PCs software this might also be called the Net work Name The SSID is used to identify this particular wireless LAN Depending on their operating system or client wireless card users must either e select from a list of available wireless LANs that appear in a scanned list on their client e or if you are in Closed System Mode see Enable Closed System Mode below enter this name on their clients in order to join this wireless LAN The pull down menu for enabling Privacy offers four settings WPA 802 1x WPA PSK WEP Automatic and Off No Privacy WEP Manual is also available on the Advanced Configuration Options page See Privacy on page 57 S6 Configure er NOTE On the 2200 Series Gateways WEP Manual privacy is enabled by default Use the Netopia Installation Wizard on the accompanying Netopia CD to gener ate WEP keys for connecting wireless client computers Privacy 802 11 Wireless Settings Enable Wireless v Wireless ID SSID 4414 0400 Operating Mode Normal 802 11b g 3 z Default Channel
5. ooooocoocoorcco 303 IPMaps Settings nec XP Oe A pee AA a 305 Network Address Translation NAT Default Settings 305 Network Address Translation NAT Pinhole Settings 306 PPPoE PPPoA Settings o oooocooocooco ees 307 Configuring Basic PPP Settings o oooooo 307 Configuring Port Authentication o o ooooooooo 309 PPPoE with IPOE Settings llle 311 Ethernet WAN platforms sls 311 ADSL platforms lssseelee IA 312 Ethernet Port Settings llli 314 Command Line Interface Preference Settings 314 Table of Contents CHAPTER 7 Port Renumbering Settings ooooocccccococ o 315 Security Settings llle 316 Firewall Settings for BreakWater Firewall 316 SafeHarbour IPSec Settings o oooooooo 316 Internet Key Exchange IKE SettingS 321 Stateful Inspection sa co scence chee ee eee eee eee 322 Examiple scc ska rcd or GG XA ee bees A 323 Packet Filtering Settings llle eese 324 Example eod ace REUS PU dowEor weds fele es ars 327 SNMP Settings scissa tem eme et 328 SNMP Notify Type Settings 2 005 329 System Settings ooococccconocoo o 329 rj EMT cT 333 Default syslog installation procedure 334 Wireless Settings supported models oooooo oo oo o 336 Wireless Multi media WMM Setti
6. LCP echo request 308 Link Install Software 203 Quickstart 49 51 73 Local Area Network 379 Location SNMP 328 Log 261 Logging in 250 lost echoes 308 M Magic number 308 Memory 261 Metric 304 multi cast 312 Multiple SSIDs 65 multiple subnets 53 Multiple Wireless SSIDs Wireless 65 337 forwarding 285 N Nameserver 280 NAT 291 305 381 Traffic rules 101 NAT Default Server 384 Netmask 287 Network Translation 381 Network Test Tools 380 NSLookup 380 Address 0 set upnp option 348 Operating Mode Wireless 60 337 P PAP 378 Password 147 Administrator 41 250 User 41 147 250 persistent log 330 Ping 380 Ping command 255 Pinholes 305 383 Planning 90 policy based routing 197 Port authentication 309 port number comparisons 182 port numbers 182 Port renumbering 315 PPP 264 PPPoE 378 Primary nameserver 280 Prompt CLI 251 265 Protocol compression 308 147 Q qos max burst size 273 qos peak cell rate 272 qos service class 272 qos sustained cell rate 273 quality of service 181 197 391 R Restart 258 Restart command 252 Restart timer 309 Restrictions 290 RIP 286 288 Routing Information Protocol RIP 286 288 S Secondary nameserver 280 Secure Sockets Layer 213 Security filters 178 Security log 201 Set bncp command 272 273 274 Set bridge commands 274 Set DMT commands 279 Set dns commands 280 Set ip static routes commands 303 Set ppp m
7. Link Network Tools Three test tools are available from this page NSLookup converts a domain name to its IP address and vice versa Ping tests the reachability of a particular network destination by sending an ICMP echo request and waiting for a reply TraceRoute displays the path to a destination by showing the number of hops and the router addresses of these hops Network Test Tools Enter a host name such as netopia com or an IP address then click on an option below NS Lookup Converts a host name into IP address or vice versa Ping Sends a ping message to an Internet Host TraceRoute Traces the path to an Internet Host 1 To use the NSLookup capability type an address domain name or IP address in the text box and click the NSLookup button Example Show the IP Address for grosso com Server controller2 netopia com Address 143 137 137 9 Name WWW grosso com Address 192 150 14 120 Result The DNS Server doing the lookup is displayed in the Server and Address fields If the Name Server can find your entry in its table it is displayed in the Name and Address fields 242 PING The network tools section sends a PING from the Gateway to either the LAN or WAN to verify connectivity A PING could be either an IP address 163 176 4 32 or Domain Name www netopia com 2 To use the Ping capability type a destination address domain name or IP address in the text box and
8. The security log has been reset When the Security Log contains no entries this is the response The security log is empty Timestamp Background During bootup to provide better log information and to support improved troubleshooting a Netopia Gateway acquires the National Institute of Standards and Technology NIST Uni versal Coordinated Time UTC reference signal and then adjusts it for your local time zone Once per hour the Gateway attempts to re acquire the NIST reference for re synchroniza tion or initial acquisition of the UTC information Once acquired all subsequent log entries display this date and time information UTC provides the equivalent of Greenwich Mean Time GMT information Ifthe WAN connection is not enabled or NTP has been disabled the internal clocking function of the Gateway provides log timestamps based on uptime of the unit 202 Install Install Button Install From the Install toolbar button you can Install new Operating System Software and Feature Keys as updates become available The descriptions below provide information on the links displayed on the left of the screen Install P Installation page for SSL certificate Certificate pag Installation page for software keys These allow additional features to run Install Key onthe Gateway A list of features available for the Gateway can be viewed from the System Status page Install Software Installa
9. ISP Username Device Address Device Gateway Primary DNS Secondary DNS Serial Number Ethernet Status USB Status Software Release Warranty Date Description Waiting for DSL is displayed while the Gateway is training This should change to Up within two minutes If not make sure an RJ 11 cable is used the Gateway is connected to the correct wall jack and the Gateway is not plugged into a micro filter No Connection is displayed if the Gateway has trained but failed the PPPoE login This usually means an invalid user name or password Go to Expert Mode and change the PPPoE name and password Up is displayed when the ADSL line is synched and the PPPoE or other connection method session is established Down is displayed if the line connection fails This should be the valid PPPoE username If not go to Expert Mode and change to the correct username This is the negotiated address of the Gateway s WAN interface This address is often dynamically assigned Make sure this is a valid address If this is not the correct assigned address go to Expert Mode and ver ify the PPPoE address has not been manually assigned This is the negotiated address of the remote router Make sure this is a valid address If this is not the correct address go to Expert Mode and verify the address has not been manually assigned These are the negotiated DNS addresses Make sure they are valid DNS add
10. TR 101 Support e Concurrent support for PPPoE and IPoE connections on the WAN See WAN on page 73 Multiple LAN IP Subnet support See LAN on page 51 Additional DHCP range support These ranges are associated with the additional LAN subnets on a 1 to 1 basis DHCP option filtering support Allows DHCP option data to be used to determine the desired DHCP address range See DHCP Option Filtering on page 277 e Support for additional WAN settings to control multicast forwarding as well as if 0 0 0 0 is used as the source address for IGMP packets See Advanced on page 76 e Support for unnumbered interfaces For IP interfaces this allows the address to be set to O and the DHCP client also to be disabled See page 79 PPPoE DHCP Autosensing See WAN on page 73 Wireless Multimedia Mode WMM support See WiFi Multimedia on page 67 Support of VLAN ID O on the Ethernet WAN and support for setting p bits on a segment port basis See VLAN on page 121 and CLI VLAN Settings on page 346 Firewall ClearSailing is automatically enabled on all 2200 Series ADSL2 platforms Explicit exceptions bonded and VDSL2 3341 and 3387WG See Firewall on page 149 13 e TR 069 Remote device management is automatically enabled by default for 2200 Series Gateways Explicit exceptions bonded and VDSL2 3341 3387WG See TR 069 on page 349 Corresponding commands have been added
11. set ip dsl vccn broadcast broadcast address Specifies the broadcast address for the TCP IP network connected to the virtual circuit IP hosts use the broadcast address to send messages to every host on your network simulta neously 284 CONFIG Commands The broadcast address for most networks is the network number followed by 255 For example the broadcast address for the 192 168 1 0 network would be 192 168 1 255 set ip dsl vccn netmask netmask Specifies the subnet mask for the TCP IP network connected to the virtual circuit The sub net mask specifies which bits of the 32 bit binary IP address represents network informa tion The default subnet mask for most networks is 255 255 255 0 Class C subnet mask set ip dsl vccn restriction admin disabled none Specifies restrictions on the types of traffic the Netopia Gateway accepts over the DSL vir tual circuit The admin disabled argument means that access to the device via telnet web and SNMP is disabled RIP and ICMP traffic is still accepted The none argument means that all traffic is accepted set ip dsl vccn addr mapping on off Specifies whether you want the Netopia Gateway to use network address translation NAT when communicating with remote routers Address mapping lets you conceal details of your network from remote routers It also permits all LAN devices to share a single IP address By default address mapping is turned On set ip
12. set radius radius port port_number Specifies the port on which the RADIUS server is listening The default value is 1812 VLAN Settings You can create up to 32 VLANs and you can also restrict any VLAN and the computers on it from administering the Gateway See VLAN on page 121 for more information set vlan name string Sets the descriptive name for the VLAN If no name is specified displays a selection list of node names to select for editing Once a new VLAN name is specified presents the list of VLAN characteristics to define id numerical range of possible IDs is 1 4094 A VID of zero O is permitted on the Ethernet WAN port only type by port global global type is available as well as by port admin restricted off on default is off If you select on administrative access to the Gateway is blocked from this VLAN port VLAN s physical port or wireless SSID tag packets transmitted from this port through this VLAN must be tagged with the VLAN VID Packets received through this port destined for this VLAN must be tagged with the VLAN VID by the source The tag option is only available on global type ports priority allows you to enable or disable packet prioritization based on any 802 1p pri ority bits in the VLAN header to prioritize packets within the Router s internal queues according to DiffServ priority mapping rules promote allows you to enable or disable writing any 8
13. Configuring Port Authentication You can use the following command to specify how your Netopia Gateway should respond when it receives an authentication request from a remote peer The settings for port authentication on the local Netopia Gateway must match the authenti cation that is expected by the remote peer For example if the remote peer requires CHAP authentication and has a name and CHAP secret for the Netopia Gateway you must enable 309 CHAP and specify the same name and secret on the Netopia Gateway before the link can be established set ppp module vccn port authentication option off on pap only chap only Specifying on turns both PAP and CHAP on or you can select PAP or CHAP Specify the username and password when port authentication is turned on both CHAP and PAP CHAP or PAP Authentication must be enabled before you can enter other information set ppp module vccn port authentication username username The username argument is 1 255 alphanumeric characters The information you enter must match the username configured in the PPP peer s authentication database set ppp module vccn port authentication password password The password argument is 1 128 alphanumeric characters The information you enter must match the password used by the PPP peer 310 CONFIG Commands PPPoE with IPoE Settings Ethernet WAN platforms set pppoe option on off Enables or disables
14. SHELL Command Shortcuts You can truncate most commands in the CLI to their shortest unique string For example you can use the truncated command q in place of the full quit command to exit the CLI However you would need to enter rese for the reset command since the first characters of reset are common to the restart command The only commands you cannot truncate are restart and clear To prevent accidental interruption of communications you must enter the restart and clear commands in their entirety You can use the Up and Down arrow keys to scroll backward and forward through recent commands you have entered Alternatively you can use the command to repeat the last command you entered SHELL Commands Common Commands arp nnn nnn nnn nnn Sends an Address Resolution Protocol ARP request to match the nnn nnn nnn nnn IP address to an Ethernet hardware address clear yes Clears the configuration settings in a Netopia Gateway If you do not use the optional yes qualifier you are prompted to confirm the clear command clear certificate Removes an SSL certificate that has been installed clear log Erases the log information stored in flash if persistent logging is enabled 252 SHELL Commands configure Puts the command line interface into Configure mode which lets you configure your Neto pia Gateway with Config commands Config commands are described starting on page 249 diagnose Runs a d
15. best effort assured expedite network control set diffserv qos dscp map 31 best effort assured expedite network control By default the following settings are used in custom mode set diffserv qos dscp map 0 best effort set diffserv qos dscp map 1 best effort set diffserv qos dscp map 2 best effort set diffserv qos dscp map 3 best effort 296 CONFIG Commands set set set set set set set set set set set set set set set set set set set set set set set set set set set set diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv diffserv qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos qos dscp map 4 dscp map 5 dscp map 6 dscp map 7 dscp map 8 dscp map 9 dscp map 10 dscp map 11 dscp map 12 dscp map 13 dscp map 14 dscp map 15 dscp map 16 dscp map 17 dscp map 18 dscp map 19 dscp map 20 dscp map 21 dscp map 22 dscp map 23 dscp map 24 dscp map 25 dscp map 26 dscp map 27 dscp map 28 dscp map 29 dscp map 30 dscp map 31 best effort assured best effort best effort best effort assured best effort best effort best effort assured best effort best effort best effort a
16. nect to the WAN The Interface should always be enabled unless you are instructed to dis able it by your Service Provider during troubleshooting P Address The LAN IP Address of the Gateway The IP Address you assign to your LAN interface must not be used by another device on your LAN network IP Netmask Specifies the subnet mask for the TCP IP network connected to the virtual circuit The subnet mask specifies which bits of the 32 bit binary IP address represent net work information The default subnet mask for most networks is 255 255 255 0 Class C subnet mask Restrictions Specifies whether an administrator can open a Web Administrator or Telnet connection to the Gateway over the LAN interface in order to monitor and configure the Gateway On the LAN Interface you can enable or disable administrator access By default administrative restrictions are turned off meaning an administrator can open a Web Administrator or Telnet connection through the LAN Interface 51 Advanced Clicking on the Advanced link displays the Advanced LAN IP Interface page Advanced LAN IP Interface Ethernet 100BT IGMP Forwarding O RIP Send Mode RIP 1 Hd RIP Receive Mode RIP 1 Hj Proxy ARP Static Client Address Translation submit GMP Forwarding The default setting is Disabled If you check this option it will enable Internet Group Management Protocol IGMP multicast forwarding IGMP allows a router to dete
17. v2 MD5 Specifies whether the Netopia Gateway should use Routing Information Protocol RIP broadcasts to update its routing tables with information received from other routers 286 CONFIG Commands If you specify v2 MD5 you must also specify a rip receive key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper oper ation of MD5 support Ethernet LAN Settings set ip ethernet A option on off Enables or disables communications through the designated Ethernet port in the Gateway You must enable TCP IP functions for an Ethernet port before you can configure its network settings set ip ethernet A address ip address Assigns an IP address to the Netopia Gateway on the local area network The IP address you assign to the local Ethernet interface must be unique on your network By default the Netopia Gateway uses 192 168 1 254 as its LAN IP address set ip ethernet A broadcast broadcast address Specifies the broadcast address for the local Ethernet interface IP hosts use the broad cast address to send messages to every host on your network simultaneously The broadcast address for most networks is the network number followed by 255 For example the broadcast address for the 192 168 1 0 network would be 192 168 1 255 set ip ethernet A netmask netmask Specifies the subnet mask for the local Ethernet interface The subnet mask specifies which bits of the 32
18. Select the protocol from the pull down menu TCP default UDP Direction Outbound P ICMP or Other Other is appropriate Start Port 0 for setting up flows on protocols with non standard port definitions IPSEC and End Port 0 PPTP are common examples Numerical Protocol If you select Other protocol this field appears for you to provide its actual protocol num ber with a range of O 255 Outside IP Address 0 0 0 0 Direction Choose Outbound default Inbound or Both from the pull Outside IP Netmask 0 0 0 0 down menu Quality of Service QoS Off Start Port For TCP or UDP protocols n you can optionally specify a range of ports Enter the starting port here Submit End Port Enter the ending port here Add or Edit more Custom Flows Inside IP Address Netmask For out bound flows specify an IP address net Inside IP Address 0 0 0 0 Inside IP Netmask 0 0 0 0 104 Configure mask on your LAN For inbound flows this setting is ignored This setting marks packets from this LAN IP host network based on the address and netmask information For out bound flows the Inside IP Address Netmask is the source address If you enter a zero IP address 0 0 0 0 the IP address netmask fields will be ignored Outside IP Address Netmask If you want traffic destined for and originating from a certain WAN IP address to be controlled enter the IP address and subnet mask her
19. Sets IGMP robustness range from 2 255 The default is 2 set igmp query intvl value Sets the query interval range from 10 seconds 600 seconds The default is 125 sec onds 282 CONFIG Commands set igmp query response intvl value Sets the query response interval range from 5 deci seconds tenths of a second 255 deci seconds The default is 100 deci seconds set igmp unsol report intvl value Sets the unsolicited report interval the amount of time in seconds between repetitions of a particular computer s initial report of membership in a group The default is 10 seconds set igmp version 11213 Sets the IGMP querier version version 1 version 2 or version 3 If you know you will be communicating with other hosts that are limited to v1 for backward compatibility select 1 otherwise allow the default 3 set igmp last member query intvl value Sets the last member query interval the amount of time in tenths of a second that the IGMP gateway waits to receive a response to a Group Specific Query message The last member query interval is also the amount of time in seconds between successive Group Specific Query messages The default is 1 second 10 deci seconds set igmp last member query count value Sets the last member query count the number of Group Specific Query messages sent before the gateway assumes that there are no members of the host group being queried on this interface The defaul
20. UTP wiring with RJ 45 eight conductor plugs at each end Runs at 100 Mbps ACK Acknowledgment Message sent from one network device to another to indicate that some event has occurred See NAK access rate Transmission speed in bits per second of the circuit between the end user and the network adapter Board installed in a computer system to provide network communi cation capability to and from that computer system address mask See subnet mask 351 ADSL Asymmetric Digital Subscriber Line Modems attached to twisted pair copper wiring that transmit 1 5 9 Mbps downstream to the subscriber and 16 640 kbps upstream depending on line distance Downstream rates are usually lower that 1 5Mbps in practice AH The Authentication Header provides data origin authentication connec tionless integrity and anti replay protection services It protects all data in a datagram from tampering including the fields in the header that do not change in transit Does not provide confidentiality ANSI American National Standards Institute ASCII American Standard Code for Information Interchange pronounced ASK ee Code in which numbers from O to 255 represent individual charac ters such as letters numbers and punctuation marks used in text repre sentation and communication protocols asynchronous communication Network system that allows data to be sent at irregular intervals by preceding each octet with a start bit an
21. You must set at least one of these keys indicated by the default keyid 344 CONFIG Commands Wireless MAC Address Authorization Settings set wireless mac auth option on off Enabling this feature limits the MAC addresses that are allowed to access the LAN as well as the WAN to specified MAC hardware addresses set wireless mac auth wrlss MAC list mac address MAC address_string Enters a new MAC address into the MAC address authorization table The format for an Ethernet MAC address is six hexadecimal values between OO and FF inclusive separated by colons or dashes e g 00 00 C5 70 00 04 set wireless mac auth wrlss MAC list mac address MAC address_string allow access on off Designates whether the MAC address is enabled or not for wireless network access Dis abled MAC addresses cannot be used for access until enabled RADIUS Server Settings set radius radius name server name string Specifies the default RADIUS server name or IP address set radius radius secret shared secret Specifies the RADIUS secret key used by this server The shared secret should have the same characteristics as a normal password set radius alt radius name server name string Specifies an alternate RADIUS server name or IP address to be used if the primary server is unreachable set radius alt radius secret shared secret Specifies the secret key used by the alternate RADIUS server 345
22. choose how the static route should be adver tised via RIP Split Horizon Do not advertise route if the gateway is on the same subnet Always Advertise route in all RIP messages Never Do not advertise route Click the Submit button The Alert icon ry will appear so that you can switch to the Save Changes page when you are finished Once you save your changes you will be returned to the IP Static Routes entry screen To create a new static IP route entry press the Add button To edit or delete a static IP route entry select the entry and press the Edit or Delete button IP Static Routes Network 192 166 255 0 Mask 255 255 255 0 Gateway 0 0 0 0 Edit Delete e You can continue to Add Edit or Delete Static Routes from this screen When you are finished click the Alert icon FN switch to the Save Changes page and click the Save Changes link 89 Link IP Static ARP Your Gateway maintains a dynamic Address Resolution Protocol ARP table to map IP addresses to Ethernet MAC addresses It populates this ARP table dynamically by retriev ing IP address MAC address pairs only when it needs them Optionally you can define static ARP entries to map IP addresses to their corresponding Ethernet MAC addresses Unlike dynamic ARP table entries static ARP table entries do not time out The IP address cannot be 0 0 0 0 The Ethernet MAC address entry is in nn nn nn nn nn nn hexadecimal fo
23. device should be disconnected until the source of the problem can be determined and until repair has been made If this is not done the telephone company may temporarily disconnect service 3 The telephone company may make changes in its technical operations and procedures if such changes affect the compatibility or use of this device the telephone company is required to give adequate notice of the changes You will be advised of your right to file a complaint with the FCC 4 Ifthe telephone company requests information on what equipment is connected to their lines inform them of a The telephone number to which this unit is connected b The ringer equivalence number O XB c The USOC jack required RJ11C d The FCC Registration Number XXXUSA XXXXX XX E Items b and d are indicated on the label The Ringer Equivalence Number REN is used to determine how many devices can be connected to your telephone line In most areas the sum of the REN s of all devices on any one line should not exceed five 5 0 If too many devices are attached they may not ring properly FCC Statements a This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA On the bottom of this equipment is a label that contains among other information a product identifier in the format US AAAEQ TXXXxX If requested this number must be provided to the telephone company b List all applicable certification jack
24. one that is used on data packets coming in to your network from the Internet or an output filter one that is used on data packets going out from your network to the Internet A filter set is a group of filters that work together to check incoming or outgoing data A fil ter set can consist of a combination of input and output filters How filter sets work A filter set acts like a team of customs inspectors Each filter is an inspector through which incoming and outgoing packages must pass The inspectors work as a team but each inspects every package individually Each inspector has a specific task One inspector s task may be to examine the destina tion address of all outgoing packages That inspector looks for a certain destination which could be as specific as a street address or as broad as an entire country and checks each package s destination address to see if it matches that destination A filter inspects data packets like a customs inspector scrutinizing packages 179 Filter priority Continuing the customs inspectors analogy imagine the packet inspectors lined up to examine a package If the package matches the first inspector s criteria the package is either rejected or passed on to its destination depending on the first inspector s particular orders In this case the package is never seen by the remaining inspectors first filter If the package does
25. user to this equipment or equipment malfunctions may give the telecommunications company cause to request the user to disconnect the equipment Users should ensure for their own protection that the electrical ground connections of the power utility telephone lines and internal metallic water pipe system if present are connected together This precaution may be particularly important in rural areas Caution Users should not attempt to make such connections themselves but should contact the appropriate electric inspection authority or electrician as appropriate The Ringer Equivalence Number REN assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5 373 Important Safety Instructions Australian Safety Information The following safety information is provided in conformance with Australian safety requirements Caution DO NOT USE BEFORE READING THE INSTRUCTIONS Do not connect the Ethernet ports to a carrier or carriage service provider s telecommunications network or facility unless a you have the written consent of the network or facility manager or b the connection is in accordance with a connection permit or connection rules Connection
26. 4 f Submit You can set your local time zone by selecting the number of hours your time zone is distant from Greenwich Mean Time GMT 12 12 from the pull down menu This allows you to set the time zone for access controls and in general 145 Security Button Security The Security features are available by clicking on the Security toolbar button Some items of this category do not appear when you log on as User Home Configure Troubleshoot Security Install Restart Help Home Security netopia The descriptions below provide information on the links displayed on the left of the Passwords screen Firewall IPSec Stateful Insp Allows changing the Admin or User passwords that control access to the Packet Filter Passwords Gateway Security Log Provides access to firewall settings if the firewall feature has been purchased Firewall IPSec Provides access to configuration parameters for IPSec functionality Stateful Provides access to stateful inspection settings Inspection Packet Filter Provides access to packet filter settings Security Log Provides specific information about security related events 146 Security Link Passwords Access to your Gateway may be controlled through two optional user accounts Admin and User When you first power up your Gateway you create a password for the Admin account The User account does not exist by default As the Admin a password
27. 6 i AutoChannel Setting _ WEP Automatic WEP Manual WPA 802 1x Enable Closed System Modi Block Wireless Bridging WPA PSK Privacy Y OFF No Privacy Other Wireless Options Multiple SSIDs Enable and Configure Multiple SSIDs MAC Authorization Limit Wireless Access by MAC Address e Off No Privacy provides no encryption on your wireless LAN data e WPA 802 1x provides RADIUS server authentication support e WPA PSK provides Wireless Protected Access the most secure option for your wire less network This mechanism provides the best data protection and access control 57 802 11 Wireless Settings Enable Wireless M SSID Network 4414 0400 ID Privacy WPA PSK Pre Shared Key The Pre Shared Key is a passphrase shared between the Router and the clients and is used to generate dynamically changing keys The passphrase can be 8 63 characters or up to 64 hex characters It is recommended to use at least 20 characters for best secu rity WEP Automatic is a passphrase generator You enter a passphrase that you choose in the Passphrase field The passphrase can be any string of words or numbers You can provide a level of data security by enabling WEP Wired Equivalent Privacy for encryption of network data You can enable 40 128 or 256 bit WEP Encryption depending on the capability of your client wireless card for IP traffic on your LAN You select a single key for encryption of out
28. An arbitrary 32 bit number called a Security Parameters Index SPI as well as the destination host s address and the IPSEC protocol identifier identify each SA An SPI is assigned to an SA when the SA is negotiated The SA can be referred to by using an SPI in AH and ESP transformations SA is unidirec tional SAs are commonly setup as bundles because typically two SAs are required for communications SA management is always done on bundles setup delete relay serial communication Method of data transmission in which data bits are transmitted sequentially over a communication channel 363 SHA 1 An implementation of the U S Government Secure Hash Algorithm a 160 bit authentication algorithm Soft MBytes Setting the Soft MBytes parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Soft MByte value The value can be configured between 7 and 1 000 000 MB and refers to data traffic passed If this value is not achieved the Hard MBytes parameter is enforced Soft Seconds Setting the Soft Seconds parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Soft Seconds value The value can be configured between 60 and 1 000 000 seconds SPI The Security Parameter Index is an identifier for the encryption and authentication algorithm and key The SPI indicates to the remote firewall the algorithm and key being used to encrypt and authenticate a packet
29. DNS information for example nslookup klaatu e The ip address argument is the IP address in dotted decimal notation of the device for which you want DNS information ping s size c count hostname ip address Causes the Netopia Gateway to issue a series of ICMP Echo requests for the device with the specified name or IP address The hostname argument is the name of the device you want to ping for example ping ftp netopia com 255 e The ip address argument is the IP address in dotted decimal notation of the device you want to locate If a host using the specified name or IP address is active it returns one or more ICMP Echo replies confirming that it is accessible from your network e The S size argument lets you specify the size of the ICMP packet e The C count argument lets you specify the number of ICMP packets generated for the ping request Values greater than 250 are truncated to 250 You can use the ping command to determine whether a hostname or IP address is already in use on your network You cannot use the ping command to ping the Netopia Gateway s own IP address quit Exits the Netopia Gateway command line interface reset arp Clears the Address Resolution Protocol ARP cache on your unit reset atm Resets the Asynchronous Transfer Mode ATM statistics reset cdmode This command will set up one boot flag so that the next time a 3342N 3352N restarts or reboots power cy
30. Europe France Spain and Japan will differ Channel selection can have a significant impact on performance depending on other wireless activ ity close to this Gateway Channel selection is not necessary at the client computers the clients will scan the available channels seeking access points using the same SSID as the client AutoChannel Setting For 802 11G models AutoChannel is a feature that allows the Netopia Gateway to determine the best channel to broadcast automatically Three settings are available from the pull down menu Off Use default At Startup and Continuous e Off Use default is the default setting the Netopia Gateway will use the configured default channel selected from the previous pull down menu e At Startup causes the Netopia Gateway at startup to briefly initialize on the default channel then perform a full two to three second scan and switch to the best channel it can find remaining on that channel until the next reboot e Continuous performs the at startup scan and will continuously monitor the current channel for any other Access Point beacons If an Access Point beacon is detected on the same channel the Netopia Gateway will initiate a three to four minute scan of the channels locate a better one and switch Once it has switched it will remain on this channel for at least 30 minutes before switching again if another Access Point is detected Enable Closed System Mode If enabled Closed System Mode h
31. Key 1 abcdefabcd Encryption Key Size 2 40 64 bit 10 characters P Encryption Key 2 efabcdefab Encryption Key Size 3 40 64 bit 10 characters P Encryption Key 3 cdefabcdef Encryption Key Size 4 40 64 bit 10 characters P Encryption Key 4 abcdefabcd Use WEP encryption key 1 4 1 f Submit To Multiple SSIDs Enable and Configure Multiple SSIDs WiFi Multimedia Enable and Configure WMM MAC Authorization Limit Wireless Access by MAC Address Note This page displays different options depending on which form of Privacy or other options you have enabled You can then configure Operating Mode The pull down menu allows you to select and lock the Gateway into the wireless transmission mode you want For compatibility with clients using 802 11b up to 60 Configure 11 Mbps transmission and 802 118 up to 20 Mbps select Normal 802 11b g To limit your wireless LAN to one mode or the other select 802 11b Only or 802 11g Only Se NOTE If you choose to limit the operating mode to 802 11b or 802 11g only clients using the mode you excluded will not be able to connect Default Channel on which the network will broadcast This is a frequency range within the 2 4Ghz band Channel selection depends on government regulated radio frequencies that vary from region to region The widest range available is from 1 to 14 However in North America only 1 to 11 may be selected
32. N status indicator lights Ethernet Link Solid green when connected Ethernet Traffic Flashes green when there is activity on the LAN DSL Traffic Blinks green when traffic is sent received over the WAN Solid green when the power is on Red if device malfunctions PPPoE Active Solid green when PPPoE is negotiated otherwise not lit DSL Sync Blinking green with no line attached or training solid green when trained with the DSL line 219 Netopia Gateway 3341 N 3351 N status indicator lights Ethernet Link Solid green when connected Ethernet Traffic Flashes green when there is activity on the LAN DSL Traffic Blinks green when traffic is sent received over the WAN Solid green when the power is on Red if device malfunctions USB Active Solid green when USB is connected otherwise not lit DSL Sync Blinking green with no line attached or training solid green when trained with the DSL line 220 Status Indicator Lights Netopia Gateway 3342 3342N 3352 3352N status indicator lights USB Solid green when USB is connected otherwise not lit DSL Blinking green with no line attached or training solid green when trained with the DSL line CE Special patterns e Both LEDs are off during boot power on boot or warm reboot When the 3342 3352 successfully boots up both LEDs flash green once Both LEDs are off when the Host OS suspends the devi
33. Netopia filter set page Filter Set Filter Input Rules 1 Fwd No Sre IP 199 211 211 17 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Src Port 23 Dst Port NC 2 Fwd No Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Src Port NC Dst Port 6000 8 Fwd Yes Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 ICMP 4 Fwd Yes Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Src Port NC Dst Port lt 1023 5 Fwd Yes Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 UDP Sre Port NC Dst Port lt 1023 Output Rules No Output Filter Rules have been defined 174 Firewall Tutorial Filter basics In the source or destination IP address fields the IP address that is entered must be the network address of the subnet A host address can be entered but the applied subnet mask must be 32 bits 255 255 255 255 Netopia Firmware Version 7 7 has the ability to compare source and destination TCP or UDP ports These options are as follows No Compare Does not compare TCP or UDP port Not Equal To Matches any port other than what is defined Less Than Anything less than the port defined Less Than or Equal Any port less than or equal to the port defined Equal Matches only the port defined Greater Than or Equal Matches the port or any port greater Greater Than Matches anything
34. Raha ed ey RE Example Nnetwork o oooooooooncn ee Example filters llli Example tes ey eck ie oS vestitu m crank de a Mea RUP ERR ES Example 2 2 56 eret A oer b i Example 3 etes rg tana e De HE ER ete bea Example 4 usse sosta o East dodi GREC Pe ucc Example 5 sod EU Ph aera len Packet Filter 2 ne naked REEL How filter sets work Filter priority iiec a ad How individual filters work o oooooooooooooo A filtering rule coe ee a ee Parts oFa fllter ost don ne occa dri dl Port numbers 0 0 2 0 0 cee eee ees Table of Contents Port number comparisons 0o ococcccco o 182 Other filter attributes llle 183 Putting the parts together llle 183 Filtering example Fl ooo 184 Filtering example 2 sese 186 Design guidelines ooococcocccooco IR 187 An approach to using filters llle 187 Working with IP Filters and Filter Sets 188 Adding a filter set llle 188 Adding filters to a filter set llli 189 Viewing filters lt o secre RR mme RE 193 Modifying filters llli 194 Deleting filters nnan lille 194 Moving fiters cid ts dede Hed 194 Deleting a filter set liliis 194 Associating a Filter Set with an Interface 194 Policy based Routing using Filtersets 197 TOS field matching oooocccccooc eee 197 Security Log emu do
35. Server options 249 security Security options servers Internal Server options snmp SNMP management options system Gateway s system options upnp UPnP options vlan VLAN options wireless Wireless LAN options top Go to top level of configuration mode quit Exit from configuration mode return to shell mode exit Exit from configuration mode return to shell mode Starting and Ending a CLI Session Open a telnet connection from a workstation on your network You initiate a telnet connection by issuing the following command from an IP host that sup ports telnet for example a personal computer running a telnet application such as NCSA Telnet telnet lt ip address gt You must know the IP address of the Netopia Gateway before you can make a telnet con nection to it By default your Netopia Gateway uses 192 168 1 254 as the IP address for its LAN interface You can use a Web browser to configure the Netopia Gateway IP address Logging In The command line interface log in process emulates the log in process for a UNIX host To logon enter the username either admin or user and your password e Entering the administrator password lets you display and update all Netopia Gateway settings e Entering a user password lets you display but not update Netopia Gateway settings When you have logged in successfully the command line interface lists the username and the security level associated with the password you entered
36. Start Port 1 65535 1 End Port 1 65535 1 Submit Add or Edit more Exposed Addresses e Start Port Start port of the range to be allowed to the host range The acceptable range is from 1 65535 End Port Protocol of the traffic to be allowed to the host range The acceptable range is from 1 65535 You can add more exposed addresses by clicking the Add more Exposed Addresses link A list of previously configured exposed addresses appears 166 Security 1 Start Address 192 168 1 10 End Address 192 168 1 12 TCP UDP Start Port 1 End Port 1 Click the Add button to add a new range of exposed addresses You can edit a previously configured range by clicking the Edit button or delete the entry entirely by clicking the Delete button All configuration changes will trigger the Alert Icon This allows you to validate the configuration and reboot the Gateway Netopia Save Changes Page Click on the Alert icon Home netopia Quickstart LAN WAN Advanced Configure Troubleshoot Security Install Home Configure Save Changes Restart Help Changes have been made to the Gateway database You must save the changes and Save Database Save Apply changes made to the database Save and Restart Apply changes and restart Gateway Review Review the contents of the database Validate Validate edited database Revert Database Revert Restore to settings before edits Validation pass
37. TCP or UDP set security pkt filter interface assigned filterset filterset name Associates a filterset with a LAN or WAN interface Example set security pkt filter ethernet A assigned filterset setl 327 SNMP Settings The Simple Network Management Protocol SNMP lets a network administrator monitor problems on a network by retrieving settings on remote network devices The network administrator typically runs an SNMP management station program on a local host to obtain information from an SNMP agent such as the Netopia Gateway set snmp community read name Adds the specified name to the list of communities associated with the Netopia Gateway By default the Netopia Gateway is associated with the public community set snmp community write name Adds the specified name to the list of communities associated with the Netopia Gateway set snmp community trap name Adds the specified name to the list of communities associated with the Netopia Gateway set snmp trap ip traps ip address Identifies the destination for SNMP trap messages The ip address argument is the IP address of the host acting as an SNMP console set snmp sysgroup contact contact info Identifies the system contact such as the name phone number beeper number or email address of the person responsible for the Netopia Gateway You can enter up to 255 char acters for the contact info argument You must put the contact info argument in
38. To delete a filter select a filter from the table and click the Delete button Moving filters To reorganize the filters in a filter set select a filter from the table and click the Move Up or Move Down button to place the filter in the desired priority position Deleting a filter set If you delete a filter set all of the filters it contains are deleted as well To reuse any of these filters in another set before deleting the current filter set you ll have to note their configuration and then recreate them To delete a filter set select the filter set from the Filter Sets list and click the Delete but ton Associating a Filter Set with an Interface Once you have created a filter set you must associate it with an interface in order for it to be effective Depending on its application you can associate it with either the WAN usu ally the Internet interface or the LAN To associate an filter set with the LAN return to the Filter Sets page 194 Associating a Filter Set with an Interface Filter Set Associations Ethernet 100BT None PPP over Ethernet vcc1 None Filter Sets 1 Filter Set Name Filter Set 1 Click the Ethernet 100BT link The Ethernet 100BT page appears Ethernet 100BT Associate Filter Set None 5 f Submit T Ethernet 100BT Associate Filter Se Arms Click the Submit button The Alert icon will appear in Web Telnet From the pull down menu select the filter s
39. a shortened form of the version number and ends with the suffix bin for binary Example nta760 bin a Click the Browse button select the file you want and click Open or b Enter the name and path of the software image you want to install in the text field 4 Click the Install Software button The Netopia Gateway copies the image file from your computer and installs it into its memory storage You see a progress bar appear on your screen as the image is copied and installed Install Operating System Software Browse your computer to find the system software file or type in the full path and filename Next to install the file on your Gateway click the Install Software button The latest releases are available online at Netopia s website www netopia com The install may take a few minutes After the install has completed restart your Gateway to run the new software C nta761 bin Browse Install Software CL 1 When the image has been installed a success message displays 206 Install File Installation Success The file installation was successful You must restart your Gateway in order for the changes to take effect 5 When the success message appears click the Restart button and confirm the Restart when you are prompted Your Netopia Gateway restarts with its new image Verify the Netopia Firmware Release To verify that the Netopia firmware image has load
40. account management page 34 Home Page Basic Mode Link Status Details If you need to diagnose any problems with your Netopia Gateway or its connection to the Internet you can run a sophisticated diagnostic tool It checks several aspects of your physical and electronic connection and reports its results on screen This can be useful for troubleshooting or when speaking with a technical support technician Click on the Status Details link The Diagnostics page appears This Button will execute a predefined series of internal checks and loopback tests This may take a few minutes to complete Click the Run Diagnostics button to run your diagnostic tests For a detailed description of these tests see Diagnostics on page 241 35 Link Enable Remote Management This link allows you to authorize a remotely located person such as a support technician to directly access your Netopia Gateway This is useful for fixing configuration problems when you need expert help You can limit the amount of time such a person will have access to your Gateway This will prevent unauthorized individuals from gaining access after the time limit has expired Click the Enable Rmt Mgmt link The Enable Remote Management page appears Enable Remote Management Please enter a password for administrator access to this device as well as a timeout value for the management session You may leave the password entries bl
41. assign to your LAN computer s a pri vate IP address and other parameters that allow network communication The default DHCP Server configuration of the Gateway supports up to 253 LAN IP addresses This feature simplifies network administration because the Gateway maintains a list of IP address assignments Additional computers can be added to your LAN without the hassle of configuring an IP address DNS Proxy Domain Name System DNS provides end users with the ability to look for devices or web sites by typing their names rather than IP addresses For web surfers this technology allows you to enter the URL Universal Resource Locator as text to surf to a desired web site The Netopia DNS Proxy feature allows the LAN side IP address of the Gateway to be used for proxying DNS requests from hosts on the LAN to the DNS Servers configured in the gateway This is accomplished by having the Gateway s LAN address handed out as the DNS Server to the DHCP clients on the LAN 379 Se NOTE The Netopia DNS Proxy only proxies UDP DNS queries not TCP DNS queries Management Embedded Web Server There is no specialized software to install on your PC to configure manage or maintain your Netopia Gateway Web pages embedded in the operating system provide access to the following Gateway operations Setup System and security logs Diagnostics functions Once you have removed your Netopia Gateway from its packin
42. at the same time This would prevent you from accessing the Gateway 315 Security Settings Security settings include the Firewall Packet Filtering Stateful Inspection and IPSec parameters Some of the security functionality is keyed Firewall Settings for BreakWater Firewall set security firewall option ClearSailing SilentRunning LANdLocked The 3 settings for BreakWater are discussed in detail on page page 149 SafeHarbour IPSec Settings SafeHarbour VPN is a tunnel between the local network and another geographically dis persed network that is interconnected over the Internet This VPN tunnel provides a secure cost effective alternative to dedicated leased lines Internet Protocol Security IPsec is a series of services including encryption authentication integrity and replay pro tection Internet Key Exchange IKE is the key management protocol of IPsec that estab lishes keys for encryption and decryption Because this VPN software implementation is built to these standards the other side of the tunnel can be either another Netopia unit or another IPsec IKE based security product For VPN you can choose to have traffic authenti cated encrypted or both When connecting the Netopia unit in a telecommuting scenario the corporate VPN settings will dictate the settings to be used in the Netopia unit If a parameter has not been speci fied from the other end of the tunnel choose the default unless you
43. bit binary IP address represent network information The default sub net mask for most networks is 255 255 255 0 Class C subnet mask set ip ethernet A restrictions none admin disabled Specifies whether an administrator can open a telnet connection to a Netopia Gateway over an Ethernet interface A the LAN to monitor and configure the unit The admin disabled argument prevents access to the device via telnet web and SNMP 287 By default administrative restrictions are none on the LAN but admin disabled is set on the WAN This means that by default an administrator can open for example a telnet connection from the LAN but not the WAN set ip ethernet A rip send off v11 v2 1 v1 compat v2 MD5 Specifies whether the Netopia Gateway should use Routing Information Protocol RIP broadcasts to advertise its routing tables to other routers on your network RIP Version 2 RIP 2 is an extension of the original Routing Information Protocol RIP 1 that expands the amount of useful information in the RIP packets While RIP 1 and RIP 2 share the same basic algorithms RIP 2 supports several additional features including inclusion of subnet masks in RIP packets and implementation of multicasting instead of broadcasting which reduces the load on hosts which do not support routing protocols RIP 2 with MD5 authen tication is an extension of RIP 2 that increases security by requiring an authentication key when routes
44. can be abbreviated to the length that they are differentiated from other keywords Argument Text Text strings can be as many as 64 characters long unless otherwise speci fied In some cases they may be as long as 255 bytes Special characters are represented using backslash notation Text strings may be enclosed in double or single quote marks If the text string includes an embedded space it must be enclosed in quotes Special characters are represented using backslash notation Numbers Enter numbers as integers or in hexadecimal where so noted IP addresses Enter IP addresses in dotted decimal notation 0 to 255 If a command is ambiguous or miskeyed the CLI prompts you to enter additional informa tion For example you must specify which virtual circuit you are configuring when you are setting up a Netopia Gateway Displaying Current Gateway Settings You can use the View command to display the current CONFIG settings for your Netopia Gateway If you enter the View command at the top level of the CONFIG hierarchy the CLI displays the settings for all enabled functions If you enter the View command at an inter mediate node you see settings for that node and its subnodes Step Mode A CLI Configuration Technique The Netopia Gateway command line interface includes a step mode to automate the pro cess of entering configuration settings When you use the CONFIG step mode the com mand line interface prompts you for
45. communication with the router itself You can avoid this by preced ing the Force Routing filter with a filter that matches the destination IP address of the Gateway itself 199 Link Security Log Security Monitoring is a keyed feature See page 209 for information concerning installing Netopia Software Feature Keys Security Monitoring detects security related events including common types of malicious attacks and writes them to the security log file ATAR Show Reset Using the Security Monitoring Log You can view the Security Log at any time Use the following steps 1 a e O N Click the Security toolbar button Click the Security Log link Click the Show link from the Security Log tool bar An example of the Security Log is shown on the next page When a new security event is detected you will see the A erf button The Security Alert remains until you view the information Clicking the Alert button will take you directly to a page showing the log 200 Policy based Routing using Filtersets Your Netopia Gateway has detected and successfully blocked an event that could have compromised the security of your network Please refer to your customer documentation for a description of the logged event Number of security log entries Security alert type E Port Scan Protocol type TCP IP source address 143 137 137 14 Time at last attempt Fri May 21 15 17 40 2004 UTC Number of por
46. default is off set security pkt filter filterset filterset name in out index frc rte on off Turns forced routing on or off for the specified filter rule A match on this rule will force a route for packets The default is off set security pkt filter filterset filterset name in out index gateway ip addr Specifies the gateway IP address for forced routed packets if forced routing is enabled set security pkt filter filterset filterset name in out index src ip ip addr Specifies the source IP address to match packets where the packet was sent from set security pkt filter filterset filterset name in out index src mask mask Specifies the source IP mask to match packets where the packet was sent from set security pkt filter filterset filterset name in out index dest ip ip addr Specifies the destination IP address to match packets where the packet is going set security pkt filter filterset filterset name in out index dest mask mask Specifies the destination IP mask to match packets where the packet is going 325 set security pkt filter filterset filterset name in out index tos value Specifies the TOS Type Of Service value to match packets The value for tos can be from O 255 set security pkt filter filterset filterset name in out index tos mask value Specifies the TOS Type Of Service mask to match packets The value for tos mask can be
47. dsl vccn auto sensing on off Enables or disables PPPoE DHCP autosensing on the specified interface If you are using PPPoE setting this to on enables automatic sensing of your WAN connection type PPPoE or DHCP If this feature is enabled the gateway attempts to connect using PPPoE first If the Gateway fails to connect after 60 seconds it switches to DHCP As soon as it can con nect via DHCP the Gateway chooses and sets DHCP as its default Otherwise after attempting to connect via DHCP for 60 seconds the Gateway switches back to PPPoE The Gateway will continue to switch back and forth in this manner until it successfully con nects set ip dsl vccn mcast fwd on off Enables or disables multi cast forwarding on the specified interface If set to on this inter face acts as an IGMP proxy host and IGMP packets are transmitted and received on this interface on behalf of IGMP hosts on the LAN interface 285 set ip dsl vccn igmp null source addr on off Specifies whether you want the Netopia Gateway to identify the source IP address of every IGMP packet transmitted from this interface as 0 0 0 0 when mcast fwd is set to on This complies with the requirements of TR 101 and removes the need for a publicly advertised IP address on the WAN interface set ip dsl vccn unnumbered on off Specifies whether you want the Netopia Gateway to have its WAN interface unnumbered i e set to O unnumbered option is o
48. eee 97 What are IPMaps and how are they used 97 What types of servers are supported by IPMaps 97 Can use IPMaps with my PPPoE or PPPoA connection 97 Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway x 85 ese ERE RCRUM RETE 97 IPMaps Block Diagram llllslllesellleelne 98 Default Semer ris eet RR ERR ERA 99 Configure a Default Server o oooooccococcoco cee eee 99 Typical Network Diagram 0 00 eee 100 NAT Combination Application o ooooooo ocoo 101 IP Passthrough 2 25 RR eL ER PI x mE 101 AcrestriCtionr us eine hele gs dites Rue A 102 Differentiated Services o0coocoocooocoo eee 103 DNS ad lo 106 DHCP Server ici od eje 106 RADIUS Severin ln eee 108 SNMP eaat e E a Os a 109 IGMP Internet Group Management Protocol 112 O bbe wielded veg dia dae esit mtr 115 LAN Management 000 0c e cece se 116 Ethernet Bridge i i stead pee dete Elda 117 Configuring for Bridge Mode 0200 0c eee eee 118 MEAN eph A a dete anh ghey Ste eae 121 Example 1 rA ERA dow Oe ewe SE ed 129 Example 42 a cies d ic Ao Ia Roots HR eR ets 132 System cumu Pi EUER Rare ree 135 Syslog Parameters i2 ux de etn eg reis 135 Log Event Messages 0000 cece lee 137 Internal Servers oor geo e EC need od 44 ede 140 Software Hosting llis eee 141 List of Supported Games and Software
49. energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures W Reorient or relocate the receiving antenna m increase the separation between the equipment and receiver W Connect the equipment into an outlet on a circuit different from that to which the receiver is connected m Consult the dealer or an experienced radio TV technician for help Service requirements In the event of equipment malfunction all repairs should be performed by our Company or an authorized agent Under FCC rules no customer is authorized to repair this equipment This restriction applies regardless of whether the equipment is in or our of warranty It is the responsibility of users requiring service to report the need for service to our Company or to one of our authorized agents Service can be obtained at Netopia Inc 6001 Shellmound Street Emeryville California 94608 Telephone 510 597 5400 372 Manufacturer s Declaration of Conformance C Important This product was tested for FCC compliance under conditions that included the use of shi
50. enhance network security there are disadvan tages e Filters are complex Combining them in filter sets introduces subtle interac tions increasing the likelinood of implementation errors e Enabling a large number of filters can have a negative impact on perfor mance Processing of packets will take longer if they have to go through many checkpoints in addition to NAT e Too much reliance on packet filters can cause too little reliance on other security methods Filter sets are not a substitute for password protection effective safeguarding of passwords and general awareness of how your net work may be vulnerable Netopia Firmware Version 7 7 s packet filters are designed to provide security for the Inter net connections made to and from your network You can customize the Gateway s filter sets for a variety of packet filtering applications Typically you use filters to selectively admit or refuse TCP IP connections from certain remote networks and specific hosts You 178 Firewall Tutorial will also use filters to screen particular types of connections This is commonly called fire walling your network Before creating filter sets you should read the next few sections to learn more about how these powerful security tools work What s a filter and what s a filter set A filter is a rule that lets you specify what sort of data can flow in and out of your network A particular filter can be either an input filter
51. entering a partial path that starts with a top level CONFIG com mand e Scrolling backward and forward through recent commands You can use the Up and Down arrow keys to scroll backward and forward through recent commands you have entered When the command you want appears press Enter to execute it Entering Commands in CONFIG Mode CONFIG commands consist of keywords and arguments Keywords in a CONFIG command specify the action you want to take or the entity on which you want to act Arguments in a CONFIG command specify the values appropriate to your site For example the CONFIG command set ip ethernet A p_address consists of two keywords jp and ethernet A and one argument ip address When you use the command to configure your Gateway you would replace the argument with a value appropriate to your site For example set ip ethernet A 192 31 222 57 266 About CONFIG Commands Guidelines CONFIG Commands The following table provides guidelines for entering and formatting CONFIG commands Command Rules for entering CONFIG commands component commands must start with a command verb set view delete You can truncate CONFIG verbs to three characters set vie del CONFIG verbs are case insensitive You can enter SET Set or set Keywords Keywords are case insensitive You can enter Ethernet ETHERNET or ethernet as a keyword without changing its meaning Keywords
52. f Update Delete 10 Make the Tunnel Details entries Enter or select the required set tings Soft MBytes Soft Seconds Hard MBytes and Hard Seconds values do not have to match the peer remote VPN device Refer to your IPSec Tunnel Details Parameter Setup Worksheet on page 157 11 Click Update The Alert button appears 12 Click the A ert button 13 Click Save and Restart Your SafeHarbour IPSec VPN tun nel is fully configured 159 Parameter Descriptions The following tables describe SafeHarbour s parameters that are used for an IPSec VPN tunnel configuration Table 2 IPSec Configuration page parameters Field Name Peer External IP Address Encryption Protocol Authentication Protocol Key Management Description The Name parameter refers to the name of the configured tunnel This is mainly used as an identifier for the administrator The Name parameter is an ASCII value and is limited to 31 characters The tunnel name does not need to match the peer gateway The Peer External IP Address is the public or routable IP address of the remote gateway or VPN server you are establishing the tunnel with Encryption protocol for the tunnel session Parameter values supported include NONE or ESP Authentication Protocol for IP packet header The three parameter values are None Encapsulating Security Payload ESP and Authentication Header AH The Key Management algorithm m
53. firewall constantly inspecting the flow of traffic determining direction limiting or eliminating inbound access and verifying down to the packet level that the network traffic is only what the customer chooses The Netopia Gateway works like a network super traffic cop inspecting and filter ing out undesired traffic based on your security policy and resulting configu ration interface A connection between two devices or networks internet address IP address A 32 bit address used to route packets on a TCP IP network In dotted decimal notation each eight bits of the 32 bit number are presented as a decimal number with the four octets separated by periods IPCP Internet Protocol Control Protocol A network control protocol in PPP specifying how IP communications will be configured and operated over a PPP link 358 IPSEC A protocol suite defined by the Internet Engineering Task Force to protect IP traffic at packet level It can be used for protecting the data trans mitted by any service or application that is based on IP but is commonly used for VPNs ISAKMP Internet Security Association and Key Management Protocol is a framework for creating connection specific parameters It is a protocol for establishing negotiating modifying and deleting SAs and provides a frame work for authentication and key exchange ISAKMP is a part of the IKE proto col Key Management The Key Management algorithm manages the exchange
54. for comparison but allowing this value to be configured permits more flexibility set dhcp filterset name string rule n match action pass discard continue Assigns a match action to the filterset If set to pass the match pool address is shown set dhcp filterset name string rule n absent action pass discard continue Assigns an absent action to the filterset If set to pass the absent pool address is hid den set dhcp filterset name string rule n match str match string Assigns a match string to the filterset The match str string will be compared against the DHCP DISCOVER option data This string can contain multiple and wildcard substi tutions set dhcp filterset name string rule n match pool ip address Specifies the start IP address of the range within a DHCP pool where that range will be used to allocate an address if the wildcard matches The value 0 0 0 0 means regular processing 255 255 255 255 means discard 277 set dhcp filterset name string rule n absent pool ip address Specifies the start IP address of the range within a DHCP pool where that range will be used to allocate an address if the option in the DHCP packet is not present The value 0 0 0 0 means regular processing 255 255 255 255 means discard Example Netopia 3000 9450000 dhcp gt gt sc set set set set set set set dhcp dhcp dhcp dhcp dhcp dhcp dhcp option server start addr
55. for the User account can be entered or existing passwords changed Create and Change Passwords You can establish different levels of access security to protect your Netopia Gateway settings from unauthorized display or modifica tion e Admin level privileges let you display and modify all settings in the Netopia Gateway Read Write mode The Admin level password is created when you first access your Gateway e User level privileges let you display but not change settings of the Netopia Gateway Read Only mode To prevent anyone from observing the password you enter characters in the old and new password fields are not displayed as you type them 147 To display the Passwords window click the Security toolbar button on the Home page About Passwords Access to your Gateway Is controlled through two user accounts Admin and User Admin Full access to the Gateway User Notallowed to configure any parameters install keys software or restart the Gateway Use the fields below to change or create passwords Username admin Admin account BE Old Password Leave blank if no old password New Password Confirm Password Password changes are automatically saved and take effect immediately f Submit Use the following procedure to change existing passwords or add the User password for your Netopia Gateway 1 Select the account type from the Username pull down list Choose from Admin or User 2 If you assig
56. fully understand the ramifications of your parameter choice set security ipsec option off on off Turns on the SafeHarbour IPsec tunnel capability Default is off See IPSec on page 154 for more information set security ipsec tunnels name 123 The name of the tunnel can be quoted to allow special characters and embedded spaces 316 CONFIG Commands set security ipsec tunnels name 123 tun enable on on off This enables this particular tunnel Currently one tunnel is supported set security ipsec tunnels name 123 dest ext address ip address Specifies the IP address of the destination gateway set security ipsec tunnels name 123 dest int network ip address Specifies the IP address of the destination computer or internal network set security ipsec tunnels name 123 dest int netmask netmask Specifies the subnet mask of the destination computer or internal network The subnet mask specifies which bits of the 32 bit IP address represents network information The default subnet mask for most networks is 255 255 255 0 class C subnet mask set security ipsec tunnels name 123 encrypt protocol ESP ESP none See page 154 for details about SafeHarbour IPsec tunnel capability set security ipsec tunnels name 123 auth protocol ESP AH ESP none See page 154 for details about SafeHarbour IPsec tunnel capability set security ipsec tunnels name 123 IKE mode pre shar
57. greater than the port defined Example network Input Packet Filter _ _ _ Data IP 200 1 1 175 Example filters Example 1 Filter Rule 200 1 1 0 Source IP Network Address 255 255 255 128 Source IP Mask Forward No What happens on match Incoming packet has the source address of 200 1 1 28 This incoming IP packet has a source IP address that matches the network address in the Source IP Address field in Netopia Firmware Version 7 7 This will not forward this packet Example 2 Filter Rule 200 1 1 0 Source IP Network Address 255 255 255 128 Source IP Mask Forward No What happens on match Incoming packet has the source address of 200 1 1 184 This incoming IP packet has a source IP address that does not match the network address in the Source IP Address field in Netopia Firmware Version 7 7 This rule will forward this packet because the packet does not match Example 3 Filter Rule 200 1 1 96 Source IP Network Address 255 255 255 240 Source IP Mask Forward No What happens on match Incoming packet has the source address of 200 1 1 184 This rule does not match and this packet will be forwarded 176 Firewall Tutorial Example 4 Filter Rule 200 1 1 96 Source IP Network Address 255 255 255 240 Forward No Source IP Mask What
58. host when it doesn t know what else to do with it See Default Server on page 99 for more information set nat default dhcp enable on off Allows the IP passthrough host to acquire its IP address via DHCP if ip passthrough is enabled set nat default address ip address Specifies the IP address of the NAT default server 305 set nat default host hardware address MAC address Specifies the hardware MAC address of the IP passthrough host If the MAC address is specified as all zeroes the first DHCP client that requests an IP address gets the passthrough address Network Address Translation NAT Pinhole Settings NAT pinholes let you pass specific types of network traffic through the NAT interfaces on the Netopia Gateway NAT pinholes allow you to route selected types of network traffic such as FTP requests or HTTP Web connections to a specific host behind the Netopia Gateway transparently To set up NAT pinholes you identify the type s of traffic you want to redirect by port num ber and you specify the internal host to which each specified type of traffic should be directed The following list identifies protocol type and port number for common TCP IP protocols e FTP TCP 21 e telnet TCP 23 e SMTP TCP 25 e TFTP UDP 69 e SNMP TCP 161 UDP 161 set pinhole name name Specifies the identifier for the entry in the router s pinhole table You can name pinhole table entries sequentially 1
59. in the diagnostic log 250 Using the CLI Help Facility Ending a CLI Session You end a command line interface session by typing quit from the SHELL node of the command line interface hierarchy Saving Settings In CONFIG mode the save command saves the working copy of the settings to the Gate way The Gateway automatically validates its settings when you save and displays a warn ing message if the configuration is not correct Using the CLI Help Facility The help command lets you display on line help for SHELL and CONFIG commands To dis play a list of the commands available to you from your current location within the command line interface hierarchy enter help To obtain help for a specific CLI command type help lt command gt You can truncate the help command to h or a question mark when you request help for a CLI command About SHELL Commands You begin in SHELL mode when you start a CLI session SHELL mode lets you perform the following tasks with your Netopia Gateway e Monitor its performance e Display and reset Gateway statistics ssue administrative commands to restart Netopia Gateway functions SHELL Prompt When you are in SHELL mode the CLI prompt is the name of the Netopia Gateway followed by a right angle bracket gt For example if you open a CLI connection to the Netopia Gate way named Netopia 3000 9437188 you would see Netopia 3000 9437188 gt as your CLI prompt 251
60. ipsec tunnels name 123 IKE mode invalid spi recovery off on Enables the Gateway to re establish the tunnel if either the Netopia Gateway or the peer gateway is rebooted set security ipsec tunnels name 123 xauth enable off on Enables or disables Xauth extensions to IPsec when IKE mode neg method is set to aggressive Default is off set security ipsec tunnels name 123 xauth username username Sets the Xauth username if Xauth is enabled set security ipsec tunnels name 123 xauth password password Sets the Xauth password if Xauth is enabled set security ipsec tunnels name 123 nat enable on off Enables or disables NAT on the specified IPsec tunnel The default is off set security ipsec tunnels name 123 nat pat address p address Specifies the NAT port address translation IP address for the specified IPsec tunnel set security ipsec tunnels name 123 local id type IP address Subnet Hostname ASCII Specifies the NAT local ID type for the specified IPsec tunnel when Aggressive Mode is set 319 set security ipsec tunnels name 123 local id id value Specifies the NAT local ID value as specified in the local id type for the specified IPsec tunnel when Aggressive Mode is set er Note If subnet is selected the following two values are used instead set security ipsec tunnels name 123 local id addr p address set security ipsec tunnels name 123 local id ma
61. is disabled off you must manually start stop a ppp connection 307 set ppp module vccn mru integer Specifies the Maximum Receive Unit MRU for the PPP interface The integer argument can be any number between 128 and 1492 for PPPoE 1500 otherwise set ppp module vccn magic number on off Enables or disables LCP magic number negotiation set ppp module vccn protocol compression on off Specifies whether you want the Netopia Gateway to compress the PPP Protocol field when it transmits datagrams over the PPP link set ppp module vccn Icp echo requests on off Specifies whether you want your Netopia Gateway to send LCP echo requests You should turn off LCP echoing if you do not want the Netopia Gateway to drop a PPP link to a nonre sponsive peer set ppp module vccn echo period integer Specifies the number of seconds the Netopia Gateway should wait before sending another echo from an LCP echo request The integer argument can be any number from between 5 and 300 seconds set ppp module vccn lost echoes max integer Specifies the maximum number of lost echoes the Netopia Gateway should tolerate before bringing down the PPP connection The integer argument can be any number from between 1 and 20 set ppp module vccn failures max integer Specifies the maximum number of Configure NAK messages the PPP module can send without having sent a Configure ACK message The integer argument
62. level by entering quit at the CONFIG prompt and pressing RETURN Netopia 3000 9437188 top gt gt quit Netopia 3000 9437188 gt Moving from fop to a subnode You can navigate from the top node to a subnode by entering the node name or the significant letters of the node name at the CONFIG prompt and pressing RETURN For example you move to the IP subnode by entering ip and pressing RETURN Netopia 3000 9437188 top gt gt ip Netopia 3000 9437188 ip gt gt As a shortcut you can enter the significant letters of the node name in place of the full node name at the CONFIG prompt The significant characters of a node name are the let ters that uniquely identify the node For example since no other CONFIG node starts with b you could enter one letter b to move to the bridge node e Jumping down several nodes at once You can jump down several levels in the CONFIG hierarchy by entering the complete path to a node 265 e Moving up one node You can move up through the CONFIG hierarchy one node at a time by entering the up command e Jumping to the top node You can jump to the top level from anywhere in the CON FIG hierarchy by entering the top command e Moving from one subnode to another You can move from one subnode to another by entering a partial path that identifies how far back to climb e Moving from any subnode to any other subnode You can move from any subnode to any other subnode by
63. like VLAN Entry 1 Enable v VLAN Name Network A Type By Port is Admin Restricted Submit For example call it Network A 129 Since this VLAN will be for SSID1 and Ethernet Port 1 leave Admin Restricted unchecked This will give this VLAN access to the Gateway 3 Click the Submit button 4 In the Port Configuration for VLAN 1 page you add the Port Interfaces you want associated with the VLAN Port Configuration for VLAN 1 nable Tag Priority Submit In this case check uplink eth0 1 and ssid1 5 Click the Submit button 6 In the VLAN page select VLAN 2 in the VLANs list and click the Edit but ton VLAN Entry 2 Enable v VLAN Name Network B Type By Port HJ Admin Restricted V Submit The VLAN Name must be given another unique name For example call it Network B 130 Configure Since this is for the second SSID that we don t want to be given access to the Gateway check the Admin Restricted checkbox 7 Click the Submit button 8 Check both the uplink port interface and the ssid2 port interface Port Configuration for VLAN 2 Tag Priority 3 i ipsec mgmt1 Submit b 9 Click the Submit button 10 Once you have finished with the configuration of the VLANs click on the Alert icon in the upper right hand corner This will validate that the settings are legal for your network 11 Click the Save and Restart link This will resta
64. lines in a form that keeps it separate from your voice telephone signals If your service provider s network is set up to provide your Internet connectivity via bridge mode you can set your Netopia Gateway to be compatible Bridges let you join two networks so that they appear to be part of the same physical net work As a bridge for protocols other than TCP IP your Gateway keeps track of as many as 512 MAC Media Access Control addresses each of which uniquely identifies an individual host on a network Your Gateway uses this bridging table to identify which hosts are acces sible through which of its network interfaces The bridging table contains the MAC address of each packet it sees along with the interface over which it received the packet Over time the Gateway learns which hosts are available through its WAN port and or its LAN port When configured in Bridge Mode the Netopia will act as a pass through device and allow the workstations on your LAN to have public addresses directly on the internet cr NOTE In this mode the Netopia is providing NO firewall protection as is afforded by NAT Also only the workstations that have a public address can access the internet This can be useful if you have multiple static public IPs on the LAN Bridging per WAN is supported in conjunction with VLANs individual WANs can be bridged to the LAN only if the WANs are part of a VLAN See VLAN on page 121 for more infor ma
65. log message is generated when RFC1483 link goes down This log message is generated when a PPP channel comes up 6 PPP lt WAN This log message is generated when a PPP channel goes down The Instance gt down reason for the channel going down is displayed as well lt Reason gt Access related Log Messages 1 permitted This log message is generated whenever a packet is allowed to traverse router interfaces or allowed to access the router itself 2 attempt This log message is generated whenever a packet attempts to 3 dropped violation of security policy 4 dropped invalid checksum 5 dropped invalid data length traverse router interfaces or attempts to access the router itself This log message is generated whenever a packet traversing the router or destined to the router itself is dropped by the firewall because it violates the expected conditions This log message is generated whenever a packet traversing the router or destined to the router itself is dropped because of invalid IP checksum This log message is generated whenever a packet traversing the router or destined to the router itself is dropped because the IP length is greater than the received packet length or if the length is too small for an IP packet Configure 6 dropped frag mented packet 7 dropped cannot fragment 8 dropped no route found 9 dropped invalid IP version 10 dropped possi ble la
66. match on see the table on page 182 11 When you are finished configuring the filter click the Submit button to save the filter in the filter set Viewing filters To display the table of input or output filters select the Filter Set Name in the Filter Set page and click the Add or Edit button Filter Sets Filter Set 1 Add Edit Delete The table of filters in the filtersets appears Filter Set Filter Input Rules 1 Fwd No Src IP 199 211 211 17 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Src Port 23 Dst Port NC 2 Fwd No Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Sre Port NC Dst Port 6000 8 Fwd Yes Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 ICMP 4 Fwd Yes Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Sre Port NC Dst Port lt 1023 5 Fwd Yes Sre IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 UDP Src Port NC Dst Port lt 1023 Ada Edit Move Down J Move Up J Delete Output Rules No Output Filter Rules have been defined 193 Modifying filters To modify a filter select a filter from the table and click the Edif button The Rule Entry page appears The parameters in this page are set in the same way as the ones in the orig inal Rule Entry page see Adding filters to a filter set on page 189 Deleting filters
67. not match the first inspector s criteria it goes to the second inspector and so on You can see that the order of the inspectors in the line is very important For example let s say the first inspector s orders are to send along all packages that come from Rome and the sec ond inspector s orders are to reject all packages that come from France If a package arrives from Rome the first discard inspector sends it along without allowing the second inspec delete tor to see it A package from Paris is ignored by the first inspector rejected by the second inspector and never seen by the others A package from London is ignored by the first two inspectors so it s seen by the third inspector forward tongtwork In the same way filter sets apply their filters in a particular order The first filter applied can forward or discard a packet before that packet ever reaches any of the other filters If the first filter can neither forward nor discard the packet because it cannot match any criteria the second filter has a chance to forward or reject it and so on Because of this hierarchical structure each filter is said to have a priority The first filter has the highest priority and the last filter has the lowest priority How individual filters work As described above a filter applies criteria to an IP packet and then takes one of three actions e Forwards the packet to the local or remote network e Blocks discards th
68. pages E NOTE Make sure you understand how filters work before attempting to use them Read the section Packet Filter on page 178 Filter Sets No Filter Sets have been defined f Add The procedure for creating and maintaining filter sets is as follows 1 Add a new filter set See Adding a filter set below 2 Create the filters for the new filter set See Adding filters to a filter set on page 189 3 Associate the filter set with either the LAN or WAN interface See Associating a Filter Set with an Interface on page 194 The sections below explain how to execute these steps Adding a filter set You can create up to eight different custom filter sets Each filter set can contain up to 16 output filters and up to 16 input filters There can be a maximum of 32 filter rules in the system To add a new filter set click the Add button in the Filter Sets page The Add Filter Set page appears 188 Working with IP Filters and Filter Sets Add Filter Set Filter Set Name Submit Enter new name for the filter set for example Filter Set 1 To save the filter set click the Submit button The saved filter set is empty contains no filters but you can return to it later to add filters see Adding filters to a filter set er NOTE As you begin to build a filter set and as you add filters after your first entry the Alert icon EN will appear in the upper right corner
69. port number other than 80 such as 6080 After you have changed the port numbers the Netopia Gateway uses for its configuration traffic you must use those port numbers instead of the standard numbers when configur ing the Netopia Gateway For example if you move the router s Web service to port 6080 on a box with a system DNS name of superbox you would enter the URL http superbox 6080 in a Web browser to open the Netopia Gateway graphical user interface Similarly you would have to configure your telnet application to use the appropriate port when opening a configuration connection to your Netopia Gateway set servers web http 1 65534 Specifies the port number for HTTP web communication with the Netopia Gateway Because port numbers in the range 0 1024 are used by other protocols you should use numbers in the range 1025 65534 when assigning new port numbers to the Netopia Gate way web configuration interface A setting of 0 zero will turn the server off set servers telnet tcp 1 65534 Specifies the port number for telnet CLI communication with the Netopia Gateway Because port numbers in the range 0 1024 are used by other protocols you should use numbers in the range 1025 65534 when assigning new port numbers to the Netopia Gate way telnet configuration interface A setting of O zero will turn the server off Se NOTE You cannot specify a port setting of 0 zero for both the web and telnet ports
70. port statistics such as upstream and downstream connection rates and noise levels show ppp f stats Icp ipcp 3 Displays information about open PPP links You can display a subset of the PPP statistics by including an optional stats lcp oripcp argument for the show ppp command start ppp vccn Opens a PPP link on the specified virtual circuit 264 About CONFIG Commands About CONFIG Commands You reach the configuration mode of the command line interface by typing configure or any truncation of configure such as con or config at the CLI SHELL prompt CONFIG Mode Prompt When you are in CONFIG mode the CLI prompt consists of the name of the Netopia Gate way followed by your current node in the hierarchy and two right angle brackets gt gt For example when you enter CONFIG mode by typing config at the SHELL prompt the Netopia 3000 9437188 top gt gt prompt reminds you that you are at the top of the CONFIG hierarchy If you move to the ip node in the CONFIG hierarchy by typing ip at the CONFIG prompt the prompt changes to Netopia 3000 9437188 ip gt gt to identify your current location Some CLI commands are not available until certain conditions are met For example you must enable IP for an interface before you can enter IP settings for that interface Navigating the CONFIG Hierarchy e Moving from CONFIG to SHELL You can navigate from anywhere in the CONFIG hierarchy back to the SHELL
71. profile 0 3 ata auth id value Specifies an authorization ID for the specified profile 270 CONFIG Commands set ata profile 0 3 ata user name string Specifies the ISP supplied user name for the specified profile set ata profile 0 3 ata user display name string Specifies the a user display or screen name for the specified profile set ata profile 0 3 ata user password string Specifies the user password for the specified profile 271 DSL Commands ATM Settings You can use the CLI to set up each ATM virtual circuit set atm option fon off Enables the WAN interface of the Netopia Gateway to be configured using the Asynchro nous Transfer Mode ATM protocol set atm vcc n option on off Selects the virtual circuit for which further parameters are set Up to eight VCCs are sup ported the maximum number is dependent on your Netopia Operating System tier and the capabilities that your Service Provider offers set atm vcc n qos service class cbr ubr vbr Sets the Quality of Service class for the specified virtual circuit Constant cbr Unspeci fied ubr or Variable vbr Bit Rate e ubr No configuration is needed for UBR VCs Leave the default value O maximum line rate e cbr One parameter is required for CBR VCs Enter the Peak Cell Rate that applies to the VC This value should be between 1 and the line rate You set this value accor
72. reliable source In other words MD5 authentica tion provides an enhanced level of security that information that your PC receives does not originate from a malicious source posing as part of your network This field allows you to enter an MD5 encryption key of from 1 16 ASCII characters for authenticating RIP receipts Multicast Forward If you check this checkbox this interface acts as an IGMP proxy host and IGMP packets are transmitted and received on this interface on behalf of IGMP hosts on the LAN interface IGMP Null Source Address If you check this checkbox the source IP address of every IGMP packet transmitted from this interface is set to 0 0 0 0 This complies with the requirements of TR 101 and removes the need for a publicly advertised IP address on the WAN interface This checkbox is only available if Multicast Forward is checked LCP Settings Authentication Select Off PAP and or CHAP PAP only or CHAP only from the pull down menu The settings for port authentication on the Gateway must match the authenti cation expected by the remote system The username and passwords are available on the WAN IP Interfaces page MRU Specifies the Maximum Receive Unit for the PPP Interface Magic Number Enables or disables LCP magic number negotiation Protocol Compression Specifies whether you want the Gateway to compress the PPP Protocol field when it transmits datagrams over the PPP link LCP Echo Requests Specifi
73. residential service subscribers Expert Mode sections may also be of use to the support staffs of broadband service pro viders and advanced residential service subscribers See Expert Mode on page 41 15 Documentation Conventions General This manual uses the following conventions to present information Convention Typeface Description bold italic Menu commands monospaced bold italic sans serif Web GUI page links and button names terminal Computer display text bold terminal User entered text Italic Italic type indicates the complete titles of manuals Internal Web Interface Convention Graphics Description blue rectangle or line Denotes an excerpt from a Web page or cme the visual truncation of a Web page Denotes an area of emphasis on a Web EC page solid rounded rectangle with an arrow Command Line Interface Syntax conventions for the Netopia Gateway command line interface are as follows Convention Description straight brackets in cmd line Optional command arguments 16 Documentation Conventions curly brackets with values sep arated with vertical bars I bold terminal type face italic terminal type face Alternative values for an argument are pre sented in curly brackets with values separated with vertical bars I User entered text Variables for which you supply your own val ues 17 Organization This guide consis
74. select the desired VLAN from the list and click the Details button 127 The screen expands to display the VLAN settings VANS EEEERULLLA LEAE VLAN Enabled Name Type 1 Example 1 By Port 2 By Port By Port By Port By Port By Port By Port By Port Edit Clear Enable Disable Details Admin Restricted 802 1p Priority Bit VLAN 1 1 Enable Tag Priority Promote 802 1p Priority Bit Off Off On 0 uplink ipsec mgmt1 898888889 128 Configure Example 1 You want to configure a 3347NWG VGx Gateway with two SSIDs see Multiple SSIDs on page 65 for more information for two VLANs allowing both access to the Internet One SSID will be in the same VLAN as the Ethernet Switch so that those two networks can communicate The second VLAN will be for the other SSID The second VLAN will also be denied access to the 3347NWG VGx web interface and telnet interface This setup might be useful if you have a doctor s office or a coffee shop and you want to keep your custom ers separated from the rest of the network 1 In the VLANs page check the Enable checkbox select VLAN 1 in the VLANs list and click the Edit button VLAN Enabled Name Type j z By Port By Port By Port By Port By Port By Port By Port By Port Co Ov UD wn zu uuuuu Edit Clear Enable Disable Details 2 Check the Enable checkbox and in the VLAN Name box enter the name you would
75. set on the Netopia unit 25 MiAVo VDSL and Ethernet WAN models Quickstart The browser then displays the Quickstart page The basic Gateway configuration required to connect to your ISP is complete In most cases you should be ready to connect to the Internet If you have further instructions from your Service Provider including specific configuration parameters to be set use the Quickstart Advanced link if available or go to Configure gt WAN to set up your specific configuration Connect to the Internet Other Quickstart Options Advanced Configure System Name and Ethernet MAC Address 2 Click the Connect to the Internet button Welcome to your Netopia 3397GP Home Gateway Your device is currently configuring itself You will automatically be forwarded to the next step in the installation sequence when it completes Your DSL has been configured successfully Please hold Once a connection is established your browser is redirected to your service provider s home page or a registration page on the Internet Se NOTE For MiAVo Series 3397GP models skip the rest of this section Congratulations Your configuration is complete You can skip to Home Page Basic Mode on page 32 26 Configuring the Netopia Gateway PPPOE Quickstart For a PPPoE connection your browser will display a different series of web pages Welcome to your Netopia 3347W Home Gateway Your device is cur
76. source PC or local area network and your Internet access point whether it is a dedicated DSL outlet or a DSL or cable modem Different Netopia Gateway models are supplied for any of these connections Be sure to enable Dynamic Addressing on your PC Perform the following Microsoft Windows Step 1 Navigate to the TCP IP Properties Control Panel a Some Windows Start menu gt Settings gt TCP IP Properties 24 x versions follow a Control Panel gt Network i d Bindings Advanced NetBIOS path like this or Network and Dial up DNS Configuration 6 wins zm NI pe Connections gt Local Area i gt i An IP address can be automatically assigned to this computer Connection Prop erties If your network does not automatically assign IP addresses ask gt TCP IP your network administrator for an address and then type it in your_network_card or espana heo Internet Protocol TCP IP gt Properties C Specify an IP address 22 Setting up the Netopia Gateway b Some Windows versions follow a path like this Start menu gt Con trol Panel gt Net work and Internet Connections gt Net work Connections gt Local Area Connec tion gt Properties gt Internet Protocol TCP IP gt Proper ties Internet Protocol TCP IP Properties A General Altemate Configuration You can get IP settings assigned automatically if your network supports this capa
77. that the parameters are properly saved Se NOTE REMEMBER When you have re assigned the port address for the embedded Web server you can still access this facility Use the Gateway s WAN address plus the new port number In this example it would be lt WAN Gateway address gt lt new port number gt or in this case 210 219 41 20 8100 You can also use the LAN side address of the Gateway 192 168 1 x 8100 to access the web and 192 168 1 x 23 to access the telnet server Link IPMaps IPMaps supports one to one Network Address Translation NAT for IP addresses assigned to servers hosts or specific computers on the LAN side of the Netopia Gateway A single static or dynamic DHCP WAN IP address must be assigned to support other devices on the LAN These devices utilize Netopia s default NAT PAT capabilities IPMap Entry IPMap Entry Name Internal IP Address 192 168 1 0 External IP Address 0 0 0 0 Submit 96 Configure Configure the IPMaps Feature FAQs for the IPMaps Feature Before configuring an example of an IPMaps enabled network review these frequently asked questions What are IPMaps and how are they used The IPMaps feature allows multi ple static WAN IP addresses to be assigned to the Netopia Gateway Static WAN IP addresses are used to support specific services like a web server mail server or DNS server This is accomplished by mapping a separate static WAN IP ad
78. that the renegotiation must be complete within one day Both ends of the tunnel set parameters and typically they will be the same If they are not the same the rekey event will happen when the longest time period expires or when the largest amount of data has been sent 321 Stateful Inspection Stateful inspection options are accessed by the security state insp tag set security state insp ip ppp dsl vccn option off on set security state insp ethernet A I B option off on Sets the stateful inspection option off or on on the specified interface This option is dis abled by default Stateful inspection prevents unsolicited inbound access when NAT is dis abled set security state insp ip ppp dsl vccn default mapping off on set security state insp ethernet AIB default mapping off on Sets stateful inspection default mapping to router option off or on on the specified inter face set security state insp ip ppp dsl vccn tcp seq diff 0 65535 set security state insp ethernet A B tcp seq diff 0 65535 Sets the acceptable TCP sequence difference on the specified interface The TCP sequence number difference maximum allowed value is 65535 If the value of tcp seq diff is O it means that this check is disabled set security state insp ip ppp dsl vccn deny fragments off on set security state insp ethernet AIB deny fragments off on Sets whethe
79. the CLI See Queue Configuration on page 298 See also Differentiated Services on page 103 for more information 802 1p Priority Bit If you set this field to a value greater than O all packets received on this port with unmarked priority bits pbits will be re marked to this priority If the port 802 1p PBit is greater than O the VLAN 802 1p PBit setting is ignored er Note To make a set of VLANs non routable the uplink port must be included in at least one VLAN It must then be excluded from any VLANs that are intended to be non routable Click the Submit button When you are finished click the Alert icon in the upper right hand corner of the screen and in the resulting screen click the Save link If you want to create more VLANs click the Advanced link in the left hand toolbar and then the VLAN link in the resulting page and repeat the process 126 Configure You can Edit Clear Enable or Disable your VLAN entries by returning to the VLANs page and selecting the appropriate entry from the displayed list Enable M VLANF Enabled Name Type 1 Example 1 By Port By Port By Port By Port By Port By Port By Port By Port Edit Clear Enable Disable Details e When you are finished click the Alert icon in the upper right hand corner of the screen and in the resulting screen click the Save and Restart link To view the settings for each VLAN
80. the Sustained Cell Rate set atm vcc n vpi 0 255 Select the virtual path identifier vpi for VCC n Your Service Provider will indicate the required vpi number set atm vcc n vci 0 65535 Select the virtual channel identifier vci for VCC n Your Service Provider will indicate the required vci number set atm vccn encap ppp vcmux I ppp llc ether llc ip llc ppoe vcmux pppoe lic Select the encapsulation mode for VCC n The options are ppp vcmux PPP over ATM VC muxed ppp lic PPP over ATM LLC SNAP ether llc RFC 1483 bridged Ethernet LLC SNAP ip llc RFC 1483 routed IP LLC SNAP pppoe vcmux PPP over Ethernet VC muxed pppoe lic PPP over Ethernet LLC SNAP Your Service Provider will indicate the required encapsulation mode 273 set atm vccn pppoe sessions 1 8 Select the number of PPPoE sessions to be configured for VCC 1 up to a total of eight The total number of pppoe sessions and PPPoE VCCs configured must be less than or equal to eight Bridging Settings Bridging lets the Netopia Gateway use MAC Ethernet hardware addresses to forward non TCP IP traffic from one network to another When bridging is enabled the Netopia Gateway maintains a table of up to 512 MAC addresses Entries that are not used within 30 sec onds are dropped If the bridging table fills up the oldest table entries are dropped to make room for new entries Virtual circuits that use IP fra
81. the ssid in order to connect or even see the wireless access point When disabled a client may scan for available wireless access points and will see this one Enable this setting for greater security The default is on 336 CONFIG Commands set wireless mode both b and g b only g only Specifies the wireless operating mode for connecting wireless clients both b and g b only or g only and locks the Gateway in that mode cr NOTE If you choose to limit the operating mode to B or G only clients using the mode you excluded will not be able to connect set wireless multi ssid option on off Enables or disables the multi ssid feature which allows you to add additional network identifiers SSIDs or Network Names for your wireless network When enabled you can specify up to three additional SSIDs with separate privacy settings for each See below set wireless multi ssid second ssid third ssid fourth ssid name Specifies a descriptive name for each SSID when multi ssid option is set to on 337 set wireless multi ssid second ssid privacy off WEP WPA PSK WPA 802 1x set wireless multi ssid third ssid privacy off WEP I WPA PSK I WPA 802 1x set wireless multi ssid fourth ssid privacy off WEP WPA PSK WPA 802 1x Specifies the type of privacy enabled on multiple SSIDs when multi ssid option is set to on off no privacy WEP WEP encryption WPA PSK Wireless Prote
82. 0 0 0 Primary DNS available Netopia 3347NWG Home Page Software Release TES Remote Gateway Address 0 0 0 0 Secondary DNS 0 0 0 0 ISP Username joesurfer happyinternet com Ethernet Status Up Wed Apr 26 11 24 24 Date amp Time 2006 Home Page Basic Mode The Home Page displays the following information in the center section Serial Number Software Release Warranty Date Status of DSL Status of Connection Local WAN IP Address Remote Gateway Address Primary DNS Secondary DNS ISP Username Ethernet Status USB Status Date Time This is the unique serial number of your Gateway This is the version number of the current embedded software in your Gate way This is the date that your Gateway was installed and enabled DSL connection Internet is either Up or Down Waiting for DSL is displayed while the Gateway is training This should change to Up within two minutes Up is displayed when the ADSL line is synched and the PPPoE session is established Down indicates inability to establish a connection possible line failure This is the negotiated address of the Gateway s WAN interface This address is usually dynamically assigned This is the negotiated address of the remote router to which this Gateway is connected These are the negotiated DNS addresses This is your PPPoE username as assigned by your service provider if so equipped Loc
83. 02 1p priority bits into the IP TOS header bit field for received IP packets on this port destined for this VLAN Write any IP TOS priority bits into the 802 1p priority bit field for tagged IP packets transmitted from this port for this VLAN All mappings between Ethernet 802 1p and IP TOS are made via diffserv dscp map settings You must save the changes exit out of configuration mode and restart the Gateway for the changes to take effect 346 CONFIG Commands Example e Navigate to the VLAN item Netopia 3000 9437188 top gt gt vlan Netopia 3000 9437188 vlan gt gt set vlan vlan node list Select name node to modify from list or enter new name to create vlanl vlan name vlanl has been added to the vlan list name vlanl type by port by port global by port admin restricted off off on off seg pbits 0 0 7 0 ports e At this point you have created a VLAN It is called vlan1 without any admin restrictions e Next add the port eth0 1 port to this VLAN ports eth0 1 option off off on on priority off off on on promote off off on on port pbits 0 0 7 1 eth0 2 option off off eth0 3 option eth0 4 option ssidl option vccl option off off off off off off off off on on on on on 347 e To make the VLAN vlan1 routable add the port uplink upli
84. 1 up 00 00 00 25 L3 Service Name ANY 00 00 00 25 L3 Host Uniq 00000001 00 00 00 25 L3 AC Name 62011050058192 SMS1800 00 00 00 25 L3 Service Name ANY 00 00 00 25 L3 lcp LCP Send Config Request 00 00 00 25 L3 MAGIC 0x2dee0000 00 00 00 25 L3 lcp LCP Recv Config Req 00 00 00 25 L3 MRU 1492 ACK AUTHTYPE c223 CHAP ACK MAGICNUMBER 00 00 00 25 L3 4403604 ACK 00 00 00 25 L3 lcp returning Configure Ack 00 00 00 25 L3 chap received challenge id 1 00 00 00 25 L3 chap received success id 1 00 00 00 25 L3 ipcp IPCP Config Request 00 00 00 25 L3 ADDR 0x0 DNS 0x0 DNS2 0x0 WINS 0x0 WINS2 0x0 00 00 00 25 L3 ipcp IPCP Recv Config Req 00 00 00 25 L3 ADDR 143 137 199 254 ACK 00 00 00 25 L3 ipcp returning Configure ACK 00 00 00 25 L3 ipcp IPCP Config Request 00 00 00 25 L3 ADDR 0x0 DNS 0x0 DNS2 0x0 00 00 00 25 L3 ipcp IPCP Config Request 00 00 00 25 L3 ADDR 0x8f 89c702 DNS 0x8 89320a DNS2 0x8 898909 00 00 00 25 L3 ipcp negotiated remote IP address 143 137 199 254 00 00 00 25 L3 ipcp negotiated IP address 143 137 199 2 00 00 00 25 L3 ipcp negotiated TCP hdr compression off 00 00 00 27 L3 NTP Update system date amp time 7 16 03 01 55 31 PM L4 TS admin logging in on serial port 0 7 16 03 01 55 33 PM L4 TS Admin completed login Full Read Write access 7 16 03 01 55 33 PM L4 TS Admin completed login Full Read Write access 240 Link Diagnostics The diagnostics sect
85. 2 3 by port number 21 80 23 by protocol or by some other naming scheme set pinhole name name protocol select tcp udp Specifies the type of protocol being redirected set pinhole name name external port start 0 49151 Specifies the first port number in the range being translated 306 CONFIG Commands set pinhole name name external port end 0 49151 Specifies the last port number in the range being translated set pinhole name name internal ip internal ip Specifies the IP address of the internal host to which traffic of the specified type should be transferred set pinhole name name internal port O 65535 Specifies the port number your Netopia Gateway should use when forwarding traffic of the specified type Under most circumstances you would use the same number for the exter nal and internal port PPPOE PPPOA Settings You can use the following commands to configure basic settings port authentication set tings and peer authentication settings for PPP interfaces on your Netopia Gateway Configuring Basic PPP Settings Se NOTE For the DSL platform you must identify the virtual PPP interface vcen a num ber from 1 to 8 set ppp module vccn option on off Enables or disables PPP on the Netopia Gateway set ppp module vccn auto connect on off Supports manual mode required for some vendors The default on is not normally changed If auto connect
86. 23 53 67 68 80 137 138 161 500 520 Protocol TCP UDP UDP UDP TCP UDP UDP UDP UDP UDP Description telnet DNS Bootps Bootpc HTTP Netbios ns Netbios dgm SNMP ISAKMP Router LAN Private Interface Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes WAN Public Interface No No No No No No No No No No 169 Firewall Tutorial General firewall terms re Note Breakwater Basic Firewall see BreakWater Basic Firewall on page 149 does not make use of the packet filter support and can be used in addition to filtersets Filter rule A filter set is comprised of individual filter rules Filter set A grouping of individual filter rules Firewall A component or set of components that restrict access between a protected net work and the Internet or between two networks Host A workstation on the network Packet Unit of communication on the Internet Packet filter Packet filters allow or deny packets based on source or destination IP addresses TCP or UDP ports Port A number that defines a particular type of service Basic IP packet components All IP packets contain the same basic header information as follows Source IP Address 163 176 132 18 Destination IP Address 163 176 4 27 Source Port 2541 Destination Port 80 170 Firewall Tutorial Protocol TCP DATA User Data This header information is what the packet filter uses to make filter
87. 29 IET gt E USB port E Em phone jack MA il m d E Be 5 a 7 j Netopia Pocket Gateway RJ 11 phone cable The Wizard displays a success message when the settings are configured 5 The Netopia Installation Wizard will then launch your web browser and display the Welcome page where you configure your Netopia Pocket Gateway 30 Netopia Gateway Status Indicator Lights Netopia Gateway Status Indicator Lights Colored LEDs on your Netopia Gateway indicate the status of various port activity Different Gateway models have different ports for your connections and different indicator LEDs The Quickstart Guide accompanying your Netopia Gateway describes the behavior of the various indicator LEDs Example status indicator lights Status Indicator Lights LEDs 31 Home Page Basic Mode After you have performed the basic Quickstart configuration any time you log in to your Netopia Gateway you will access the Netopia Gateway Home Page You access the Home Page by typing hitp 192 168 1 254 in your Web browser s loca tion box The Basic Mode Home Page appears Netopia Basic Administration Page Home netopia Manage My Account Serial Number 9437188 Status Details Enable Remote Mamt Warranty Date m d yyyy 4 26 2006 Expert Mode Status of DSL Update Firmware No nameservers are Factory Reset Local WAN IP Address 0
88. 43 137 50 36 143 137 50 37 lt q ye 192 168 1 1 143 137 50 36 gt 192 168 1 2 192 168 1 2 143 137 50 35 9 192 168 1 3 43 137 50 35 Static IP Addresses or i DHCP PPP Served IP Address L for Netopia s default NAT PAT 192 168 1 n Capabilities LAN stations with WAN IP traffic forwarded by Netopia s IPMaps LAN stations with WAN IP traffic forwarded by Netopia s NAT function 192 168 1 3 IPMaps One to One Multiple Address Mapping 192 168 1 n 98 Configure Link Default Server This feature allows you to e Direct your Gateway to forward all externally initiated IP traffic TCP and UDP protocols only to a default host on the LAN e Enable it for certain situations Where you cannot anticipate what port number or packet protocol an in bound appli cation might use For example some network games select arbitrary port numbers when a connection is opened When you want all unsolicited traffic to go to a specific LAN host e Configure for IP Passthrough Configure a Default Server This feature allows you to direct unsolicited or non specific traffic to a designated LAN station With NAT On in the Gateway these packets normally would be discarded For instance this could be application traffic where you don t know in advance the port or protocol that will be used Some game applications fit this profile Use the following steps to setup a NAT default server to receive this informat
89. 4bit 128bit 256bit Specifies the WEP key length for the multiple SSIDs when second third or fourth ssid privacy is set to WEP 40bit encryption is equivalent to 64bit encryption The longer the key the stronger the encryption and the more difficult it is to break the encryption set wireless multi ssid second ssid wepkey hexadecimal digits set wireless multi ssid third ssid wepkey hexadecimal digits set wireless multi ssid fourth ssid wepkey hexadecimal digits Specifies a WEP key for the multiple SSIDs when second third or fourth ssid privacy is set to WEP For 40 64bit encryption you need 10 digits 26 digits for 128bit and 58 digits for 256bit WEP Valid hexadecimal characters are O 9 a f set wireless no bridging off on When set to on this will block wireless clients from communicating with other wireless cli ents on the LAN side of the Gateway set wireless tx power full medium fair low minimal Sets the wireless transmit power scaling down the router s wireless transmit coverage by lowering its radio power output Default is full power Transmit power settings are useful in large venues with multiple wireless routers where you want to reuse channels Since there are only three non overlapping channels in the 802 11 spectrum it helps to size the Gate way s cell to match the location This allows you to install a router to cover a small hole without conflicting with other route
90. 998 Edition v 1 0 Microsoft Golf 1999 Edition Microsoft Golf 2001 Edition Midtown Madness v 1 0 Monster Truck Madness v 1 0 Monster Truck Madness 2 v 2 0 142 Configure Motocross Madness 2 v 2 0 Motocross Madness v 1 0 MSN Game Zone MSN Game Zone DX7 an 8 Need for Speed 3 Hot Pursuit Need for Speed Porsche Play Net2Phone NNTP Operation FlashPoint Outlaws pcAnywhere incoming POP 3 PPTP Quake Il Quake III Rainbow Six RealAudio Return to Castle Wolfenstein Roger Wilco Rogue Spear ShoutCast Server SMTP SNMP SSH server StarCraft Starfleet Command StarLancer v 1 0 Telnet TFTP Tiberian Sun Command and Conquer Timbuktu Total Annihilation Unreal Tournament Server Urban Assault v 1 0 Ultima Online VNC Virtual Network Comput ing Westwood Online Command Win2000 Terminal Server XBox Live Games and Conquer Yahoo Messenger Chat Yahoo Messenger Phone ZNES Rename a User PC Ifa PC on your LAN has no assigned host name you can assign one by clicking the Rename a User PC link 143 Rename an Existing User PC Select a User PC to rename 192 168 1 1 Enter New Name Update To rename a server select the server from the pull down menu Then type a new name in the text box below the pull down menu Click the Update button to save the new name Se NOTE The new name given to a se
91. Always On diee bsec Aoc N both bridging and routing check dedo mat ar Enable Bridging on Port Always On the Enable Concurrent Bridging um Submit Routing checkbox When this mode is enabled the Gate way will appear to be a router but also bridge traffic from the LAN if it has a valid LAN side address Check the Enable System Bridge checkbox The window shrinks b Click Submit Enable System Bridge M At this point you should be ready to do the final save on the configuration changes you have made Restart Help The yellow Alert symbol will appear beneath the Help button on the right hand end of the menu bar your changes have been validated If you are satisfied with the changes you have made click Save and Restart in the Save Database box to Apply changes and restart Gateway 119 Netopia Save Changes Page Home Configure Troubleshoot Security Install Restart Help Home Configure Save Changes netopia Changes have been made to the Gateway database You must save the changes and Quickstart restart the Gateway in order for the changes to take effect LAN WAN Save Database Advanced Save Apply changes made to the database Save and Restart Apply changes and restart Gateway Review Review the contents of the database Validate Validate edited database Revert Database Revert Restore to settings before edits Validation passed You have now co
92. DIUS Server Set up RADIUS server options SNMP Set up SNMP community trap and system group options IGMP Set up IGMP options UPnP Enable or disable Universal Plug n Play LAN Management TR 064 Enable or disable DSL Forum LAN Side DSL CPE Configuration services Ethernet Bridge Setup ethernet MAC bridge VLAN Setup VLAN Configuration Miscellaneous System Configure System parameters Syslog Parameters Set up Syslog Internal Servers Configure internal web and telnet ports Software Hosting Set up Software Hosting Ethernet MAC Override Override or spoof the WAN ethernet address Clear Options Restore the Gateway to its factory configuration Time Zone Time Zone settings 87 Link IP Static Routes A static route identifies a manually configured pathway to a remote network Unlike dynamic routes which are acquired and confirmed periodically from other routers static routes do not time out Consequently static routes are useful when working with PPP since an intermittent PPP link may make maintenance of dynamic routes problematic When you click the Static Routes link the IP Static Routes page appears To create a new static IP route ent press the Add button IP Static Routes No static IP route entries have been defined Add You can configure as many as 32 static IP routes for the Gateway To add a static route click the Add button The IP Static Route Entry page appears IP Static Route Entry Destination Ne
93. Function Summary Matrix i Flashin Solid Green 9 Solid Red Green Power No power Power on N A System failure A No signal USB port con Activity on the N A USB Active nected to PC USB cable No signal DSL line synched Attempting to N A DSL Sync with the DSLAM train with DSLAM DSL Traffic No signal N A Activity on the N A DSL cable Ethernet No signal N A Activity on the N A Traffic Ethernet port Ethernet Link No signal Synched with Ether N A N A net card No signal Broadband device Activity on the Physical link estab Internet is connected WAN port lished but PPP or DHCP fails Wireless is Wireless is Activity on the N A Wireless bled enabled WLAN If a status indicator light does not look correct look for these possible problems LED State Possible problems 1 Make sure the power switch is in the ON position 2 Make sure the power adapter is plugged into the 2200 and 3300 series DSL Gateway properly 3 Try a known good wall outlet 4 Replace the power supply and or unit Power Unlit 225 2 DSL Unit Sync 4 5 Make sure the you are using the correct cable The DSL cable is the thin ner standard telephone cable Make sure the DSL cable is plugged into the correct wall jack Make sure the DSL cable is plugged into the DSL port on the 2200 and 3300 series DSL Gateway Make sure the DSL line has been activated at the central offic
94. Harbour VPN Use the following procedure to configure your SafeHarbour tunnel 1 Obtain your configuration information from your network administrator The tables Parameter Descriptions on page 160 describe the various parameters that may be required for your tunnel Not all of them need to be changed from the defaults for every VPN tunnel Consult with your network administrator 2 Complete the Parameter Setup worksheet IPSec Tunnel Details Parame ter Setup Worksheet on page 157 The worksheet provides spaces for you to enter your own specific values You can print the page for easy reference IPSec tunnel configuration requires precise parameter setup between VPN devices The Setup Worksheet page 157 facilitates setup and assures that the associated variables are identical 156 Security Table 1 IPSec Tunnel Details Parameter Setup Worksheet Parameter Netopia Gateway Peer Gateway peer ternal Nemo J oo peer Internal Nemas gt N NATEmable omor J Od N tion Method Main Aggressive IP Address Subnet Hostname ASCII Remote ID Address Value Remote ID Mas Pre Shared Key Type ld O E CR IP Address Subnet Hostname ASCII HEX ASCII Pre Shared Key DH Group 1 2 5 PFS Enable Off On SA Encrypt Type DES 3DES SA Hash Type MD5 SHA1 Invalid SPI Recovery Off On Soft MBytes 1 1000000 Soft Seconds 60 1000000 Hard MByt
95. ION 05 21 Setting up the Netopia Gateway lesse 22 Microsoft Windows 0000 cece eee eee 22 Macintosh MacOS 8 or higher or Mac OS X 23 Configuring the Netopia Gateway liliis 25 MiAVo VDSL and Ethernet WAN models Quickstart 26 PPPoE Quickstart o ooooccoooccocooo elle 27 Set up the Netopia Pocket Gateway esses 29 Netopia Gateway Status Indicator Lights 31 Table of Contents Home Page Basic Mode ccoocccccccc 32 Manage My AcCCO0UMt o occccccc 34 Status Details sss Rus ke aa A E 35 Enable Remote Management 0 0 eee eee eens 36 Expert Modei es ires n ec jo on ae oa RE Me ae 37 Update Firmware coi iaa dt Ra edge ew hehe ae 38 Factory Reset eri rats rra ema de pee Mee eee ae A 39 CHAPTER SAC VOCE vb bbs eth V Ra dere e noia A 41 Accessing the Expert Web Interface 41 Open the Web Connection 0 0 ccc eee 41 Home Page Expert Mode 0 0 cee eee 43 Home Page Information 0 0 0 0 cece eee 43 TOoOlDaE ug seb eka d a RR RACES Seas 45 Navigating the Web Interface 2 eee ooo 45 Breadcrumb Trail baie REG da 45 FROSION prinsesas pe ach cuneate eee es an aa 46 Alert Symbol 2 2 5 43 jhe gi id bee hee ie go EE aw 47 Help it eee ceeded A e cea 48 Configure kee lis a eri r9 E 49 Quickstart secre e TERR ETE Rep Te En
96. IP address are private Ping an internet site by IP address PC s subnet mask may be incorrect site is down Ping an internet site by name DNS is not properly configured on the PC configured DNS servers are down site is down 3 To use the TraceRoute capability type a destination address domain name or IP address in the text box and click the TraceRoute button 244 Example Show the path to the grosso com site traceroute Traceroute 141 4 2 2 2 2 2 a2 z2 1 2 3 4 5 6 7 8 9 LO 11 12 13 14 15 16 17 18 9 0 MI 143 143 143 141 30 I37 137 37 154 154 4 92 www grosso com to 192 150 14 120 from address 143 137 199 8 timer gran hops max 56 byte packets 199 254 100 ms 100 ms 0 ms 50 254 100 ms 0 ms O ms 137 254 100 ms 0 ms 100 ms 96 161 0 ms 0 ms 100 ms 8 13 0 ms 100 ms 0 ms 97 0 ms 100 ms 0 ms 4 4 225 100 ms 0 ms 100 ms 4 7 121 0 ms O ms 100 ms 4 7 113 0 ms 100 ms 0 ms 4 6 50 100 ms 0 ms 100 ms 4 10 86 0 ms 100 ms 100 ms 4 6 234 0 ms 100 ms O ms 192 205 32 153 100 ms 0 ms 100 ms 2 123 1 122 100 ms 0 ms 100 ms 122 2 173 100 ms 100 ms 100 ms 122 2 153 100 ms 100 ms 100 ms 122 5 149 100 ms 200 ms 100 ms 123 12 189 100 ms 100 ms 200 ms 12 124 32 34 100 ms 100 ms 200 ms 192 150 14 120 100 ms 100 ms 100 ms Result It took 20 hops to get to the grosso com web site 245 246 CHAPTER 6 Command Line Inte
97. It should be a unique number greater than 255 SSL Secure Sockets Layer A protocol developed by Netscape for transmit ting private documents via the Internet SSL uses a cryptographic system that uses two keys to encrypt data a public key known to everyone and a private or secret key known only to the recipient of the message STATEFUL The Netopia Gateway monitors and maintains the state of any network transaction In terms of network request and reply state consists of the source IP address destination IP address communication ports and data sequence The Netopia Gateway processes the stream of a network conversation rather than just individual packets It verifies that packets are sent from and received by the proper IP addresses along the proper commu nication ports in the correct order and that no imposter packets interrupt the packet flow Packet filtering monitors only the ports involved while the Netopia Gateway analyzes the continuous conversation stream preventing session hijacking and denial of service attacks static route Route entered manually in a routing table subnet mask A 32 bit address mask that identifies which bits of an IP address represent network address information and which bits represent node identifier information 364 synchronous communication Method of data communication requiring the transmission of timing signals to keep peers synchronized in sending and receiving blocks of data UM q
98. N interface does not have a suitable subnet mask that is usable for example when using PPP or PPPoE the DHCP subnet configuration will default to a class C subnet mask Default Server Nat Default Mode IP Passthrough is DHCP Enable Submit 101 e f you want to manually assign the WAN address to a LAN PC do not check the DHCP Enable checkbox e f you check the DHCP Enable checkbox the screen expands Default Server Nat Default Mode IP Passthrough B DHCP Enable vi Host Hardware Address 00 00 00 00 00 00 Submit The Host Hardware Address field displays Here you enter the MAC address of the desig nated IP Passthrough computer e f this MAC address is not all zeroes then it will use DHCP to set the LAN host s address to the configured or acquired WAN IP address The MAC address must be six colon delimited or dash delimited sets of hex digits O FF e f you leave the MAC address as zeros then the first DHCP client will be assigned the WAN address Once configured the passthrough host s DHCP leases will be shortened to two minutes This allows for timely updates of the host s IP address which will be a private IP address before the WAN connection is established After the WAN connection is established and has an address the passthrough host can renew its DHCP address binding to acquire the WAN IP address A restriction Since both the Gateway and the pass
99. NOTE IGMP Querier version is relevant only if the router is configured for IGMP for warding If any IGMP v1 routers are present on the subnet the querier must use IGMP v1 The use of IGMP v1 must be administratively configured since there is no reliable way of dynamically determining whether IGMP v1 routers are present on a network IGMP forwarding is enabled per IP Profile and WAN Connection Profile e Last Member Query Interval the amount of time in tenths of a second that the IGMP gateway waits to receive a response to a Group Specific Query message The last mem ber query interval is also the amount of time in seconds between successive Group Specific Query messages The default last member query interval is 1 second 10 deci seconds e Last Member Query Count the number of Group Specific Query messages sent before the gateway assumes that there are no members of the host group being que ried on this interface The default last member query count is 2 e Fast Leave set to off by default fast leave enables a non standard expedited leave mechanism The querier keeps track of which client is requesting which channel by IP address When a leave message is received the querier can check its internal table to see if there are any more clients on this group If there are none it immediately sends an IGMP leave message to the upstream querier set igmp snooping off on Enables IGMP Snooping set igmp robustness value
100. Netopia Software User Guide Version 7 7 netopia ROADBAND WITHOUT BOUNDARIESO ane 2200 and 3300 Series Gateways August 2006 Copyright Copyright O 2006 Netopia Inc Netopia the Netopia logo Broadband Without Boundaries and 3 D Reach are registered trademarks belonging to Netopia Inc regis tered U S Patent and Trademark Office All other trademarks are the property of their respective owners All rights reserved Netopia Inc Part Number 6161235 00 01 Table of Contents Table of Contents Copyright s4aloscyenndelno dha aa rr 2 CHAPTER JNVOOUCHONM 2244 ddr dod ORE 4446400060502 13 Whats New in 7 7 oe eee 13 About Netopia Documentation 0 0 cee 15 Intended Audience eee eee 15 Documentation Conventions 0000 2000 16 General ged weirder aa Deed SER 16 Internal Web Interface liliis 16 Command Line Interface 000 0c eee eee 16 Organization ae exes Sear Send eee nee bog eines Seed Saeed 18 A Word About Example Screens 1 ee 18 CHAPTER 2 Basic Mode Setup ccce 19 Important Safety Instructions 0 0 c eee eee 20 POWER SUPPLY INSTALLATION 2 0 02000220 00 e 20 TELECOMMUNICATION INSTALLATION 2 2005 20 PRODUCT VENTILATION sssssse sse 20 Wichtige Sicherheitshinweise 00 0c eee eee 21 NETZTEILINSTALLIEREN 0 0 0 0 ccc ee eee 21 INSTALLATION DER TELEKOMMUNIKAT
101. Netopia Gateway populates this ARP table dynamically by retrieving IP address MAC address pairs only when it needs them Option ally you can define static ARP entries to map IP addresses to their corresponding Ethernet MAC addresses Unlike dynamic ARP table entries static ARP table entries do not time out You can configure as many as 16 static ARP table entries for a Netopia Gateway Use the following commands to add static ARP entries to the Netopia Gateway static ARP table set ip static arp ip address ip address Specifies the IP address for the static ARP entry Enter an IP address in the ip address argument in dotted decimal format The ip address argument cannot be 0 0 0 0 set ip static arp ip address ip address hardware address MAC address Specifies the Ethernet hardware address for the static ARP entry Enter an Ethernet hard ware address in the MAC address argument in nn nn nn nn nn nn hexadecimal for mat IGMP Forwarding set ip igmp forwarding off on Turns IP IGMP forwarding off or on The default is off IPsec Passthrough set ip ipsec passthrough off on Turns IPsec client passthrough off or on The default is on 293 IP Prioritization set ip prioritize off on Allows you to support traffic that has the TOS bit set This defaults to off Differentiated Services DiffServ set diffserv option off on Turns the DiffServ option off default or on on enables the servic
102. O Low High Priority Ratio 1 100 92 f Submit Custom flows will take effect after you Enable Differentiated Services Save and Restart To create a new Custom Flow entry press the Add button No Custom Flow entries have been defined f Add gt 103 e To enable Differentiated Services check the Enable checkbox e Not displayed on VDSL and Bonded ADSL models Enter a value from 60 to 100 per cent in the Low High Priority Ratio field The default is 92 Differentiated Services uses the low to high priority queue ratio to regulate traffic flow For example to provide the least possible latency and highest possible throughput for high priority traffic you could set the ratio to 100 This would cause the gateway to forward low priority data only after the high priority queue is completely empty In prac tice you should set it to something less than 100 since the low priority traffic might have to wait too long to be passed and consequently be subject to time outs Click the Submit button You can then define Custom Flows If your applications do not provide Quality of Service QoS control Custom Flows allows you to define streams for some protocols port ranges and between specific end point addresses e To define a custom flow click the Add button The Custom Flow Entry screen appears Custom Flow Entry Name Enter a name in this field to Name Custom Flow 1 label the flow Protocol TCP Protocol
103. OA Point to Point Protocol over Ethernet ATM 378 Instant On PPP ooo daras 378 Simplified Local Area Network Setup 379 DHCP Dynamic Host Configuration Protocol Server 379 DNS PIOxy aede terea xe ung ego qu E RO eR Seas 379 Management ssseeeee n 380 Embedded Web Server oooooocooocoo eee 380 Diagnostics coles eer i a n RP be aa rk Rund 380 SeGurlly crear a ERR Re eae ek 381 Remote Access Control ooocoocooocoooo ee 381 Password Protection liiis 381 Network Address Translation NAT o o o ooo o 381 Netopia Advanced Features for NAT 2 0 383 Internal ServerS oooccccocccc eee 383 Pinholes stud tad icr et 4 ed a 383 Default Server oooooocccococo 384 Combination NAT Bypass Configurati0N 384 IP Passthrough oooocoocooo eee 385 VPN IPSec Pass Through 00 0 ee eee eee eee 385 VPN IPSec Tunnel Termination 5 386 Stateful Inspection Firewall ooo ooooooooo 386 SSL Certificate Support liliis eee 386 VLEANS a a i e ed dati RP ac Rueda Ro x 386 Wide wea paces A ead ee ee es 389 12 What s New in 7 7 CHAPTER 1 Introduction What s New in 7 7 New in Netopia Firmware Version 7 7 are the following features Internet Group Management Protocol IGMP Version 3 support See IGMP Internet Group Management Protocol on page 112
104. On set ip ip ppp vccn auto sensing on off Enables or disables PPPoE DHCP autosensing on the specified interface If you are using PPPoE setting this to on enables automatic sensing of your WAN connection type PPPoE or DHCP If enabled the Gateway attempts to connect using PPPoE first If the Gateway fails to connect after a maximum of 60 seconds it switches to DHCP if PPPoE is not avail able As soon as it can connect via DHCP the Gateway chooses and sets DHCP as its default set ip ip ppp vccn rip send off v1 v2 I v1 compat v2 MD5 Specifies whether the Netopia Gateway unit should use Routing Information Protocol RIP broadcasts to advertise its routing tables to routers on the other side of the PPP link An extension of the original Routing Information Protocol RIP 1 RIP Version 2 RIP 2 expands the amount of useful information in the packets While RIP 1 and RIP 2 share the same basic algorithms RIP 2 supports several new features For example inclusion of subnet masks in RIP packets and implementation of multicasting instead of broadcasting This last feature reduces the load on hosts which do not support routing protocols RIP 2 with MD5 authentication is an extension of RIP 2 that increases security by requiring an authentication key when routes are advertised This command is only available when address mapping for the specified virtual circuit is turned off If you specify v2 MD5 you must also spec
105. P zx oo ea Factory Reset Switch Push to clear all settings A KU IO Ns H DSL 3 ETHERNET 2 T POWER CAN 2247NWG 3347W 3357W i Factory Reset Switch LI Gea 8 colt Push to clear all settings a 2240N 775 NE Factory Reset Switch m Og CO 1 Push to clear all settings l a A v J Factory Reset Switch Push to clear all settings 3341 3351 Y g 2241N LI d OB El Factory Reset Switch 2246N Push to clear all settings 7 KAA S 3346 3356 ELE dud E IF MELIA 2 9 co Factory Reset Switch E 7 Push to clear all settings Factory Reset Switch Push to clear all settings 2 Carefully insert the point of a pen or an unwound paperclip into the open ing If you press the factory default button for less than 1 2 a second the unit will continue to run as normal If you press the factory default button for 1 second when you release it the Gateway will perform a factory reset clear all settings and configurations and reboot Do not hold the button down too long 5 10 seconds This will destroy any saved default set tings as we
106. P 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 ICMP 4 Fwd Yes Sre IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Sre Port NC Dst Port 1023 5 Fwd Yes Sre IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 UDP Src Port NC Dst Port lt 1023 Output Rules No Output Filter Rules have been defined The table s columns correspond to each filter s attributes e The filter s priority in the set Filter number 1 with the highest priority is first in the table 183 e Fwd Shows whether the filter forwards Yes a packet or discards No it when there s a match e Src IP The packet source IP address to match e Src Mask The packet source subnet mask to match e Dst IP The packet destination IP address to match e Dst Mask The packet destination IP address to match e Protocol The protocol to match This can be entered as a number see the table below or as TCP or UDP if those protocols are used Protocol Number to use Full name N A 0 Ignores protocol type ICMP 1 Internet Control Message Protocol TCP 6 Transmission Control Protocol UDP 17 User Datagram Protocol e Src Port The source port to match This is the port on the sending host that originated the packet e Dst Port The destination port to match This is the port on the receiving host for which the packet is intended e NC Indicates No Compare whe
107. PP pppoel is f Submit Other WAN Options PPPoE Configure PPP over Ethernet settings cr NOTE Enabling pppoe with ipoe disables support for multiple PPPoE sessions ADSL Gateways ATM Circuits You can configure the ATM circuits and the number of Sessions The IP Interface s should be reconfigured after making changes here Available Encapsulation types Available Multiplexing types PPP over Ethernet PPPoE LLC SNAP PPP over ATM PPPoA VC muxed RFC 1483 Bridged Ethernet RFC 1483 Routed IP None 82 Configure ATM Circuits vcc VPI VCI Encapsulation Multiplexing PPPoE Sessions 1 0 0 PPP over Ethernet HJ LLC SNAP Hd 1 To turn off a VCC set its encapsulation to None To turn on another VCC Click Here f Submit To Other ATM Options ATM Traffic Shaping Configure ATM Traffic Shaping Options Your Netopia ADSL Gateway supports VPI VCI autodetection by default If VPI VCI auto detection is enabled the ATM Circuits page displays VPI VCI 0 If you configure a new ATM VPI VCI pair upon saving and restarting autodetection is disabled and only the new VPI VCI pair configuration will be enabled VPI VCI Autodetection consists of eight static VPI VCI pair configurations These are O 35 8 35 0 32 8 32 1 35 1 1 1 32 2 32 These eight VPI VCI pairs will be cre ated if the Gateway is configured for autodetection the Gateway does not establish a circuit using any of these pr
108. PPPoE on the Ethernet WAN interface set pppoe pppoe with ipoe on off Enables or disables the PPPoE with IPoE support on Ethernet WAN including VDSL plat forms when pppoe option is set to on When pppoe with ipoe is set to on an additional interface ethernet C becomes avail able cr NOTE Enabling pppoe with ipoe disables support for multiple PPPoE sessions Example set ip ethernet C option on set ip ethernet C address 0 0 0 0 set ip ethernet C broadcast 0 0 0 255 set ip ethernet C netmask 255 255 255 0 set ip ethernet C restrictions admin disabled set ip ethernet C addr mapping on set ip ethernet C mcast fwd on set ip ethernet C igmp null source addr off set ip ethernet C unnumbered off set ip ethernet C rip receive off set ip ethernet C proxy arp off set ip ip ppp enet B option on set ip ip ppp enet B address 0 0 0 0 set ip ip ppp enet B peer address 0 0 0 0 set ip ip ppp enet B restrictions admin disabled set ip ip ppp enet B addr mapping on set ip ip ppp enet B igmp null source addr off 311 set ip ip ppp enet B mcast fwd on set ip ip ppp enet B unnumbered off set ip ip ppp enet B rip receive off ADSL platforms You must configure two VCCs with the same VPI VCI to enable concurrent PPPoE and IPoE support and you will need to configure the individual settings for each interface for proper operation set atm vcc n encap pppoe llc Specifies that the VCC will allow a second
109. To add an IP subnet select one of the rows and click the Edit button IP Subnet Entry Enabled Submit Check the Enabled checkbox and click the Submit button S3 The screen expands to allow you to enter subnet information IP Subnet Entry Enabled v IP Address 0 0 0 0 Netmask 0 0 0 0 DHCP Start Address 0 0 0 0 DHCP End Address 0 0 0 0 Submit If DHCP Server see below is not enabled the DHCP Start Address and DHCP End Address fields do not appear e Enter the Gateway s IP address on the subnet in the IP Address field and the subnet mask for the subnet in the Netmask field e Enter the DHCP Start Address and End Address of the subnet range in their respec tive fields Ranges cannot overlap and there may be only one range per subnet e Click the Submit button e When you are finished adding subnets click the Alert icon at the upper right and in the resulting page click the Save and Restart link To delete a configured subnet set both the IP address and subnet mask values to 0 0 0 0 either explicitly or by clearing each field and clicking the Submit button to commit the change cr NOTE All additional DHCP ranges use the global lease period value See page 55 54 Configure DHCP Server Your Gateway can provide network configuration information to computers on your LAN using the Dynamic Host Configuration Protocol DHCP If you already h
110. Tunnel Termination This Netopia service supports termination of VPN IPsec tunnels at the Gateway This per mits tunnelling from the Gateway without the use of third party VPN client software on your client PCs Stateful Inspection Firewall Stateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled You can configure UDP and TCP no activity periods that will also apply to NAT time outs if stateful inspection is enabled on the interface Technical details are discussed in Expert Mode on page 41 SSL Certificate Support On selected models you can also install a Secure Sockets Layer SSL V3 0 certificate from a trusted Certification Authority CA for authentication purposes If this feature is available on your Gateway an additional link will appear in the Install page Netopia Firmware Version 7 7 uses SSL certificates for TR 069 support See Install Certificate on page 213 VLANs Netopia s VGx technology allows a single Netopia VGx enabled broadband gateway to act as separate virtual gateways treating each individual service as a single service chan nel The VGx enabled gateway applies specific policies routing and prioritization parame ters to each service channel ensuring delivery of that service to the appropriate peripheral 386 Security device with the requisite level of QoS and correct feature sets making it ideal for deliv ery of triple play
111. Universal Service Order Codes USOC for the equipment RJ11 c A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA A compliant telephone cord and modular plug is provided with this product It is designed to be connected to a compatible modular jack that is also compliant See installation instructions for details 375 d The REN is used to determine the number of devices that may be connected to a telephone line Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call In most but not all areas the sum of RENs should not exceed five 5 0 To be certain of the number of devices that may be connected to a line as determined by the total RENs contact the local telephone company For products approved after July 23 2002 the REN for this product is part of the product identifier that has the format US AAAEQ TXXXX The digits represented by are the REN without a decimal point e g 03 is a REN of 0 3 For earlier products the REN is separately shown on the label e If this equipment the Netopia 3300 or 2200 Series router causes harm to the telephone network the telephone company will notify you in advance that temporary discontinuance of service may be required But if advance notice isn t practical the telephone company will notify the custome
112. VCC with the same VPI VCI values as the first pppoe llc denotes this special case Example set atm option on set atm vcc 1 option on set atm vcc 1 vpi 0 set atm vcc 1 vci 35 set atm vcc 1 encap pppoe 11c set atm vcc 2 option on set atm vcc 2 vpi 0 set atm vcc 2 vci 35 set atm vcc 2 encap ether llc This will allow you to configure the second WAN interface set atm vcc 2 vpi 0 set atm vcc 2 vci 35 set atm vcc 2 encap ether llc set ip ip ppp vcc1 mcast fwd on off Enables or disables multi cast forwarding on the specified interface If set to on this inter face acts as an IGMP proxy host and IGMP packets are transmitted and received on this interface on behalf of IGMP hosts on the LAN interface 312 CONFIG Commands set ip ip ppp vcc1 igmp null source addr off on Enables or disables IGMP null source address if mcast fwd is set to on If enabled the source IP address of every IGMP packet transmitted from this interface is set to 0 0 0 0 This complies with the requirements of TR 101 and removes the need for a publicly adver tised IP address on the WAN interface 313 Ethernet Port Settings set ethernet ethernet A mode auto 100M full 100M full fixed 100M half fixed 10M full fixed 10M half fixed 100M half 10M full 10M half Allows mode setting for the ethernet port Only supported on units without a LAN switch or dual ethernet products 338x In the dual ethernet
113. a video cwmax value set wireless wmm client edca video txoplimit 0 9999 Sets values for client WMM video parameters 341 set wireless wmm client edca best effort aifs 1 255 set wireless wmm client edca best effort cwmin value y set wireless wmm client edca best effort cwmax value set wireless wmm client edca best effort txoplimit 0 9999 Sets values for client WMM best effort parameters set wireless wmm client edca background aifs 1 255 set wireless wmm client edca background cwmin value set wireless wmm client edca background cwmax value set wireless wmm client edca background txoplimit 0 9999 Sets values for client WMM background parameters 342 CONFIG Commands Wireless Privacy Settings set wireless network id privacy option off WEP I WPA PSK I WPA 802 1x Specifies the type of privacy enabled on the wireless LAN off no privacy WEP WEP encryption WPA PSK Wireless Protected Access Pre Shared Key WPA 802 1x Wireless Protected Access 802 1x authentication See Wireless on page 56 for a discussion of these options WPA provides Wireless Protected Access the most secure option for your wireless net work This mechanism provides the best data protection and access control PSK requires a Pre Shared Key 802 1x requires a RADIUS server for authentication WEP is Wired Equivalent Privacy a method of encrypting data between the wireles
114. adband device is connected Flashes green for Internet activity on the WAN port If the physical link comes up but PPP or DHCP fail the LED turns red 216 Status Indicator Lights Netopia Gateway 2246N status indicator lights No y Power Internet Ethernet 1 2 3 4 DSL LED Action Power Green when power is on Red if device malfunctions Solid green when connected Flash green when there is activity on Ethernet 1 2 3 4 mean DSL Solid green when Internet connection is established Solid green when Broadband device is connected Flashes green for Internet activity on the WAN port If the physical link comes up but PPP or DHCP fail the LED turns red 217 Netopia Gateway 2247NWG status indicator lights LED Action Power Green when power is on Red if device malfunctions Ethernet 1 2 3 4 Solid green when connected Flash green when there is activity on the LAN Flashes green when there is activity on the wireless LAN Off if driver Wireless fails to initialize or if wireless is disabled DSL Solid reen when Internet connection is established Solid green when Broadband device is connected Flashes green for Internet activity on the WAN port If the physical link comes up but PPP or DHCP fail the LED turns red 218 Status Indicator Lights Netopia Gateway 3340
115. age Log 00 00 00 00 KS Using configured options found in flash 00 00 00 00 BOOT Warm start v7 3r0 00 00 00 00 IP address server initialization complete 00 00 00 00 BR Using saved configuration options 00 00 00 00 BR Netopia SOC OS version 7 3 0 build r0 00 00 00 00 BR Netopia 3000 9495032 Netopia 3000 rev 1 PID 1205 00 00 00 00 BR last install status Firmware installed successfully 00 00 00 00 BR memory sizes 2048K Flash 8192K RAM 00 00 00 00 BR Starting kernel 00 00 00 00 AAL5 initializing service 00 00 00 00 ATM Waiting for PHY layer to come up 00 00 00 00 POE Initializing PPP over Ethernet service 00 00 00 00 POE Binding to Ethernet ether vccl 00 00 00 00 BRDG Configuring port 10 100BT LAN 00 00 00 00 BRDG Bridge not enabled for WAN 00 00 00 00 BRDG Bridging from one WAN port to another is disabled 00 00 00 00 BRDG Initialization complete 00 00 00 00 IP Routing between WAN ports is disabled 00 00 00 00 IP IPSec client pass through is enabled 00 00 00 00 IP Address mapping enabled on interface PPP over Ethernet vccl 00 00 00 00 IP Adding default gateway over PPP over Ethernet vccl 00 00 00 00 IP Initialization complete 00 00 00 00 IPSec initializing service 00 00 00 00 IPSec No feature key available service disabled 00 00 00 00 PPP PPP over Ethernet vccl binding to PPPOE 00 00 00 00 PPP PPP over Ethernet vccl Port listening for incoming PPP connection requests 00 00 00 24 L4 RFC1483
116. agic Number Protocol Compression LCP Echo Requests Max Failures Max Configures Max Terminates Restart Timer Local Address If this value is 0 0 0 0 the Gateway will acquire its IP address from your ISP Otherwise this address is assigned to the vir tual PPP interface Peer Address Address of the server on the Service Provider side of the ppp link This peer will attempt to negotiate the local IP address if IP Address 0 0 0 0 If the remote peer does not accept the IP address the link will not come up RIP Receive Mode Routing Infor mation Protocol RIP is needed if there are IP routers on other seg ments of your Ethernet network that the Netopia Gateway needs to recog nize Set to Off Netopia Firmware Version 7 7 will accept information from either RIP 1 or RIP 2 routers With Receive RIP Mode set to RIP 1 the Netopia Gateway will accept rout ing information provided by RIP pack ets from other routers that use the same subnet mask Set to RIP 2 Netopia Firmware Version 7 7 will accept routing information provided by RIP packets from other routers that use different subnet masks From the pull down menu choose Off RIP 1 RIP 2 RIP 1 compatibility or RIP 2 with MD5 76 Configure RIP Receive MD5 Key Only appears if RIP 2 with MD5 RIP Receive Mode is selected The purpose of MD5 authentication is to provide an additional level of confidence that a RIP packet received was generated by a
117. al Area Network Ethernet is either Up or Down If your Gateway is so equipped Local Area Network USB is either Up or Down This is the current UTC time blank if this is not available due to lack of a network connection The links in the left hand column on this page allow you to manage or configure several fea tures of your Gateway Each link is described in its own section 33 Link Manage My Account You can change your ISP account information for the Netopia Gateway You can also man age other aspects of your account on your service provider s account management Web site Click on the Manage My Account link The Manage My Account page appears If you want to change your account information please enter the new information here Click Submit to update your account username and or password and reconnect to the Internet ISP Account information Username New Password Confirm Password If you have a PPPoE account enter your username and then your new password Confirm your new password For security your actual passwords are not displayed on the screen as you type You must enter the new password twice to be sure you have typed it correctly Click the Submit button Manage My Account Click OK to visit your ISP account management site or Cancel to return to the previous screen If you have a non PPPoE account click the OK button You will be taken to your service provider s Web site
118. all devices on the network having ports that are members of this VLAN seg ment 123 VLAN ID If you select Global as the VLAN Type the VLAN ID field appears for you to enter a VID This must be a unique identifying number between 1 and 4094 A VID of zero 0 is permitted on the Ethernet WAN port only VLAN Entry 1 Enable v VLAN Name Example 1 Type Global HJ VLAN ID 1 4094 1 Admin Restricted 802 1p Priority Bit 0 Submit e Admin Restricted If you want to prevent administrative access to the Gateway from this VLAN check the checkbox e 802 1p Priority Bit If you set this from the pull down menu to a value greater than O all packets of this VLAN with unmarked priority bits pbits will be re marked to this prior ity Click the Submit button The VLAN Port Configuration screen appears Port Configuration for VLAN 1 Portname Enable Tag Priority Promote 802 1p Priority Bit eth0 1 eth0 2 eth0 3 eth0 4 ssid1 vcc1 vcc2 uplink o0000000 ipsec mgmt1 f Submit 124 Configure e Port interfaces available for this VLAN are listed in the left hand column e Displayed port interfaces vary depending on the kinds of physical ports on your Gate way for example Ethernet USB and or wireless e Also if you have multiple wireless SSIDs defined these may be displayed as well See Enable Multiple Wireless IDs on page 65 e For Netopia VGx technology models separ
119. all required and optional information You can then enter the configuration values appropriate for your site without having to enter complete CLI commands 267 When you are in step mode the command line interface prompts you to enter required and optional settings If a setting has a default value or a current setting the command line interface displays the default value for the command in parentheses If a command has a limited number of acceptable values those values are presented in brackets with each value separated by a vertical line For example the following CLl step command indicates that the default value is o f and that valid entries are limited to on and off option off on off on You can accept the default value for a field by pressing the Return key To use a different value enter it and press Return You can enter the CONFIG step mode by entering Set from the top node of the CONFIG hier archy You can enter step mode for a particular service by entering Sel service name In stepping set mode press Control X lt Return Enter gt to exit For example Netopia 3000 9437188 top gt gt set system System name Netopia 3000 9437188 Mycroft Diagnostic Level High medium Stepping mode ended Validating Your Configuration You can use the validate CONFIG command to make sure that your configuration set tings have been entered correctly If you use the validate command the Netopia Gate way verifies
120. anages the exchange of security keys in the IPSec protocol architecture SafeHarbour supports the standard Inter net Key Exchange IKE Table 3 IPSec Tunnel Details page parameters Field Name Peer Internal Network Peer Internal Netmask NAT enable Description The Name parameter refers to the name of the configured tunnel This is mainly used as an identifier for the administrator The Name parameter is an ASCII value and is limited to 31 characters The tunnel name does not need to match the peer gateway The Peer Internal IP Network is the private or Local Area Network LAN address of the remote gateway or VPN Server you are communicating with The Peer Internal IP Netmask is the subnet mask of the Peer Internal IP Network Turns NAT on or off for this tunnel 160 Security Table 3 IPSec Tunnel Details page parameters PAT Address Negotiation Method Local ID type Local ID Address Value Local ID Mask Remote ID Type Remote ID Address Value Remote ID Mask Pre Shared Key Type Pre Shared Key DH Group PFS Enable SA Encrypt Type If NAT is enabled this field appears You can specify a Port Address Trans lation PAT address or leave the default all zeroes if Xauth is enabled If you leave the default the address will be requested from the remote router and dynamically applied to the Gateway This parameter refers to the method used during the Phase key exchange
121. and 2 for maximum interoperability e WPA Version 1 Only for backward compatibility e WPA Version 2 Only for maximum security Bridging a Privacy WPA PSK Pre Shared Key WPA Version Allowed v WPA Version 1 and 2 WPA Version 1 only WPA Version 2 only Submit All clients must support the version s selected in order to successfully connect Configure Multiple SSIDs The Multiple Wireless SSIDs feature allows you to add additional network identifiers SSIDs or Network Names for your wireless network To enable Multiple Wireless SSIDs click the Multiple SSIDS link When the Multiple Wireless SSIDs screen appears check the Enable SSID checkbox for each SSID you want to enable Multiple Wireless SSIDs Enable SSID 2 O Enable SSID 3 Enable SSID 4 Submit The screen expands to allow you to name each additional Wireless ID and specify a Pri vacy mode for each one 65 Multiple Wireless SSIDs Enable SSID 2 a David s Game Room WPA PSK HJ WPA Version All j WPA Version 1 and 2 Enable SSID 3 Enable SSID 4 Privacy modes available from the pull down menu for the multiple SSIDs are WPA PSK WPA 802 1x or Off No Privacy WEP can also be selected on the additional SSIDs as long as it is not used on the primary SSID WEP can only be used on one SSID so any oth ers will not have WEP available These additional Wirele
122. and buffers broadband signals WMM WiFi MultiMedia WiFi Multimedia allows you to prioritize various types of data travelling over the wireless network Certain types of data that are sensitive to delays such as voice or video must be prioritized ahead of other less delay sensitive types such as email It currently implements wireless Quality of Service QoS by transmitting data depending on Diffserv priority settings WWW World Wide Web 366 mci Mesias XAuth Extended Authentication An extension to the Internet Key Exchange IKE protocol for IPSec tunnelling Requires SafeHarbour IPsec tunneling feature key 367 368 Description CHAPTER 8 Technical Specifications and Safety Information Description Dimensions Smart Modems 13 5 cm w x 13 5 cm d x 3 5 cm h 5 25 w x 5 25 d x 1 375 h Wireless Models 19 5 cm w x 17 0 cm d x 4 0 cm h 7 6 w x 6 75 d x 1 5 h 3342 3342N 3352 3352N 8 5 cm w x 4 5 cm d x 2 cm h 3 375 w x 1 75 d x 875 h 2200 Series Modems 1 06 2 69 cm H 4 36 11 07 cm W 5 71 14 50 cm L 2200 Series Wireless Models 1 2 3 0cm H 8 7 22 0 cm W 5 2 13 2cm L Communications interfaces The Netopia Gateways have an RJ 11 jack for DSL line connections or an RJ 45 jack for cable DSL modem connections and 1 or 4 port 10 100Base T Ethernet switch for your LAN connections Some models have a USB port that can be u
123. ank to use the current administrator password Click OK to enable administrator access or Cancel to return to the previous screen Temporary Admin Password Old Password New Password Confirm Password Password Timeout 20 minutes Since you ve already has entered an Admin password you can use that Admin password or enter a new password If you enter a new password it becomes the temporary Admin pass word After the time out period has expired the Admin password reverts to the original Admin password you entered Enter a temporary password for the person you want to authorize and confirm it by typing it again You can select a time out period for this password from 5 to 30 minutes from the pull down menu Be sure to tell the authorized person what the password is and for how long the time out is set Click the OK button 36 Home Page Basic Mode Link Expert Mode Most users will find that the basic Quickstart configuration is all that they ever need to use Some users however may want to do more advanced configuration The Netopia Gateway has many advanced features that can be accessed and configured through the Expert Mode pages Click the Expert Mode link to display the Expert Mode Confirmation page Expert Mode Confirmation You are now entering Expert Mode which is for advanced configuration management and troubleshooting If you change any parameters the unit may not operate properly C
124. any newsletters to a distribution list Since a router should not be used as a passive forwarding device Netopia Gateways use a protocol for forwarding multicasting Internet Group Management Protocol IGMP Netopia Gateways support IGMP Version 1 Version 2 or beginning with Netopia Firmware Version 7 7 Version 3 See the Advanced option in LAN on page 51 for more information IGMP Snooping is a feature of Ethernet layer 2 switches that listens in on the IGMP conversation between computers and multicast routers Through this process it builds a database of where the multicast routers reside by noting IGMP general queries used in the querier selection process and by listening to other router protocols From the host point of view the snooping function listens at a port level for an IGMP report The switch then processes the IGMP report and starts forwarding the relevant mul ticast stream onto the host s port When the switch receives an IGMP leave message it processes the leave message and if appropriate stops the multicast stream to that partic ular port Basically customer IGMP messages although processed by the switch are also sent to the multicast routers In order for IGMP snooping to function with IGMP Version 3 it must always track the full source filter state of each host on each group as was previously done with Version 2 only when Fast Leave support was enabled IGMP Version 3 supports IGMP So
125. are advertised If you specify v2 MD5 you must also specify a rip send key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper operation of MD5 support Depending on your network needs you can configure your Netopia Gateway to support RIP 1 RIP 2 or RIP 2MD5 set ip ethernet A rip receive off v1 v2 I vi compat v2 MD5 Specifies whether the Netopia Gateway should use Routing Information Protocol RIP broadcasts to update its routing tables with information received from other routers on your network If you specify v2 MD5 you must also specify a rip receive key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper oper ation of MD5 support Additional subnets See DHCP Settings on page 275 for subnet range configuration commands 288 CONFIG Commands set ip ethernet A subnet 2 8 option on I off Enables or disables additional LAN subnets Up to seven additional subnets may be config ured set ip ethernet A subnet n address ip address Specifies an IP address for the subnet n when subnet n option is on set ip ethernet A subnet n netmask netmask Specifies the subnet mask for the subnet n when subnet n option is on Default IP Gateway Settings set ip gateway option on off Specifies whether the Netopia Gateway should send packets to a default Gateway if it does not k
126. artbeat will go out every minute for 1440 minutes or one day before sleep ing e The sleep setting is part of sequence control This is the time to sleep before starting another heartbeat sequence in d h m s set system ntp option off on server address north america pool ntp org alt server address pool ntp org time zone 12 12 update period 60 1 65535 daylight savings off on Specifies the NTP server address time zone and how often the Gateway should check the time from the NTP server The NTP server address and alt server address can be entered as DNS names as well as IP addresses NTP time zone of O is GMT time options are 12 through 12 1 hour increments from GMT time update period specifies how often in minutes the Gateway should update the clock daylight savings specifies whether daylight savings time is in effect it defaults to off set system zerotouch option on off Enables or disables the Zero Touch option Zero Touch refers to automatic configuration of your Netopia Gateway The Netopia Gate way has default settings such that initial connection to the Internet will succeed If the zerotouch option is set to on HTTP requests to any destination IP address except the IP address es of the configured redirection URL s will access a redirection server DNS traf fic will not be blocked Other traffic from the LAN to all destinations will be dropped set system zerotouch redirec
127. assthrough feature The IP passthrough feature allows a sin gle PC on the LAN to have the Gateway s public address assigned to it It also provides PAT NAPT via the same public IP address for all other hosts on the private LAN subnet VPN IPSec Pass Through This Netopia service supports your independent VPN client software in a transparent man ner Netopia has implemented an Application Layer Gateway ALG to support multiple PCs running IP Security protocols This feature has three elements 1 On power up or reset the address mapping function NAT of the Gate ways WAN configuration is turned on by default 2 When you use your third party VPN application the Gateway recognizes the traffic from your client and your unit It allows the packets to pass through the NAT protection layer via the encrypted IPSec tunnel 3 The encrypted IPSec tunnel is established through the Gateway A typical VPN IPSec Tunnel pass through is diagrammed below Netopia Gateway 385 Se NOTE Typically no special configuration is necessary to use the IPSec pass through feature In the diagram VPN PC clients are shown behind the Netopia Gateway and the secure server is at Corporate Headquarters across the WAN You cannot have your secure server behind the Netopia Gateway When multiple PCs are starting IPSec sessions they must be started one at a time to allow the associations to be created and mapped VPN IPSec
128. ate Browse your computer to find the SSL certificate file or type in the full path and filename Next to install the file on your Gateway click the Install Certificate button After the install has completed restart your Gateway to enable the new SSL certificate f Browse Install Certificate 2 Browse to the location where you have saved your certificate and select the file or type the full path 3 Click the Install Certificate button 4 Restart your Gateway 214 CHAPTER 4 Basic Troubleshooting This section gives some simple suggestions for troubleshooting problems with your Gate way s initial configuration Before troubleshooting make sure you have read the Quickstart Guide plugged in all the necessary cables and set your PC s TCP IP controls to obtain an IP address automatically 215 Status Indicator Lights The first step in troubleshooting is to check the status indicator lights LEDs in the order outlined below Netopia Gateway 2240N 2244N status indicator lights Ethernet LED Action Power Green when power is on Red if device malfunctions Ethernet Solid green when connected Flash green when there is activity on the LAN USB Solid green when connected Flash green when there is activity on Model 2241N only the LAN Solid green when trained Blinking green when no line is attached or DSL when training Solid green when Bro
129. ate Ethernet switch ports are displayed and may be configured To enable any of them on this VLAN check the associated Enable checkbox es Typically you will choose a physical port such as an Ethernet port example eth0 1 or a wireless SSID example ssid1 and make the port routable by checking uplink When you enable an interface the Tag Priority and Promote checkboxes and an 802 1p Priority Bit pull down menu appear for that interface Port Configuration for VLAN 1 Enable Tag Priority Promote 802 1p Priority Bit ee s 0 ipsec mgmt1 Tag Packets transmitted from this port through this VLAN must be tagged with the VLAN VID Packets received through this port destined for this VLAN must be tagged with the VLAN VID by the source The Tag option is only available on Global type ports Priority Use any 802 1p priority bits in the VLAN header to prioritize packets within the Gateway s internal queues according to DiffServ priority mapping rules See Dif ferentiated Services on page 103 for more information 125 Promote Write any 802 1p priority bits into the IP TOS header bit field for received IP packets on this port destined for this VLAN Write any IP TOS priority bits into the 802 1p priority bit field for tagged IP packets transmitted from this port for this VLAN All mappings between Ethernet 802 1p and IP TOS are made according to a pre defined QoS mapping policy The pre defined mapping can now be set in
130. ave a DHCP server on your LAN you should turn this service off If you want the Gateway to provide this ser vice click the Server Mode pull down menu choose Server then configure the range of IP addresses that you would like the Gateway to hand out to your computers Server Mode Server 9 192 168 1 1 Starting IP Address Ending IP Address 192 168 1 253 Lease Period d h m s 00 01 00 00 submit DHCP Server You can also specify the length of time the computers can use the configuration informa tion DHCP calls this period the lease time Your Service Provider may for certain services want to provide configuration from its DHCP servers to the computers on your LANs In this case the Gateway will relay the DHCP requests from your computers to a DHCP server in the Service Provider s network Click the relay agent and enter the IP address of the Service Provider s DHCP server in the Server Address field This address is furnished by the Service Provider ce NOTE The Relay agent option only works when NAT is off and the Gateway is in router mode 55 Wireless supported models If your Gateway is a wireless model such as a 3347W you can enable or disable the wire less LAN WLAN by clicking the Wireless link Wireless functionality is enabled by default 802 11 Wireless Settings Enable Wireless M SSID Network ID 5440 4401 Privacy OFF No Privacy y
131. ay if you enter 0 0 0 0 for the ip address argument set ip ip ppp vccn peer address ip address Specifies the IP address of the peer on the other end of the PPP link If you specify an IP address other than 0 0 0 0 your Netopia Gateway will not negotiate the remote peer s IP address If the remote peer does not accept the address in the ip address argument as its IP address typically because it has been configured with another IP address the link will not come up The default value for the ip address argument is 0 0 0 0 which indicates that the vir tual PPP interface will accept the IP address returned by the remote peer If you enter 0 0 0 0 the peer system must be configured to supply this address set ip ip ppp vccn restriction admin disabled none Specifies restrictions on the types of traffic the Netopia Gateway accepts over the PPP vir tual circuit The admin disabled argument means that access to the device via telnet web and SNMP is disabled RIP and ICMP traffic is still accepted The none argument means that all traffic is accepted 290 CONFIG Commands set ip ip ppp vccn addr mapping on off Specifies whether you want the Netopia Gateway to use network address translation NAT when communicating with remote routers Address mapping lets you conceal details of your network from remote routers It also permits all LAN devices to share a single IP address By default address mapping is turned
132. bar at the top of the page containing the major navigation but tons These buttons are available from almost every page allowing you to move freely about the site Home Configure Troubleshoot Quickstart System Status LAN Network Tools WAN Diagnostics Advanced Security Install Restart Help Passwords Install Certificate Firewall Install Key IPSec Install Software Stateful Inspection Packet Filter Security Log Navigating the Web Interface Link Breadcrumb Trail The breadcrumb trail is built in the light brown area beneath the toolbar As you navigate down a path within the site the trail is built from left to right To return anywhere along the path from which you came click on one of the links Configure Troubleshoot Security Install Home Configure LAN 45 Restart Button Restart The Restart button on the toolbar allows you to restart the Gateway at any time You will be prompted to confirm the restart before any action is taken The Restart Confirmation mes sage explains the consequences of and reasons for restarting the Gateway Restart Gateway Restarting the Gateway is needed to enable Changes to your Gateway database configuration New feature keys Operating System Software Upgrades When you restart All users will be disconnected You will be returned to the Home page The Gateway will not respond to your web requests This inactivity may last for approxi
133. bility Otherwise you need to ask your network administrator for the appropriate IP settings ei Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses Macintosh MacOS 8 or higher or Mac OS X Step 1 Access the TCP IP or Network control panel a MacOS follows a path like this Apple Menu gt jM Control Pan els gt TCP IP Connect via TCP IP Router Test O use 802 3 Control Panel Setup Configure IP Address Subnet mask Router address Name server addr Using DHCP Server E lt will be supplied by server gt Select Hosts File Implicit Search Path Starting domain name Ll Ending domain name Additional Search domains 23 b Mac OS X follows Apple Menu gt System Preferences gt Network a path like this e uM i mao mJ E _ Show All Displays Sound Network Startup Disk Desktop Location R910 HJ Show Built in Ethernet HJ PPPoE AppleTalk Proxies Configure f Using DHCP Fd DNS Servers Optional IP Address Provided by DHCP Server Subnet Mask Router Search Domains Optional DHCP Client 1D Optional Example apple com Ethernet Address 00 0a 27 ae 71 a4 earthlink net a Click the lock to prevent further changes Revert Apply Now Then go to Step 2 Step 2 Sele
134. bility and network connectivity This command sends five Operations Administration and Maintenance OAM loopback calls to the speci fied vpi vci destination There is a five second total timeout interval Use the segment argument to ping a neighbor switch Use the end to end argument to ping a remote end node reset dhcp client release vcc id Releases the DHCP lease the Netopia Gateway is currently using to acquire the IP settings for the specified DSL port The vcc id identifier is an index letter in the range B l and does not directly map to the VCC in use Enter the reset dhcp client release command without the variable to see the letter assigned to each virtual circuit 263 reset dhcp client renew vcc id Releases the DHCP lease the Netopia Gateway is currently using to acquire the IP settings for the specified DSL port The vcc id identifier is an index letter in the range B l and does not directly map to the VCC in use Enter the reset dhcp client release without the variable to see the letter assigned to each virtual circuit reset dsl Resets any open DSL connection reset ppp vccn Resets the point to point connection over the specified virtual circuit This command only applies to virtual circuits that use PPP framing show atm all Displays ATM statistics for the Netopia Gateway The optional a11 argument displays a more detailed set of ATM statistics show dsl Displays DSL
135. bound traffic The WEP enabled client must have an identical key of the same length in the identical slot 1 4 as the Gateway in order to successfully receive and decrypt the traffic Similarly the client also has a default key that it uses to encrypt its transmissions In order for the Gateway to receive the client s data it must likewise have the identical key of the same length in the same slot For simplicity a Gateway and its clients need only enter share and use the first key 58 Configure H 802 11 Wireless Settings Enable Wireless M SSID Network ID 44140400 Privacy WEP Automatic i Select a key size and enter a passphrase below then click Submit Encryption Key Size 40 64 bit 10 characters Passphrase howdydoody Encryption Key abcdefabcd Default Key 1 Click the Submit button The Alert icon appears Click the Alert icon and then the Save and Restart link Advanced If you click the Advanced link the advanced 802 11 Wireless Settings page appears Enable Wireless v Wireless ID SSID 4414 0400 Operating Mode Normal 802 11b g E Default Channel 6 AutoChannel Setting OFF Use default i Enable Closed System Mode Block Wireless Bridging O Q Privacy WEP Automatic Enter a passphrase below and click Submit to make keys WEP key passphrase howdydoody Encryption Key Size 1 40 64 bit 10 characters n Encryption
136. c key algorithm used between two systems to determine and deliver secret keys used for encryption Groups 1 2 and 5 are supported Perfect Forward Secrecy PFS is used during SA renegotiation When PFS is selected a Diffie Hellman key exchange is required If enabled the PFS DH group follows the IKE phase 1 DH group SA Encryption Type refers to the symmetric encryption type This encryp tion algorithm will be used to encrypt each data packet SA Encryption Type values supported include DES and 3DES 161 Table 3 IPSec Tunnel Details page parameters SA Hash Type Invalid SPI Recovery Soft MBytes Soft Seconds Hard MBytes Hard Seconds IPSec MTU SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation Values supported include MD5 and SHA1 N A will display if NONE is chosen for Auth Protocol Enabling this allows the Gateway to re establish the tunnel if either the Netopia Gateway or the peer gateway is rebooted Setting the Soft MBytes parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Soft MByte value The value can be configured between 1 and 1 000 000 MB and refers to data traffic passed If this value is not achieved the Hard MBytes parameter is enforced This parameter does not need to match the peer gateway Setting the Soft Seconds parameter forces the renegotiation of the IPSec Security Associations SAs at the configured S
137. ca tion Dial In User Service RADIUS server In conjunction with Wireless User Authentication you can use a RADIUS server database to authenticate users seeking access to the wire less services as well as the authorized user list maintained locally within the Gateway If you click the RADIUS link the screen expands to allow you to enter your RADIUS server information Radius Servers RADIUS Server Addr Name RADIUS Server Secret Alt RADIUS Server Addr Name Alt RADIUS Server Secret Radius Server Port e RADIUS Server Addr Name The default RADIUS server name or IP address that you want to use RADIUS Server Secret The RADIUS secret key used by this server The shared secret should have the same characteristics as a normal password RADIUS Server Port The port on which the RADIUS server is listening typically the default 1812 Click the Submit button 71 You can also configure alternate RADIUS servers from the Advanced Network Configuration page by clicking the Advanced link The Advanced Network Configuration page appears Network Configuration IP Static Routes Build IP static route table IP Static ARP Build IP static ARP table Pinholes Set up pinholes through NAT IPMaps Setup NAT one to one IP address mappings Default Server Setup NAT default server options p geo e o UU Differentiated Services Setup Differentiated Service options DNS Setup DNS options DHCP Server Setup DHCP server and
138. can be any number between 1 and 20 308 CONFIG Commands set ppp module vccn configure max integer Specifies the maximum number of unacknowledged configuration requests that your Neto pia Gateway will send The integer argument can be any number between 1 and 20 set ppp module vccn terminate max integer Specifies the maximum number of unacknowledged termination requests that your Netopia Gateway will send before terminating the PPP link The integer argument can be any num ber between 1 and 10 set ppp module vccn restart timer integer Specifies the number of seconds the Netopia Gateway should wait before retransmitting a configuration or termination request The integer argument can be any number between 1 and 30 set ppp module vccn connection type instant on always on Specifies whether a PPP connection is maintained by the Netopia Gateway when it is unused for extended periods If you specify always on the Netopia Gateway never shuts down the PPP link If you specify instant on the Netopia Gateway shuts down the PPP link after the number of seconds specified in the time out setting below if no traffic is moving over the circuit set ppp module vccn time out integer If you specified a connection type of instant on specifies the number of seconds in the range 30 3600 with a default value of 300 the Netopia Gateway should wait for commu nication activity before terminating the PPP link
139. case ethernet B would be specified for the WAN port The default is auto Command Line Interface Preference Settings You can set command line interface preferences to customize your environment set preference verbose on off Specifies whether you want command help and prompting information displayed By default the command line interface verbose preference is turned off If you turn it on the command line interface displays help for a node when you navigate to that node set preference more ines Specifies how many lines of information you want the command line interface to display at one time The lines argument specifies the number of lines you want to see at one time The range is 1 65535 By default the command line interface shows you 22 lines of text before displaying the prompt More yIn If you enter 1000 for the lines argument the command line interface displays information as an uninterrupted stream which is useful for capturing information to a text file 314 CONFIG Commands Port Renumbering Settings If you use NAT pinholes to forward HTTP or telnet traffic through your Netopia Gateway to an internal host you must change the port numbers the Netopia Gateway uses for its own configuration traffic For example if you set up a NAT pinhole to forward network traffic on Port 80 HTTP to another host you would have to tell the Netopia Gateway to listen for configuration connection requests on a
140. cause an instant on link to connect if it is down or reset its idle timer if it is already up For example if you wanted ping traffic not to keep the link up you would create a filter which forwards a ping but with the Idle Reset checkbox unchecked Example You want packets with the TOS low Filter Input Rule Entry 1 latency bit to go through VC 2 via gateway Forward 127 0 0 3 the Netopia Gateway will use 127 0 0 x where x is the WAN port 1 instead Source IP 0 0 0 0 of your normal gateway sourca Mask 0 0 0 0 You would set up the filter as shown here Destination IP 0 0 0 0 Destination Mask 0 0 0 0 TOS ae TOS Mask del Protocol Idle Reset Farce Route Gateway IP 127 0 0 3 Add or Edit mare Filter Rules E NOTE Default Forwarding Filter If you create one or more filters that have a matching action of forward then action on a packet matching none of the filters is to block any traffic Therefore if the behavior you want is to force the routing of a certain type of packet and pass all others through the normal routing mechanism you must 198 Policy based Routing using Filtersets configure one filter to match the first type of packet and apply Force Routing A subsequent filter is required to match and forward all other packets Management IP traffic If the Force Routing filter is applied to source IP addresses it may inadvert ently block
141. ccess Hardware MAC Address M 00 Oa 27 ae f Submit 71 a3 Enter the MAC hardware address of the client PC you want to authorize for access to your wireless LAN The Allow Access checkbox is enabled by default Unchecking this check box specifically denies access from this MAC address Click the Submit button CE Note When MAC Authorization is enabled all wireless clients are blocked until their MAC addresses are added to the Authorized list Your entry will be added to a list of up to 32 authorized addresses as shown Wireless MAC Authentication Enable Wireless MAC Authentication Y Submit To add a new Wireless MAC Address press the Add button To edit or delete a Wireless MAC Address select the entry and press the Edit or Delete button Authorized Wireless MAC Addresses Wireless MAC Address 00 0a 27 ae 71 a3 Allowed add Edit Delete 70 Configure You can continue to Add Edit or Delete addresses to the list by clicking the respective buttons After your first entry the Alert icon PS will appear in the upper right corner of your screen When you are finished adding addresses to the list click the Alert icon and Save your changes and restart the Gateway Use RADIUS Server RADIUS servers allow external authentication of users by means of a remote authentica tion database The remote authentication database is maintained by a Remote Authenti
142. ce e g Windows standby reboot device disabled driver uninstalled etc 221 Netopia Gateway 3346 N 3356 N status indicator lights Power Solid green when the power is on Red if device malfunctions DSL Sync Blinks green with no line attached or training Solid green when trained with the DSL line LAN 1 2 3 4 Solid green when Ethernet link is established Blinks green when traffic is sent or received over the Ethernet 222 Status Indicator Lights Netopia Gateway 3347W 3347 N WG status indicator lights neropla a Power Green when power is applied Red if device malfunctions DSL SYNC Flashes green when training Solid green when trained Flashes green for DSL traffic LAN 1 2 3 4 Solid green when connected to each port on the LAN Flash green when there is activity on each port Wireless Link Flashes green when there is activity on the wireless LAN 223 Netopia Gateway MiAVo status indicator lights Front View Power ES NG P x dio ower i y J Green when power is on M Red if device malfunctions e E Ke E lt a RE i Ke DSL Flashes green when training Solid green when trained Ethernet 1 2 3 4 Solid green when connected Flash green when there is activity on the LAN Wireless Flashes green when there is activity on the wireless LAN 224 Status Indicator Lights LED
143. cessible Sweden Apparaten skall anslutas till jordat uttag n r den ansluts till ett n tverk Norway Apparatet m kun tilkoples jordet stikkontakt USB powered models For Use with Listed 1 T E Only TELECOMMUNICATION INSTALLATION When using your telephone equipment basic safety precautions should always be followed to reduce the risk of fire electric shock and injury to persons including the following Do not use this product near water for example near a bathtub wash bowl kitchen sink or laundry tub in a wet basement or near a swimming pool Avoid using a telephone other than a cordless type during an electrical storm There may be a remote risk of electrical shock from lightning Do not use the telephone to report a gas leak in the vicinity of the leak PRODUCT VENTILATION The Netopia Gateway is intended for use in a consumer s home Ambient temperatures around this product should not exceed 104 F 40 C It should not be used in locations exposed to outside heat radiation or trapping of its own heat The product should have at least one inch of clearance on all sides except the bottom when properly installed and should not be placed inside tightly enclosed spaces unless proper ventilation is provided SAVE THESE INSTRUCTIONS 20 Wichtige Sicherheitshinweise Wichtige Sicherheitshinweise NETZTEIL INSTALLIEREN Verbinden Sie das Kabel vom Netzteil mit dem Power Anschluss an dem Netopia Gateway St
144. cific PC highlight the name s in the box on the left side of the screen Click the Add button to select the soft ware that will be hosted To remove a game or software from the hosted list highlight the game or software you want to remove and click the Remove button 141 List of Supported Games and Software Age of Empires v 1 0 Age of Empires The Rise of Rome v 1 0 Age of Wonders Asheron s Call Baldur s Gate Battlefield Communicator Buddy Phone Calista IP Phone CART Precision Racing v 1 0 Citrix Metaframe ICA Client Close Combat for Windows 1 0 Close Combat A Bridge Too Far v 2 0 Close Combat Ill The Russian Front v 1 0 Combat Flight Sim WWII Europe Series v 1 0 Combat Flight Sim 2 WWII Pacific Thr v 1 0 Dark Reign Delta Force Client and Server Delta Force 2 Diablo Il Server Dialpad DNS Server Dune 2000 eDonkey 2000 eMule F 16 Mig 29 F 22 Lightning 3 Fighter Ace II FTP GNUtella H 323 compliant Netmeeting CUSeeME Half Life Hellbender for Windows v 1 0 Heretic II Hexen Il Hotline Server HTTP HTTPS ICQ 2001b ICQ Old IMAP Client IMAP Client v 3 Internet Phone IPSec IPSec IKE Jedi Knight II Jedi Outcast Kali KazaA LimeWire Links LS 2000 Mech Warrior 3 Mech Warrior 4 Vengeance Medal of Honor Allied Assault Microsoft Flight Simulator 98 Microsoft Flight Simulator 2000 Microsoft Golf 1
145. ckbox 121 An example of multiple VLANs using a Netopia Gateway with VGx managed switch technol ogy is shown below SIP Servers LAN 2 Noc VLAN 3 Router netopia Gateway with VGx To create a VLAN select a list item from the main VLAN page and click the Edif button The VLAN Entry page appears VLAN Entry 1 Enable VLAN Name Type Admin Restricted 802 1p Priority Bit Lo Check the Enable checkbox and enter a descriptive name for the VLAN 122 Configure VLAN Entry 1 M Example 1 Y By Port Global 802 1p Priority Bit Lo Admin Restrictet Submit You can create up to 8 VLANs and you can also restrict any VLAN and the computers on it from administering the Gateway e VLAN Name A descriptive name for the VLAN e Type LAN or WAN Port s can be enabled on the VLAN You can choose a type desig nation as follows By Port indicating that the VLAN is port based Traffic sent to this port will be treated as belonging to the VLAN and will not be forwarded to other ports that are not within a common VLAN segment Global indicating that the ports joining this VLAN are part of a global 802 1q Ethernet VLAN This VLAN includes ports on this Router and may include ports within other devices throughout the network The VID in this case may define the behavior of traffic between
146. cle the Gateway will boot into CD ROM mode instead of Gateway mode This command is only for the 3342N 3352N If the Gateway is not a 3342N 3352N this command does nothing but returns the message CD mode is not supported on this plat form reset crash Clears crash dump information which identifies the contents of the Netopia Gateway regis ters at the point of system malfunction 256 SHELL Commands reset dhcp server Clears the DHCP lease table in the Netopia Gateway reset diffserv Resets the Differentiated Services diffserv statistics reset enet all Resets Ethernet statistics to zero Beginning with Firmware Version 7 7 resets individual LAN switch port statistics as well as WAN Ethernet statistics where applicable reset heartbeat Restarts the heartbeat sequence reset ipmap Clears the IPMap table NAT reset log Rewinds the diagnostic log display to the top of the existing Netopia Gateway diagnostic log The reset log command does not clear the diagnostic log The next Show log com mand will display information from the beginning of the log file reset security log Clears the security monitoring log to make room to capture new entries reset wan users all p address This function disconnects the specified WAN User to allow for other users to access the WAN This function is only available if the number of WAN Users is restricted and NAT is on Use the all parameter to disc
147. click the Ping button Example Ping to grosso com ping www grosso com Pinging 192 150 14 120 from local address 143 137 199 8 timer gran 100 ms ICMP ec ICMP ec No ping ICMP ec ICMP ec 192 5 packe Ping size 100 Ping count ho reply from 192 ho reply from 192 response ho reply from 192 ho reply from 192 150 14 150 14 150 14 150 14 120 120 120 120 5 200 ms 100 ms 100 ms 100 ms 150 14 120 ping statistics ts transmitted 4 packets received 20 packet loss Result The host was reachable with four out of five packets sent 243 Below are some specific tests From the Gateway s Network Tools page Ping the internet default gateway IP DSL is down DSL or ATM settings are incorrect Gate address way s IP address or subnet mask are wrong gateway router is down Ping an internet site by IP address Gateway s default gateway is incorrect Gateway s sub net mask is incorrect site is down Ping an internet site by name DNS is not properly configured on the Gateway config ured DNS servers are down site is down From a LAN PC Ping the Gateway s LAN IP address IP address and subnet mask of PC are not on the same scheme as the Gateway cabling or other connectivity issue Ping the Gateway s WAN IP address Default gateway on PC is incorrect Ping the Gateway s internet default NAT is off on the Gateway and the internal IP addresses gateway
148. connection to your Netopia Gateway cr NOTE Some broadband cable oriented Service Providers use the System Name as an important identification and support parameter If your Gateway is part of this type of network do NOT alter the System Name unless specifically instructed by your Service Provider 329 set system diagnostic level off low medium I high alerts failures Specifies the types of log messages you want the Netopia Gateway to record All messages with a level equal to or greater than the level you specify are recorded For example if you specify set system diagnostic level medium the diagnostic log will retain medium level informational messages alerts and failure messages Specifying off turns off logging Use the following guidelines e low Low level informational messages or greater includes trivial status messages e medium Medium level informational messages or greater includes status messages that can help monitor network traffic e high High level informational messages or greater includes status messages that may be significant but do not constitute errors The default e alerts Warnings or greater includes recoverable error conditions and useful opera tor information e failures Failures includes messages describing error conditions that may not be recoverable set system log size 10240 65536 Specifies a size for the system log The most recent entries are po
149. ct Built in Ethernet Step 3 Select Configure Using DHCP Step 4 Close and Save if prompted Proceed to Configuring the Netopia Gateway on page 25 24 Configuring the Netopia Gateway Configuring the Netopia Gateway 1 Run your Web browser application such as Firefox or Microsoft Internet Explorer from the computer connected to the Netopia Gateway Enter http 192 168 1 254 in the Location text box The Admin Password page appears Welcome to your Netopia 3000 Before configuration your Gateway requires a password to protect it from unauthorized access This password is unique to this Gateway It is case sensitive and must be 1 to 8 characters long Remember this password or keep it in a safe place After you submit your new password you must logon before continuing When you connect to your Gateway as an Administrator you enter Admin as the UserName and the password you just created in the Logon dialog Admin Password New Password Confirm Password f Submit Access to your Netopia device can be controlled through two access control accounts Admin or User The Admin or administrative user performs all configuration management or mainte nance operations on the Gateway The User account provides monitor capability only A user may NOT change the configuration perform upgrades or invoke maintenance functions For the security of your connection an Admin password must be
150. cted Access Pre Shared Key WPA 802 1x Wireless Protected Access 802 1x authentication See Wire less Privacy Settings on page 343 for more information cr NOTE WEP is supported on only one SSID at a time and will not be available if another SSID already has it configured set wireless multi ssid second ssid wpa ver all WPA1 only WPA2 only set wireless multi ssid third ssid wpa ver all WPA1 only WPA2 only set wireless multi ssid fourth ssid wpa ver all WPA1 only I WPA2 only Specifies the type of WPA version enabled on multiple SSIDs when multi ssid option is set to on and privacy is set tp WPA PSK See Wireless Privacy Settings on page 343 for more information 338 CONFIG Commands set wireless multi ssid second ssid psk string set wireless multi ssid third ssid psk string y set wireless multi ssid fourth ssid psk string y Specifies a WPA passphrase for the multiple SSIDs when second third or fourth ssid privacy is set to WPA PSK The Pre Shared Key is a passphrase shared between the Gateway and the clients and is used to generate dynamically changing keys The pass phrase can be 8 63 characters It is recommended to use at least 20 characters for best security set wireless multi ssid second ssid weplen 40 64bit 128bit 256bit set wireless multi ssid third ssid weplen 40 64bit 128bit 256bit set wireless multi ssid fourth ssid weplen 40 6
151. d about security you may leave the public community blank Notifications Notification Type v vl Trap v2 Trap Inform M The Notification Type pull down menu allows you to configure the type of SNMP notifica tions that will be generated e viTrap This selection will generate notifications containing an SNMPv1 Trap Protocol Data Unit PDU e v2 Trap This selection will generate notifications containing an SNMPv2 Trap PDU e Inform This selection will generate notifications containing an SNMPv2 InformRe quest PDU To send SNMP traps you must add IP addresses for each trap receiver you want to have Click the Add button The IP Trap Entry screen appears IP Trap Entry IP Trap Entry Address 0 0 0 0 Submit 110 Configure Enter an IP Trap Entry IP address This is the destination for SNMP trap messages the IP address of the host acting as an SNMP console Click the Submit button Click the Alert icon and in the resulting page click the Save and Restart link 111 Link IGMP Internet Group Management Protocol Multicasting is a method for transmitting large amounts of information to many but not all computers over an internet One common use is to distribute real time voice video and data services to the set of computers which have joined a distributed conference Other uses include updating the address books of mobile computer users in the field or sending out comp
152. d follow ing it with a stop bit Compare synchronous communication Auth Protocol Authentication Protocol for IP packet header The three parameter values are None Encapsulating Security Payload ESP and Authentication Header AH backbone The segment of the network used as the primary path for trans porting traffic between network segments baud rate Unit of signaling speed equal to the number of number of times per second a signal in a communications channel varies between states Baud is synonymous with bits per second bps if each signal represents one bit binary Numbering system that uses only zeros and ones bps Bits per second A measure of data transmission speed 352 BRI Basic Rate Interface ISDN standard for provision of low speed ISDN services two B channels 64 kbps each and one D channel 16 kbps over a single wire pair bridge Device that passes packets between two network segments accord ing to the packets destination address broadcast Message sent to all nodes on a network broadcast address Special IP address reserved for simultaneous broad cast to all network nodes buffer Storage area used to hold data until it can be forwarded carrier Signal suitable for transmission of information CCITT Comit Consultatif International T l graphique et T l phonique or Consultative Committee for International Telegraph and Telephone An inter national organization responsible for
153. d profile set ata profile 0 3 ata dhcpc enable on off Enables or disables DHCP client service for the specified profile set ata profile 0 3 ata dhcpc hostname string Specifies a DHCP client hostname for the specified profile set ata profile 0 3 ata static wan ip p_addr Specifies a static WAN IP address for the specified profile 269 set ata profile 0 3 ata static wan subnet mask subnet_mask Specifies a static WAN IP subnet mask for the specified profile set ata profile 0 3 ata static wan gateway ip addr Specifies a static gateway WAN IP address for the specified profile set ata profile 0 3 ata proxy server p_addr Specifies a SIP proxy server hostname or IP address for the specified profile set ata profile 0 3 ata proxy port port Specifies a SIP proxy server port typically 5060 for the specified profile set ata profile 0 3 ata registrar server p_addr Specifies a registrar server hostname or IP address for the specified profile set ata profile 0 3 ata registrar port port Specifies a registrar server port typically 5060 for the specified profile set ata profile 0 3 ata outproxy server ip addr Specifies an outbound proxy server hostname or IP address for the specified profile set ata profile 0 3 ata outproxy port port Specifies an outbound proxy server port typically 5060 for the specified profile set ata
154. dLocked BreakWater changes are automatically saved and take effect immediately Submit 4 Click on the radio button to select the protection level you want Click Submit Changing the BreakWater setting does not require a restart to take effect This makes it easy to change the setting on the fly as your needs change 150 Security TIPS for making your BreakWater Basic Firewall Selection Application Select this Level Other Considerations Typical Internet usage SilentRunning browsing e mail Multi player online ClearSailing Set Pinholes once defined pinholes will be gaming active whenever ClearSailing is set Restore SilentRunning when finished Going on vacation LANdLocked Protects your connection while your away Finished online use for LANdLocked This protects you instead of disconnecting your the day Gateway connection Chatting online or using ClearSailing Set Pinholes once defined pinholes will be instant messaging active whenever ClearSailing is set Restore SilentRunning when finished Basic Firewall Background As a device on the Internet a Netopia Gateway requires an IP address in order to send or receive traffic The IP traffic sent or received have an associated application port which is dependent on the nature of the connection request In the IP protocol standard the following session types are common applications e ICMP e HTTP e FIP SNMP e telnet e DHCP By receiv
155. de address check is ignored For outbound flows the outside address is the destination IP address for the packets For inbound packets the outside address is the source IP address for the packets Note When setting the Inside Outside IP Address Netmask settings note that a netmask value can be used to configure for a network rather than a single IP address 295 e qos Allows you to specify the Quality of Service for the flow off assure or expedite These are used both to mark the IP TOS byte and to distribute packets into the queues as if they were marked by the source Packet Mapping Configuration set diffserv qos network control queue expedite queue assured queue best effort queue queue name Specifies the Diffserv QoS queue mapping associations e queue name the basic queue name to which classified packets are directed By default the following mappings are created set diffserv qos network control queue basic q0 set diffserv qos expedite queue basic ql set diffserv qos assured queue basic q2 set diffserv qos best effort queue basic q3 set diffserv qos dscp map default custom e default the default DSCP queue mappings are used e custom allows you to set up customized mappings between DSCP code points and queue types If custom is selected the following can be configured set diffserv qos dscp map 0 best effort assured expedite network control set diffserv qos dscp map 1
156. defab Encryption Key Size 45764 bit 10 characters B Encryption Key 3 ETT ee Key Size 15 64 bit 10 characters E Encryption Key 4 abcdefabcd Use WEP encryption key 1 4 GS Other Wireless Options Multiple SSIDs Enable and Configure Multiple SSIDs WiFi Multimedia Enable and Configure WMM MAC Authorization Limit Wireless Access by MAC Address Encryption Key Size 1 4 Selects the length of each encryption key The longer the key the stronger the encryption and the more difficult it is to break the encryption 63 Encryption Key 1 4 The encryption keys You enter keys using hexadecimal digits For 40 64bit encryption you need ten digits 26 digits for 128bit and 58 digits for 256bit WEP Hexadecimal characters are O 9 and a f Examples e AObit 02468ACEO2 e 128bit 0123456789ABCDEF0123456789 e 256bit 592CA140F0A238B0C61AE162F592CA140F0A238B0C61AE162F21A09C Use WEP encryption key 1 4 Specifies which key the Gateway will use to encrypt transmitted traffic The default is key 1 You disable the wireless LAN by unchecking the Enable Wireless checkbox clicking the Submit button followed by the Save and Restart link WPA Version Allowed If you select either WPA 802 1x or WPA PSK as your privacy setting the WPA Version Allowed pull down menu appears to allow you to select the WPA version s that will be required for client connections Choices are e WPA Version 1
157. developing telecommunication stan dards CD Carrier Detect CHAP Challenge Handshake Authentication Protocol Security protocol in PPP that prevents unauthorized access to network services See RFC 1334 for PAP specifications Compare PAP client Network node that requests services from a server CPE Customer Premises Equipment Terminating equipment such as termi nals telephones and modems that connects a customer site to the tele phone company network CO Central Office Typically a local telephone company facility responsible for connecting all lines in an area compression Operation performed on a data set that reduces its size to improve storage or transmission rate 353 CPIP Carrier Pigeon Internet Protocol RFC 1149 Standard for the trans mission of IP datagrams on avian carriers The IP datagram is printed on a small scroll of paper in hexadecimal with each octet separated by whit estuff and blackstuff The scroll of paper is wrapped around one leg of the avian carrier A band of duct tape is used to secure the datagram s edges The bandwidth is limited to the leg length The MTU is variable and paradox ically generally increases with increased carrier age A typical MTU is 256 milligrams Some datagram padding may be needed Upon receipt the duct tape is removed and the paper copy of the datagram is optically scanned into an electronically transmittable form crossover cable Cable that lets you con
158. ding to specifications defined by your service provider e vbr Three parameters are required for VBR VCs Enter the Peak Cell Rate the Sus tained Cell Rate and the Maximum Burst Size that apply to the VC You set these values according to specifications defined by your service provider set atm vcc n qos peak cell rate 1 n If QoS class is set to cbr or vbr then specify the peak cell rate that should apply to the specified virtual circuit This value should be between 1 and the line rate The Peak Cell Rate PCR should be set to the maximum rate a PVC can oversubscribe its Sustained Cell Rate SCR The Peak Cell Rate see below must be less than or equal to the raw WAN DSL bit rate The Maximum Burst Size MBS is the number of cells that can be sent at the PCR rate after which the PVC must fall back to the SCR rate 272 CONFIG Commands set atm vcc n qos sustained cell rate 1 n If QoS class is set to vbr then specify the sustained cell rate that should apply to the specified virtual circuit This value should be less than or equal to the Peak Cell Rate which should be less than or equal to the line rate set atm vcc n qos max burst size 1 n If QoS class is set to vbr then specify the max burst size that should apply to the speci fied virtual circuit This value is the maximum number of cells that can be transmitted at the Peak Cell Rate after which the ATM VC transmission rate must drop to
159. double quotes if it contains embedded spaces set snmp sysgroup location ocation info Identifies the location such as the building floor or room number of the Netopia Gateway You can enter up to 255 characters for the location info argument You must put the location info argument in double quotes if it contains embedded spaces 328 CONFIG Commands SNMP Notify Type Settings set snmp notify type v1 trap v2 trap inform Sets the type of SNMP notifications that the system will generate e vi trap This selection will generate notifications containing an SNMPv1 Trap Protocol Data Unit PDU e v2 trap This selection will generate notifications containing an SNMPv2 Trap PDU e inform This selection will generate notifications containing an SNMPv2 InformRe quest PDU System Settings You can configure system settings to assign a name to your Netopia Gateway and to spec ify what types of messages you want the diagnostic log to record set system name name Specifies the name of your Netopia Gateway Each Netopia Gateway is assigned a name as part of its factory initialization The default name for a Netopia Gateway consists of the word Netopia 3000 XXX where XXX is the serial number of the device for example Netopia 3000 9437188 A system name can be 1 255 characters long Once you have assigned a name to your Netopia Gateway you can enter that name in the Address text field of your browser to open a
160. dress to a specific internal LAN IP address All traffic arriving at the Gateway intended for the static IP address is transferred to the internal device All outbound traffic from the internal device appears to originate from the static IP address Locally hosted servers are supported by a public IP address while LAN users behind the NAT enabled IP address are protected IPMaps is compatible with the use of NAT with either a statically assigned IP address or DHCP PPP served IP address for the NAT table What types of servers are supported by IPMaps PMaps allows a Netopia Gateway to support servers behind the Gateway for example web mail FTP or DNS serv ers VPN servers are not supported at this time Can I use IPMaps with my PPPoE or PPPoA connection Yes IPMaps can be assigned to the WAN interface provided they are on the same subnet Service providers will need to ensure proper routing to all IP addresses assigned to your WAN inter face Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway IPMap will support statically assigned WAN IP addresses from the same subnet WAN IP addresses from different subnets are not supported 97 IPMaps Block Diagram The following diagram shows the IPMaps principle in conjunction with existing Netopia NAT operations Netopia Gateway WAN Interface LAN Interface Static IP Addresses for IPMaps Applications 143 137 50 37 NAT PAT Table 192 168 1 1 1
161. ds ooo 274 DHCP Settings 2 ox e Rt e Re 275 Common Commands occ 275 DHCP Option Filtering llle 277 Example cui a eter tS A O qus 278 DMTESEtINOS 230 REX ek ed a eee 279 DSL Commands 0 0 0 a Ee a a a a 279 Domain Name System Settings o an naaa ana 280 Common Commands ooo 280 Dynamic DNS Settings 0 0 00 cee eee 280 IGMP Settings inpr REI ee TREE ERU ed ris 281 IP Settirigs is mona br eR ROC eel 284 Common SettingS coil eR eee REGERE iR EC IR 284 ARP Timeout Settings liliis 284 DSL Settings s caia sm eraut ether ER eve ion a 284 Ethernet LAN Settings liliis 287 Additional subnets o cooooccoooo ee 288 Default IP Gateway Settings oooocoococooo 289 IP over PPP Settings llllllssllelssllleessn 289 Static ARP Settings llle 293 IGMP Forwarding 0 00 cece e 293 IPsec Passthrough 0 00 00 c eee eee 293 IP Prioritizati ri oom Geass ee Seco eave ey Rer 294 Differentiated Services DiffServ 200 294 Packet Mapping Configuration 000 296 Queue Configuration 0 0 0 ects 298 Basic QUEUE iii ie ean etos aoi Pade 299 Weighted Fair Queue 0 2 cee ees 300 Priority Queue orisa o pa e eee 301 Funnel Queue ccce pn a ewe dl ER eee 302 Interface Queue Assignment 2000 eee 302 SIP Passthrougli c is le eel EXTR dera 303 Static Route Settings
162. dwidth for this queue can be shared between other queues when idle By default the following WFQ is created set queue name wfq type wfq set queue name wfq entry 1 input basic q0 set queue name wfq entry 1 weight 10 set queue name wfq entry 1 share bw off set queue name wfq entry 2 input basic ql set queue name wfq entry 2 weight 20 set queue name wfq entry 2 share bw off set queue name wfq entry 3 input basic q2 set queue name wfq entry 3 weight 30 set queue name wfq entry 3 share bw off set queue name wfq entry 4 input basic q3 set queue name wfq entry 4 weight 40 set queue name wfq entry 4 share bw off This is a weighted fair queue with four input queues of relative weights 1096 2096 3096 and 40 300 CONFIG Commands Priority Queue set queue name priority queue name option off on set queue name priority queue name type priority A priority queue can contain up to 8 input queues For each input queue the following is configured set queue name priority queue name entry n input input queue name set queue name priority queue name entry n priority priority value Specifies the Priority Queue named priority queue name attributes e priority queue name name of priority queue e input queue name name of input queue e priority value numeric relative priority of queue The higher the number the higher the priority of the queue By default the following priority queue is created set queue nam
163. e set dns primary address ip address Specifies the IP address of the primary DNS name server set dns proxy enable This allows you to disable the default behavior of acting as a DNS proxy The default is on set dns secondary address ip address Specifies the IP address of the secondary DNS name server Enter 0 0 0 0 if your network does not have a secondary DNS name server Dynamic DNS Settings Dynamic DNS support allows you to use the free services of www dyndns org Dynamic DNS automatically directs any public Internet request for your computer s name to your cur rent dynamically assigned IP address This allows you to get to the IP address assigned to 280 CONFIG Commands your Gateway even though your actual IP address may change as a result of a PPPoE con nection to the Internet set dynamic dns option off dyndns org set dynamic dns ddns host name myhostname dyndns org set dynamic dns ddns user name myusername set dynamic dns ddns user password myuserpassword Enables or disables dynamic DNS services The default is off If you specify dyndns org you must supply your hostname username for the service and password Because different dynamic DNS vendors use different proprietary protocols currently only www dyndns org is supported IGMP Settings NOTE IGMP Version 3 is supported beginning with Firmware Version 7 7 See IGMP Internet Group Management Protocol on page 112 for detail
164. e Filter Input Rule Entry 1 Forward O Source IP 199 211 211 17 Source Mask 255 255 255 255 Destination IP 0 0 0 0 Destination Mask 0 0 0 0 TOS TOS Mask Protocol Source Port Compare Equal to Hj Source Port 23 Destination Port Compare No compare Hj Submit Add or Edit more Filter Rules 185 Filtering example 2 Suppose a filter is configured to block all incoming IP packets with the source IP address of 200 233 14 0 regardless of the type of connection or its destination The filter would look like this Filter Input Rule Entry 2 Forward Ba Source IP 200 233 14 0 Source Mask 255 255 255 0 Destination IP 0 0 0 0 Destination Mask 0 0 0 0 TOS o TOS Mask Protocol This filter blocks any packets coming from a remote network with the IP network address 200 233 14 0 The O at the end of the address signifies any host on the class C IP net work 200 233 14 0 If for example the filter is applied to a packet with the source IP address 200 233 14 5 it will block it In this case the mask must be set to 255 255 255 0 This way all packets with a source address of 200 233 14 x will be matched correctly no matter what the final address byte is er Note The protocol attribute for this filter is Any by default This tells the filter to ignore the IP protocol or type of IP packet 186 Firewall Tutorial Design guidelines Careful tho
165. e to add a message to the diagnostic log to report or change diagnostic log level to show IP information to send DNS query for host to send ICMP Echo request to quit this shell to reset subsystems to restart unit to show system information to start subsystem to show basic status of unit to telnet to a remote host to send traceroute probes 248 Overview upload view who to upload config file to show configuration information to show who is using the shell delete help save script set validate view CONFIG Commands Delete configuration list data Help command option Save configuration data Print configuration data Set configuration data Validate configuration settings View configuration data ata atm bridge dhcp dmt diffserv dns dslf cpewan dslf lanmgnt dynamic dns ethernet igmp ip ip maps nat default pinhole Ppp pppoe preferences queue radius ATA remote config options ATM options DSL only Bridge options Dynamic Host Configuration Protocol options DMT ADSL options Differentiated Services options Domain Name System options TR 069 CPE WAN management TR 064 LAN management Dynamic DNS options Ethernet options IGMP configuration options TCP IP protocol options IPmaps options Network Address Translation default options Pinhole options Peer to Peer Protocol options PPP over Ethernet options Shell environment settings bandwidth queueing options RADIUS
166. e Data included in frames for error control flow control Technique using hardware circuits or control characters to reg ulate the transmission of data between a computer or other DTE and a modem or other DCE Typically the modem has buffers to hold data if the buffers approach capacity the modem signals the computer to stop while it catches up on processing the data in the buffer See CTS RTS xon xoff 356 fragmentation Process of breaking a packet into smaller units so that they can be sent over a network medium that cannot transmit the complete packet as a unit frame Logical grouping of information sent as a link layer unit Compare datagram packet FTP File Transfer Protocol Application protocol that lets one IP node trans fer files to and from another node FTP server Host on network from which clients can transfer files Hard MBytes Setting the Hard MBytes parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Hard MByte value The value can be configured between 1 and 1 000 000 MB and refers to data traffic passed Hard Seconds Setting the Hard Seconds parameter forces the renegotia tion of the IPSec Security Associations SAs at the configured Hard Seconds value The value can be configured between 60 and 1 000 000 seconds A tunnel will start the process of renegotiation at the soft threshold and renegotiation must happen by the hard limit or traffic over t
167. e If you leave the default all zeroes the outside address check is ignored For outbound flows the outside address is the destination IP address for traffic for inbound packets the outside address is the source IP address Note When setting the Inside Outside IP Address Netmask settings note that a netmask value can be used to configure for a network rather than a single IP address Quality of Service QoS This is the Quality of Service setting for the flow based on the TOS bit information Select Expedite Assure or Off default from the pull down menu The following table outlines the TOS bit settings and behavior QoS Setting TOS Bit Value Behavior Off TOS 000 This custom flow is disabled You can activate it by selecting one of the two settings below This setting allows you to pre define flows with out actually activating them Assure TOS 001 Use normal queuing and throughput rules but do not drop packets if possible Appropriate for applications with no guaranteed delivery mechanism Expedite TOS 101 Use minimum delay Appropriate for VoIP and video applications 105 Link DNS Your Service Provider may maintain a Domain Name server If you have the information for the DNS servers enter it on the DNS page If your Gateway is configured to use DHCP to obtain its WAN IP address the DNS information is automatically obtained from that same DHCP Server If your service provider hosts a Domain Name S
168. e used to derive any additional keys If the key was derived from some other keying material that material must not be used to derive any more keys 361 PING Packet INternet Groper Utility program that uses an ICMP echo mes sage and its reply to verify that one network node can reach another Often used to verify that two hosts can communicate over a network PPP Point to Point Protocol Provides a method for transmitting datagrams over serial router to router or host to network connections using synchronous or asynchronous circuits Pre Shared Key The Pre Shared Key is a parameter used for authenticating each side The value can be an ASCII or Hex and a maximum of 64 charac ters Pre Shared Key Type The Pre Shared Key Type classifies the Pre Shared Key SafeHarbour supports ASCII or HEX types protocol Formal set of rules and conventions that specify how information can be exchanged over a network PSTN Public Switched Telephone Network QoS Quality of Service The ability of a network to prioritize certain kinds of network traffic to provide reserved bandwidth and reduced latency needed by some real time and interactive traffic such as voice and video over IP QoS also provides priority for one or more flows such that one flow does not make other flows fail repeater Device that regenerates and propagates electrical signals between two network segments Also known as a hub RFC Request for Comment Set of docum
169. e DSLAM Make sure the 2200 and 3300 series DSL Gateway is not plugged into a micro filter Note EN Link light is inactive if only using USB 1 Make sure the you are using the Ethernet cable not the DSL cable The Ethernet cable is thicker than the standard telephone cable 2 Make sure the Ethernet cable is securely plugged into the Ethernet jack on the PC EN Link Unlit 3 If plugging a 2200 and 3300 series DSL Gateway into a hub the you may need to plug into an uplink port on the hub or use an Ethernet cross over cable 4 Make sure the Ethernet cable is securely plugged into the Ethernet port on the 2200 and 3300 series DSL Gateway 5 Try another Ethernet cable if you have one available 1 Make sure you have Ethernet drivers installed on the PC 2 Make sure the PC s TCP IP Properties for the Ethernet Network Control Panel is set to obtain an IP address via DHCP 3 Make sure the PC has obtained an address in the 192 168 1 x range EN Traffic Unlit You may have changed the subnet addressing 4 Make sure the PC is configured to access the Internet over a LAN 5 Disable any installed network devices Ethernet HomePNA wireless that are not being used to connect to the 2200 and 3300 series DSL Gateway Note USB Active light is inactive if only using Ethernet 1 Make sure you have USB drivers installed on the PC 2 Make sure the PC s TCP IP Properties for the USB Network Control Panel i
170. e and IP TOS bits are used even if no flows are defined Consequently if the end point nodes provide TOS set tings from an application that can be interpreted as one of the supported states the Gate way will handle it as if it actively marked the TOS field itself e NOTE The Gateway itself will not override TOS bit settings made by the endpoints Support for source provided IP TOS priorities within the Gateway is achieved simply by turning the DiffServe option on and by setting the lohi asymmetry to adjust the behavior of the Gateway s internal queues set diffserv lohi ratio 60 100 percent Sets a percentage between 60 and 100 used to regulate the level of packets allowed to be pending in the low priority queue The default is 92 It can be used in some degree to adjust the relative throughput bandwidth for low versus high priority traffic cr NOTE diffserv lohi ratio has been removed for ADI based platforms VDSL ADSL bonded units 294 CONFIG Commands set diffserv custom flows name name protocol TCP UDP I ICMP other direction outbound inbound both start port 0 49151 end port 0 49151 inside ip inside ip addr inside ip mask inside ip netmask outside ip outside ip addr outside ip mask outside ip netmask qos off assure expedite Defines or edits a custom flow Select a name for the custom flow from the set command The CLI will step into the newly named or p
171. e packet e Ignores the packet A filter forwards or blocks a packet only if it finds a match after applying its criteria When no match occurs the filter ignores the packet 180 Firewall Tutorial A filtering rule The criteria are based on information contained in the packets A filter is simply a rule that prescribes certain actions based on certain conditions For example the following rule qualifies as a filter Block all Telnet attempts that originate from the remote host 199 211 211 17 This rule applies to Telnet packets that come from a host with the IP address 199 211 211 17 If a match occurs the packet is blocked Here is what this rule looks like when implemented as a filter in DIM dins ae Netopia Firmware Version 7 7 Forward E Source IP 199 211 211 17 To understand this particular fil ter look at the parts of a filter Source Mask 255 255 255 255 Parts of a filter Borna 0 0 0 0 A filter consists of criteria based Destination Mask 0 0 0 0 on packet attributes A typical fil ter can match a packet on any TOS one of the following attributes TOS Mask e The source IP address and subnet mask where the Protocol packet was sent from Source Port Compare Equal to Hj e The destination IP address and subnet mask where the Source Port 23 packet is going Destination Port Compare No compare Hj e The TOS bit setting of the packet Certain types of IP Submit packets such as
172. e pq option on set queue name pq type priority set queue name pq entry 1 input basic q0 set queue name pq entry 1 priority 10 set queue name pq entry 2 input basic ql set queue name pq entry 2 priority 20 set queue name pq entry 3 input basic q2 set queue name pq entry 3 priority 30 set queue name pq entry 4 input basic q3 set queue name pq entry 4 priority 40 301 Funnel Queue A funnel queue is used to limit the rate of the transmission below the actual line rate set queue name funnel_queue_name option on off set queue name funnel_queue_name type funnel set queue name funnel_queue_name input input_queue_name set queue name funnel_queue_name bps bps Specifies the Funnel Queue named funnel_queue_name attributes e funnel queue name name of funnel queue e input queue name name of input queue e bps max bits per second permitted through funnel queue By default the following funnel queues are created Rate limiting priority queue to 100Kbps set queue name pq 100kbps option on set queue name pq 100kbps type funnel set queue name pq 100kbps input pq set queue name pq 100kbps bps 100000 Rate limiting weighted fair queue to 100Kbps set queue name wfq 100kbps option on set queue name wfq 100kbps type funnel set queue name wfq 100kbps input wfq set queue name wfq 100kbps bps 100000 Interface Queue Assignment The WAN ethernet queue is assigned as follows set ethernet ethernet B tx queue queue name By de
173. ecken Sie dann das Netzteil in eine Netzsteckdose CE Achtung Abh ngig von dem mit dem Produkt gelieferten Netzteil entweder die direkten Steckernetzger te Stecker vom Netzkabel oder der Ger tekoppler dienen als Hauptspannungsunterbrechung Es ist wichtig dass das Steckernetzgerat Steckdose oder Geratekoppler frei zuganglich sind Sweden Apparaten skall anslutas till jordat uttag n r den ansluts till ett n tverk Norway Apparatet m kun tilkoples jordet stikkontakt USB powered models For Use with Listed T E Only INSTALLATION DER TELEKOMMUNIKATION Wenn Ihre Telefonausr stung verwendet wird sollten grundlegende Sicherheitsanweisun gen immer befolgt werden um die Gefahr eines Feuers eines elektrischen Schlages und die Verletzung von Personen zu verringern Beachten Sie diese weiteren Hinweise Benutzen Sie dieses Produkt nicht in Wassern he wie z B nahe einer Badewanne Waschschussel K chensp le in einem nassen Keller oder an einem Swimmingpool Vermeiden Sie das Telefonieren gilt nicht fur schnurlose Telefone wahrend eines Gewit ters Es besteht die Gefahr eines elektrischen Schlages durch einen Blitz Nicht das Telefon benutzen um eine Gasleckstelle zu Melden wenn Sie sich in der N he der Leckstelle befinden Bewahren Sie diese Anweisungen auf 21 Setting up the Netopia Gateway Refer to your Quickstart Guide for instructions on how to connect your Netopia gateway to your power
174. econfigured VPI VCI pairs then you can manually enter a VPI VCI pair in the ATM Circuits page 83 PPPoE with IPoE For ADSL Gateways you must configure two VCCs with the same VPI VCI settings to provide concurrent PPPoE with IPoE support You must use fixed VPI VCI values for PPPoE with IPoE You cannot have both VPI VCI values set to 0 0 autodetection does not work in this mode ATM Circuits vcc VPI VCI Encapsulation Multiplexing PPPoE Sessions 36 PPP over Ethernet i LLC SNAP HH 1 36 RFC 1483 Bridged Ethernet B LLC SNAP EB To turn off a VCC set its encapsulation to None To turn on another VCC Click Here ATM Traffic Shaping Configure ATM Traffic Shaping Options Once the VCCs have WAN IP Interfaces been configured the PPP over Ethernet vcc1 Configure this IP interface WAN IP Interfaces RFC 1483 Bridged Ethernet vcc1 Configure this IP interface screen displays the additional interface IP Gateway which you can then con Enable Gateway Option M figure as required Interface Type PPP vcc1 E Other WAN Options ATM Set up ATM circuits Se NOTE Enabling PPPoE with IPoE disables support for multiple PPPoE sessions 84 Configure ATM Traffic Shaping You can prioritize delay sensitive data by configuring the Quality of Service QoS characteristics of the virtual circuit Click the ATM Traffic Shaping link ATM Traffic Shaping VCC Service Peak Cell Su
175. ection Access to your Netopia device can be controlled through two access control accounts Admin or User The Admin or administrative user performs all configuration management or mainte nance operations on the Gateway The User account provides monitor capability only A user may NOT change the configuration perform upgrades or invoke maintenance functions Account usernames can now be changed for the Admin and User accounts Network Address Translation NAT The Netopia Gateway Network Address Translation NAT security feature lets you conceal the topology of a hard wired Ethernet or wireless network connected to its LAN interface 381 from routers on networks connected to its WAN interface In other words the end com puter stations on your LAN are invisible from the Internet Only a single WAN IP address is required to provide this security support for your entire LAN LAN sites that communicate through an Internet Service Provider typically enable NAT since they usually purchase only one IP address from the ISP When NAT is ON the Netopia Gateway proxies for the end computer stations on your network by pretending to be the originating host for network communications from non originating networks The WAN interface address is the only IP address exposed The Netopia Gateway tracks which local hosts are communicating with which remote hosts It routes packets received from remote networks to the correct comp
176. ed restart the Gateway in order for the changes to take effect Mii Click the Save and Restart link You will be asked to confirm your choice and the Gate way will reboot with the new configuration 167 Stateful Inspection Options Stateful Inspection Parameters are active on a WAN interface only if you enable them on your Gateway PPP over Ethernet vcc1 Stateful Inspection Default Mapping to Router TCP Sequence Number Difference Deny Fragments Submit e Stateful Inspection To enable stateful inspection on this WAN interface check the checkbox e Default Mapping to Router This is disabled by default This option will allow the router to respond to traffic received on this interface for example ICMP Echo requests er NOTE If Stateful Inspection is enabled on a WAN interface Default Mapping to Router must be enabled to allow inbound VPN terminations to the router e TCP Sequence Number Difference Enter a value in this field This value represents the maximum sequence number difference allowed between subsequent TCP packets If this number is exceeded the packet is dropped The acceptable range is O 65535 A value of O zero disables this check e Deny Fragments To enable this option which causes the router to discard fragmented packets on this interface check the checkbox 168 Security Open Ports in Default Stateful Inspection Installation Port
177. ed The third option available turns off all inbound and outbound traffic isolating the LAN and disabling all WAN traffic cr NOTE BreakWater Basic Firewall operates independent of the NAT functionality on the Gateway Configuring for a BreakWater Setting Use these steps to establish a firewall setting 1 Ensure that you have enabled the BreakWater basic firewall with the appropriate feature key See See Use Netopia Software Feature Keys on page 209 for reference NOTE The firewall is now keyed on by default on the 2200 Series Gateways Click the Security toolbar button Click Firewall 149 BreakWater Firewall ClearSailing Removes the traffic restrictions imposed by SilentRunning and LANdlocked Protection against unwanted inbound traffic is controlled by NAT settings Note The ClearSailing firewall setting is necessary to enable pinholes IPMaps and a NAT default server SilentRunning Using this level of firewall protection allows secure transmission of outbound traffic but disables any attempt for inbound traffic to identify the Gateway This is the Internet equivalent of having an unlisted number Note The SilentRunning firewall setting disables pinholes IPMaps and a NAT default server LANdLocked This option turns off all inbound and outbound traffic including pinholes and IPMaps isolating the LAN and disabling all WAN traffic BreakWater Option ClearSailing O SilentRunning O LAN
178. ed explanation You can set the following options e IGMP Snooping enables the Netopia Gateway to listen in to IGMP traffic The Gate way discovers multicast group membership for the purpose of restricting multicast transmissions to only those ports which have requested them This helps to reduce overall network traffic from streaming media and other bandwidth intensive IP multicast applications e Robustness a way of indicating how sensitive to lost packets the network is IGMP can recover from robustness minus 1 lost IGMP packet The default value is 2 e Query Interval the amount of time in seconds between IGMP General Query mes sages sent by the querier gateway The default query interval is 125 seconds e Query Response Interval the maximum amount of time in tenths of a second that the IGMP router waits to receive a response to a General Query message The default query response interval is 10 seconds and must be less than the query interval e Unsolicited Report Interval the amount of time in seconds between repetitions of a particular computer s initial report of membership in a group The default unsolicited report interval is 10 seconds e Querier Version select a version of the IGMP Querier version 1 version 2 or version 3 If you know you will be communicating with other hosts that are limited to v1 or v2 for backward compatibility select accordingly otherwise allow the default v3 281 Se
179. ed key type hex ascii hex See page 154 for details about SafeHarbour IPsec tunnel capability 317 set security ipsec tunnels name 123 IKE mode pre shared key hex string See page 154 for details about SafeHarbour IPsec tunnel capability Example 0x1234 set security ipsec tunnels name 123 IKE mode neg method main aggressive See page 154 for details about SafeHarbour IPsec tunnel capability Note Aggressive Mode is a little faster but it does not provide identity protection for nego tiations nodes set security ipsec tunnels name 123 IKE mode DH group 1 11215 See page 154 for details about SafeHarbour IPsec tunnel capability set security ipsec tunnels name 123 IKE mode isakmp SA encrypt DES DES 3DES See page 154 for details about SafeHarbour IPsec tunnel capability set security ipsec tunnels name 123 IKE mode ipsec mtu mtu_value The Maximum Transmission Unit is a link layer restriction on the maximum number of bytes of data in a single transmission The maximum allowable value also the default is 1500 and the minimum is 100 set security ipsec tunnels name 123 IKE mode isakmp SA hash MD5 MD5 SHA1 See page 154 for details about SafeHarbour IPsec tunnel capability set security ipsec tunnels name 123 IKE mode PFS enable 318 CONFIG Commands off on See page 154 for details about SafeHarbour IPsec tunnel capability set security
180. ed successfully use the following steps 1 Open a web connection to your Netopia Gateway from the computer on your LAN and return to the Home page 2 Verify your Netopia firmware release as shown on the Home Page e06 Netopia Home Page Home Configure Troubleshoot Security Install Restart Help Home net pia General Information Hardware Netopia Model 3397GP AnnexA Wireless VDSL Ethernet Switch Configure ar NUITDe 93 SA Troubleshoot Software Version 7 7 0r0 BreakWater Firewall ClearSailing Date amp Time Thu Jun 15 55 33 2006 Safe Harbour On Status Data Rate Kbps Downstream 8000 Upstream 800 IP Address 0 0 0 0 Default Gateway 0 0 0 0 Netmask 255 255 255 0 DHCP Client DHCP Lease Expires N A WAN Users Unlimited IP Address 192 168 1 254 Netmask 255 255 255 0 Ethernet Status Up DHCP Server On DHCP Leases 0 out of 253 leases in use gt lt gt 207 This completes the upgrade process 208 Install Link Install Key You can obtain advanced product functionality by employing a software Feature Key Soft ware feature keys are specific to a Gateway s serial number Once the feature key is installed and the Gateway is restarted the new feature s functionality becomes enabled Use Netopia Software Feature Keys Netopia Gateway users obtain advanced product functionality by installing a software fea ture key This concept utilizes a specially constructed and distributed keycode refe
181. eeds to be enabled to comply with logging requirements mentioned in The Modular Firewall Certification Criteria Baseline Module version 4 0 specified by ICSA Labs See Syslog Parameters on page 135 For more information please go to the following URL http www icsalabs com html communities firewalls certification criteria Baseline pdf 136 Configure Log Event Messages 1 administrative access attempted 2 administrative access authenticated and allowed 3 administrative access allowed 4 administrative access denied invalid user name 5 administrative access denied invalid password 6 administrative access denied telnet access not allowed 7 administrative access denied web access not allowed Administration Related Log Messages This log message is generated whenever the user attempts to access the router s management interface This log message is generated whenever the user attempts to access the router s management interface and is successfully authenticated and allowed access to the management interface If for some reason a customer does not want password protection for the management interface this log message is generated whenever any user attempts to access the router s management interface and is allowed access to the management interface This log message is generated whenever the user tries to access the router s management interface and auth
182. elded cables and connectors between system components Changes or modifica tions to this product not authorized by the manufacturer could void your authority to operate the equipment Canada This Class B digital apparatus meets all requirements of the Canadian Interference Causing Equipment Regulations Cet appareil num rique de la classe B respecte toutes les exigences du R glement sur le mat riel brouilleur du Canada Declaration for Canadian users NOTICE The Canadian Industry Canada label identifies certified equipment This certification means that the equipment meets certain telecommunications network protective operation and safety requirements The Department does not guarantee the equipment will operate to the user s satisfaction Before installing this equipment users should ensure that it is permissible to be connected to the facilities of the local telecommunications company The equipment must also be installed using an acceptable method of connection In some cases the company s inside wiring associated with a single line individual service may be extended by means of a certified connector assembly telephone extension cord The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations Repairs to the certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier Any repairs or alterations made by the
183. en eral Query message The default query response interval is 10 seconds and must be less than the query interval e Unsolicited Report Interval the amount of time in seconds between repetitions of a particular computer s initial report of membership in a group The default unsolicited report interval is 10 seconds e Querier Version Select a version of the IGMP Querier from the pull down menu v1 V2 or v3 The default v3 allows for backward compatibility mode with the earlier ver sions and should not need to be changed However for administrative purposes you may select either v1 or v2 e Last Member Query Interval the amount of time in tenths of a second that the IGMP gateway waits to receive a response to a Group Specific Query message The last mem ber query interval is also the amount of time in seconds between successive Group Specific Query messages The default last member query interval is 1 second 10 deci seconds IGMP Snooping Query Interval 125 Unsolicited Report interval Querier Version Last Member Query Count Submit 113 e Last Member Query Count the number of Group Specific Query messages sent before the gateway assumes that there are no members of the host group being que ried on this interface The default last member query count is 2 e Fast Leave Checking this checkbox enables a non standard expedited leave mecha nism The querier keeps track of which client is reques
184. entication fails due to incor rect user name This log message is generated whenever the user tries to access the router s management interface and authentication fails due to incor rect password This log message is generated whenever the user tries to access the router s Telnet management interface from a Public interface and is not permitted since Remote Management is disabled This log message is generated whenever the user tries to access the router s HTTP management interface from a Public interface and is not permitted since Remote Management is disabled 1 Received NTP Date and Time 2 EN IP up 3 WAN Ethernet WAN1 activated at 100000 Kbps 4 Device Restarted System Log Messages This log message is generated whenever NTP receives Date and time from the server This log message is generated whenever Ethernet WAN comes up This log message is generated when the Ethernet WAN Link is up This log message is generated when the router has been restarted 137 1 WAN Data link activated at lt Rate gt Kbps rx tx 2 WAN Data link deactivated 3 RFC1483 up 4 RFC1483 lt WAN instance gt IP down 5 PPP Channel lt ID gt up Dialout Profile name lt Profile Name gt DSL Log Messages most common This log message is generated when the DSL link comes up This log message is generated when the DSL link goes down This log message is generated when RFC1483 link comes up This
185. ents that specify the conventions and standards for TCP IP networking RIP Routing Information Protocol Protocol responsible for distributing infor mation about available routes and networks from one router to another RJ 11 Four pin connector used for telephones 362 RJ 45 Eight pin connector used for 10BaseT twisted pair Ethernet net works route Path through a network from one node to another A large internet work can have several alternate routes from a source to a destination routing table Table stored in a router or other networking device that records available routes and distances for remote network destinations d SA Encrypt Type SA Encryption Type refers to the symmetric encryption type This encryption algorithm will be used to encrypt each data packet SA Encryption Type values supported include DES and 3DES SA Hash Type SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation Values supported include MD5 SHAT N A will display if NONE is chose for Auth Protocol Security Association From the IPSEC point of view an SA is a data struc ture that describes which transformation is to be applied to a datagram and how The SA specifies The authentication algorithm for AH and ESP The encryption algorithm for ESP The encryption and authentication keys Lifetime of encryption keys The lifetime of the SA Replay prevention sequence number and the replay bit table
186. eral queues are set up automatically on upgrade to Version 7 7 or upon a factory reset 298 CONFIG Commands set queue name queue_name option on off type basic wfq priority funnel Creates a queue named queue_name and assigns a type e basic Basic Queue e wfq Weighted Fair Queue e priority Priority Queue e funnel Funnel Queue Basic Queue set queue name basic queue name option on off set queue name basic queue name type basic Specifies the Basic Queue named basic queue name attributes Basic queues have one input and one output The basic queue is assigned an ID with the following attribute when the queue is full discard By default the following Basic Queues are created e basic qO e basic q1 e basic q2 e basic q3 299 Weighted Fair Queue set queue name wfq option on off set queue name wf_queue_name type wfq set queue name wf_queue_name entry n input input_queue_name set queue name wf_queue_name entry n weight weight set queue name wf queue name entry n share bw on I off Specifies the attributes of the Weighted Fair Queue named wf_queue_name wf queue name name of weighted fair queue A weighted fair queue can contain up to 8 input queues For each input queue the follow ing is configured n entry number for this input queue input queue name name of input queue weight value numeric relative weight of queue share bw if enabled the ban
187. erver you may enter the domain name and IP address associated with the server here If you are receiving DNS information dynamically from your service provider the server addresses must be entered as 0 0 0 0 Domain Name Primary DNS Server Address 0 0 0 0 Secondary DNS Server Address 0 0 0 0 Link DHCP Server Your Gateway can provide network configuration information to computers on your LAN using the Dynamic Host Configuration Protocol DHCP If you already have a DHCP server on your LAN you should turn this service off If you want the Gateway to provide this service select Server from the Server Mode pull down menu then configure the range of IP addresses that you would like the Gateway to hand out to your computers 106 Configure DHCP Server Server Mode Server is Starting IP Address 192 168 1 1 Ending IP Address 192 168 1 253 Lease Period d h m s 00 01 00 00 f Submit You can also specify the length of time the computers can use the configuration informa tion DHCP calls this period the lease time Your Service Provider may for certain services want to provide configuration from its DHCP servers to the computers on your LANs In this case the Gateway will relay the DHCP requests from your computers to a DHCP server in the Service Provider s network Select Relay agent and enter the IP address of the Service Provider s DHCP server in the Server Address field This address is furni
188. es 1 1000000 Hard Seconds 60 1000000 IPSec MTU 100 1500 default Xauth Enable Off On Xauth Username Xauth Password 157 o oux Be sure that you have SafeHarbour VPN enabled SafeHarbour is a keyed feature See Install Key on page 209 for information concern ing installing Netopia Software Feature Keys Check the Enable SafeHarbour IPSec checkbox Checking this box will automatically display the SafeHarbour IPSec Tunnel Entry parameters Enter the initial group of tunnel parameters Refer to your Setup Worksheet and the Parameter Descriptions on page 160 as required Enter the tunnel Name This parameter does not have to match the peer remote VPN device Enter the Peer External IP Address Select the Encryption Protocol from the pull down menu Select the Authentication Protocol from the pull down menu Click Add The Tunnel Details page appears 158 Security Tunnel Details Name my_tunnel Peer Internal Network 0 0 0 0 Peer Internal Netmask 255 255 255 0 NAT Enable Y PAT Address 0 0 0 0 Negotiation Method Aggressive Local ID type IP Address E Local ID Address 0 0 0 0 Remote ID Type IP Address 3 Remote ID Address 0 0 0 0 Pre Shared Key Type ASCII is Pre Shared Key netopial DH Group PFS Enable SA Encrypt Type SA Hash Type Invalid SPI Recovery Soft MBytes Soft Seconds Hard MBytes Hard Seconds IPSec MTU Xauth Enable
189. es links to controlling configuring and monitoring pages Critical configuration and oper ational status is displayed in the center section eo060 Netopia Home Page Home Configure Troubleshoot Security Install Restart Help Home Hardware Netopia Model 3397GP AnnexA Wireless VDSL Ethernet Switch Configure Serial Number 9437188 Troubleshoot Security Software Version 7 7 0r0 BreakWater Firewall ClearSailing Install Product ID 1289 Basic Mode Date amp Time Thu Jun 15 09 55 33 2006 Safe Harbour On WAN Status Data Rate Kbps Downstream 8000 Upstream 800 IP Address 0 0 0 0 Default Gateway 0 0 0 0 Netmask 255 255 255 0 DHCP Client ea DHCP Lease Expires N A NAT WAN Users Unlimited IP Address 192 168 1 254 Netmask 255 255 255 0 Ethernet Status Up DHCP Server On DHCP Leases 0 out of 253 leases in use netopia Home Page Information The Home page s center section contains a summary of the Gateway s configuration set tings and operational status Field Status and or Description Hardware Model number and summary specification Serial Number Unique serial number located on label attached to bottom of unit Software Version Release and build number of running Netopia Operating System 43 Product ID Date amp Time Breakwater Firewall Safe Harbour Status Data Rate Kbps Local Address Peer Address Connection Type NAT WAN Users IP Address Netmask DHCP Server DHCP Leases E
190. es whether you want your Gateway to send LCP echo requests You should turn off LCP echoing if you do not want the Gateway to drop a PPP link to a nonresponsive peer Max Failures Specifies the maximum number of Configure NAK messages the PPP mod ule can send without having sent a Configure ACK message Max Configures Specifies the maximum number of unacknowledged configuration requests that your Gateway will send TI Max Terminates Specifies the maximum number of unacknowledged termination requests that your Gateway will send before terminating the PPP link Restart Timer The number of seconds the Gateway should wait before retransmitting a configuration or termination request Click the Submit button when you are finished Ethernet WAN interface WAN IP Interfaces Ethernet WAN Configure this IP interface Enable Gateway Option _ Other WAN Options PPPoE Configure PPP over Ethernet settings Click the Ethernet WAN link to configure it The WAN IP Interface page appears WAN IP Interface Ethernet WAN Enable Interface Y Obtain IP Address Automatically M Address Mapping NAT Restrictions Other interface Options Advanced Advanced settings for this interface 78 Configure Enable Interface You can disable the interface by unchecking the checkbox However doing so will disable all ability for your LAN users to connect to the WAN using the Gateway Obtain IP Address Automaticall
191. ess 192 168 1 33 end address 192 168 1 63 lease time 01 00 00 00 filterset name filterset name filterset name 192 168 6 100 set dhcp filterset name 0 0 0 0 settopbox settopbox settopbox settopbox Netopia 3000 9450000 dhcp gt gt set dhcp assigned filterset string rule rule rule rule 1 dhcp option 60 1 match str STB 1 match pool 1 absent pool Assigns the filterset named string created above to the DHCP configuration 278 CONFIG Commands DMT Settings DSL Commands set dmt type lite dmt ansi multi adsl2 adsl2 readsl2 adsl2anxm adsl2 anxm Selects the type of Discrete Multitone DMT asynchronous digital subscriber line ADSL protocol to use for the WAN interface The type value also supports the following settings on certain model units adsl2 adsl2 readsl2 adsl2anxm adsl2 anxm cr NOTE Some dmt type settings are now supported for many Annex B 335xN plat forms 2200 Series and 33xxN Series models are supported Currently adsl2anxm and adsl2 anxm are not supported in Annex B set dmt autoConfig off on Enables support for automatic VPI VCI detection and configuration When set to on the default a pre defined list of VPI VCI pairs are searched to find a valid configuration for your ADSL line Entering a value for the VPI or VCI setting will disable this feature set dmt wiringMode auto tip_ring A A1 not suppor
192. estrictions Admin Disabled is PPPoE DHCP Autosensing M ISP Username joesurfer happyinternet com ISP Password eeceesece Connection Type Always On HJ Submit Other Interface Options Advanced Advanced settings for this interface Enable Interface You can disable the interface by unchecking the checkbox However doing so will disable all ability for your LAN users to connect to the WAN using the Gateway Address Mapping NAT Specifies whether you want the Gateway to use network address translation NAT when communicating with remote routers NAT lets you conceal details of your network from remote routers By default address mapping is enabled Restrictions This setting determines the types of traffic the Gateway accepts from the WAN Admin Disabled means that Gateway traffic is accepted but administrative com mands are ignored None means that all traffic is accepted When PPP is enabled Admin Disabled is the default PPPoE DHCP Autosensing If you are using PPPoE checking this checkbox enables automatic sensing of your WAN connection type PPPoE and DHCP If this feature is enabled the gateway attempts to connect using PPPOE first If the Gateway fails to connect after 60 seconds it switches to DHCP As soon as it can connect via DHCP the Gateway chooses and sets DHCP as its default Otherwise after attempting to connect via DHCP for 60 seconds the Gateway switches back to PPPoE The Gateway will continue to sw
193. et to associate with this interface the upper right corner of the page PS Click the Alert icon to go to the validation page where you can save your configuration You can repeat this process for both the WAN and LAN interfaces to associate your filter sets 195 Filler Sat Associslions When you return to the Filter Sets it will displ f g Ethernet 100BT Web page it will display your interface asso ciations Ethernet WAN Telnet Filter Sets Web Telnet 196 Policy based Routing using Filtersets Policy based Routing using Filtersets Netopia Firmware Version 7 7 offers the ability to route IP packets using criteria other than the destination IP address This is called policy based routing You specify the routing criteria and routing information by using IP filtersets to determine the forwarding action of a particular filter You specify a gateway IP address and each packet matching the filter is routed according to that gateway address rather than by means of the global routing table In addition the classifier list in a filter includes the TOS field This allows you to filter on TOS field settings in the IP packet if you want To use the policy based routing feature you Filter Input Rule Entry 1 create a filter that forwards the traffic Forward e Check the Forward checkbox This will dis play the Force Routing options eCheck the Force Route checkbox Source Mask 0 0 0 0 e En
194. etwork TO0 S oooooocooococo tees 242 cHAPTER 6 Command Line Interface 247 OVERVIEW sadn duns ERG URdcRE RE phages ds 248 Starting and Ending a CLI Session 250 LOGGING Ihi ein das tm Ehe CR E een aa 250 Ending a CLI Sessi0N ooocccoooco eee eee 251 Saving SettidgS ooooooococooooo eee 251 Using the CLI Help Facility ooo ooooo oo 251 About SHELL Commands ooocccccccc 200 251 SHELL Prompt i 2 i teee dose ERREUR id 251 SHELL Command Shortcuts 2 000000 cee eee 252 SHELL Commands 000000 eee eee 252 Common Commands ooo 252 WAN Commands 020 00 cee eee 263 About CONFIG Commands 2200000000 265 CONFIG Mode Prompt 000 0c c eee eee eee eee 265 Navigating the CONFIG Hierarchy 00 0 eee eae 265 Entering Commands in CONFIG Mode 0 00 00 266 Guidelines CONFIG Commands 2000000000 267 Displaying Current Gateway SettingS o ooooooo 267 Step Mode A CLI Configuration Technique 0 267 Validating Your Configuration 0 00000 eee eee ee 268 CONFIG Commands icc chs deor huh a 269 Remote ATA Configuration Commands 0 00 eee 269 DSL Commands 000 a cee 272 ATM Settings 2 ee ridad ads 272 Bridging Settings ooooooooooocoooo kaari ada 274 Table of Contents Common Comman
195. ety of features and functionality the example screens shown may not appear exactly the same for your particular Gateway or setup as they appear in this manual The example screens are for illustrative and explanatory purposes and should not be construed to represent your own unique environment 18 CHAPTER 2 Basic Mode Setup Most users will find that the basic Quickstart configuration is all that they ever need to use This section may be all that you ever need to configure and use your Netopia Gateway The following instructions cover installation in Router Mode This section covers lt Important Safety Instructions on page 20 Wichtige Sicherheitshinweise on page 21 German a Setting up the Netopia Gateway on page 22 lt Configuring the Netopia Gateway on page 25 lt Netopia Gateway Status Indicator Lights on page 31 D lt Home Page Basic Mode on page 32 19 Important Safety Instructions POWER SUPPLY INSTALLATION Connect the power supply cord to the power jack on the Netopia Gateway Plug the power supply into an appropriate electrical outlet E CAUTION Depending on the power supply provided with the product either the direct plug in power supply blades power supply cord plug or the appliance coupler serves as the mains power disconnect It is important that the direct plug in power supply socket outlet or appliance coupler be located so it is readily ac
196. fault the WAN ethernet interface is assigned the default priority queue set ethernet ethernet B tx queue pq 302 CONFIG Commands SIP Passthrough set ip sip passthrough on I off Turns Session Initiation Protocol application layer gateway client passthrough on or off The default is on Session Initiation Protocol is a signaling protocol for Internet conferencing telephony presence events notification and instant messaging Static Route Settings A static route identifies a manually configured pathway to a remote network Unlike dynamic routes which are acquired and confirmed periodically from other routers static routes do not time out Consequently static routes are useful when working with PPP since an intermittent PPP link may make maintenance of dynamic routes problematic You can configure as many as 32 static IP routes for a Netopia Gateway Use the following commands to maintain static routes to the Netopia Gateway routing table set ip static routes destination network net_address Specifies the network address for the static route Enter a network address in the net_address argument in dotted decimal format The net_address argument cannot be 0 0 0 0 set ip static routes destination network net_address netmask netmask Specifies the subnet mask for the IP network at the other end of the static route Enter the netmask argument in dotted decimal format The subnet mask associated with the desti natio
197. from O 255 set security pkt filter filterset filterset name in out index protocol value Specifies the protocol value to match packets the type of higher layer Internet protocol the packet is carrying such as TCP or UDP The value for protocol can be from O 255 set security pkt filter filterset filterset name in out index src compare nc nel Itl lel eq gt ge Sets the source compare operator action for the specified filter rule Operator Action nc No compare ne Not equal to It Less than le Less than or equal to eq Equal to ge Greater than or equal to gt Greater than 326 CONFIG Commands set security pkt filter filterset filterset name in out ndex dst compare nc nel It lel eq gt ge Sets the destination compare operator action for the specified filter rule Operator Action nc No compare ne Not equal to lt Less than le Less than or equal to eq Equal to ge Greater than or equal to gt Greater than set security pkt filter filterset filterset name in out index src port value Specifies the source IP port to match packets the port on the sending host that originated the packet if the underlying protocol is TCP or UDP set security pkt filter filterset filterset name in out index dst port value Specifies the destination IP port to match packets the port on the receiving host that the packet is destined for if the underlying protocol is
198. g gt gt ClearSailing SilentRunning LANdLocked Session Type Port State 20 ftp data Enabled Enabled Disabled 21 ftp control Enabled Enabled Disabled 23 telnet external Enabled Enabled Disabled 23 telnet Netopia server Enabled Enabled Enabled 80 http external Enabled Enabled Disabled 80 http Netopia server Enabled Enabled Enabled 67 DHCP client Not Applicable Not Applicable Not Applicable 68 DHCP server Enabled Enabled Enabled 161 snmp Enabled Enabled Enabled ping ICMP Enabled Enabled WAN Disabled LAN Local Address Only 152 Security er NOTE The Gateway s WAN DHCP client port in SilentRunning mode is enabled This feature allows end users to continue using DHCP served IP addresses from their Service Providers while having no identifiable presence on the Internet 153 Link IPSec When you click on the PSec link the IPSec configuration screen appears Your Gateway can support two mechanisms for IPSec tunnels e IPSec PassThrough supports Virtual Private Network VPN clients running on LAN connected computers Normally this feature is enabled IPSec PassThrough Enable IPSec PassThrough M You can disable it if your LAN side VPN client includes its own NAT interoperability option Uncheck the Enable IPSec Passthrough checkbox e SafeHarbour VPN IPSec is a keyed feature that you mus
199. g container and powered the unit up use any LAN attached PC or workstation running a common web browser applica tion to configure and monitor the Gateway Diagnostics In addition to the Gateway s visual LED indicator lights you can run an extensive set of diagnostic tools from your Web browser Two of the facilities are Automated Multi Layer Test The Run Diagnostics link initiates a sequence of tests They examine the entire functionality of the Gateway from the physical connections to the data traffic Network Test Tools Three test tools to determine network reachability are available Ping tests the reachability of a particular network destination by sending an ICMP echo request and waiting for a reply NSLookup converts a domain name to its IP address and vice versa 380 Security TraceRoute displays the path to a destination by showing the number of hops and the router addresses of these hops The system log also provides diagnostic information Se NOTE Your Service Provider may request information that you acquire from these var ious diagnostic tools Individual tests may be performed at the command line See Command Line Interface on page 247 Security Remote Access Control You can determine whether or not an administrator or other authorized person has access to configuring your Gateway This access can be turned on or off in the Web interface Password Prot
200. glevel command without the optional level argument the command line interface displays the current log level setting You can enter the 1oglevel command with the level argument to specify the types of diagnostic messages you want to record All messages with a level number equal to or 254 SHELL Commands greater than the level you specify are recorded For example if you specify loglevel 3 the diagnostic log will retain high level informational messages level 3 warnings level 4 and failure messages level 5 Use the following values for the level argument e 1 or low Low level informational messages or greater includes trivial status mes sages e 2 or medium Medium level informational messages or greater includes status mes sages that can help monitor network traffic e 3 or high High level informational messages or greater includes status messages that may be significant but do not constitute errors e 4orwarning Warnings or greater includes recoverable error conditions and useful operator information e 5orfailure Failures includes messages describing error conditions that may not be recoverable netstat i Displays the IP interfaces for your Netopia Gateway netstat r Displays the IP routes stored in your Netopia Gateway nslookup hostname ip_address Performs a domain name system lookup for a specified host e The hostname argument is the name of the host for which you want
201. gressive Mode Main mode requires 3 two way message exchanges while Aggressive mode only requires 3 total message exchanges null modem Cable or connection device used to connect two computing devices directly rather than over a network E pass packet Logical grouping of information that includes a header and data Compare frame datagram PAP Password Authentication Protocol Security protocol within the PPP pro tocol suite that prevents unauthorized access to network services See RFC 1334 for PAP specifications Compare CHAP parity Method of checking the integrity of each character received over a communication channel Peer External IP Address The Peer External IP Address is the public or routable IP address of the remote gateway or VPN server you are establish ing the tunnel with Peer Internal IP Network The Peer Internal IP Network is the private or Local Area Network LAN address of the remote gateway or VPN Server you are communicating with Peer Internal IP Netmask The Peer Internal IP Netmask is the subnet mask of the Peer Internal IP Network PFS Enable Enable Perfect Forward Secrecy PFS forces a DH negotiation during Phase II of IKE IPSec SA exchange You can disable this or select a DH group 1 2 or 5 PFS is a security principle that ensures that any single key being compromised will permit access to only data protected by that sin gle key In PFS the key used to protect transmission of data must not b
202. h NAT On the only externally visible IP address on your network is the Gateway s WAN IP Supplied by your Service Pro vider All traffic intended for that LAN Web server must be directed to that IP address Application 2 You want one of your LAN stations to act as the central repository for all email for all of the LAN users Application 3 One of your LAN stations is specially configured for game applications You want this specific LAN station to be dedicated to games A sample table to plan the desired pinholes is Web TCP my webserver 192 168 1 1 Email TCP my mailserver 192 168 1 2 Games UDP my games 192 168 1 3 For this example Internet protocols TCP and UDP must be passed through the NAT security feature and the Gateway s embedded Web HTTP port must be re assigned by configuring new settings on the Internal Servers page ce TIPS for making Pinhole Entries 1 If the port forwarding feature is required for Web services ensure that the embedded Web server s port number is re assigned PRIOR to any Pinhole data entry 2 Enter data for one Pinhole at a time 3 Use a unique name for each Pinhole If you choose a duplicate name it will overwrite the previous information without warning 91 A diagram of this LAN example is 192 168 1 1 WAN Ethernet Interface 210 219 41 20 LAN Ethernet Interface my mailserver 192 168 1 2
203. happens on match Incoming packet has the source address of 200 1 1 104 This rule does match and this packet will not be forwarded Example 5 Filter Rule 200 1 1 96 Source IP Network Address 255 255 255 255 Source IP Mask Forward No What happens on match Incoming packet has the source address of 200 1 1 96 This rule does match and this packet will not be forwarded This rule masks off a single IP address 177 Link Packet Filter When you click the Packet Filter link the Filter Sets screen appears Filter Sets No Filter Sets have been defined Fadd Security should be a high priority for anyone administering a network connected to the Internet Using packet filters to control network communications can greatly improve your network s security The Packet Filter engine allows creation of a maximum of eight Filter Sets Each Filter Set can consist of many rules There can be a maximum of 32 filter rules in the system CE WARNING Before attempting to configure filters and filter sets please read and under stand this entire section thoroughly Netopia Gateways incorporating NAT have advanced security features built in Improperly adding filters and filter sets increases the possibility of loss of communication with the Gateway and the Internet Never attempt to configure filters unless you are local to the Gate way Although using filter sets can
204. he client to a match ing SSID the client can connect immediately if WEP is not enabled If WEP is enabled then the client must also have WEP enabled and a matching WEP key Wireless client cards from different manufacturers and different operating systems accom plish connecting to a wireless LAN and enabling WEP in a variety of ways Consult the doc umentation for your particular wireless card and or operating system q NOTE While clients may also have a passphrase feature these are vendor specific and may not necessarily create the same keys You can passphrase generate a set of keys on one and manually enter them on the other to get around this Block Wireless Bridging Check the checkbox to block wireless clients from communicat ing with other wireless clients on the LAN side of the Gateway 62 Configure WEP Manual allows you to enter your own encryption keys manually This is a difficult process but only needs to be done once Avoid the temptation to enter all the same characters 802 11 Wireless Settings Enable Wireless v Wireless ID SSID 4414 0400 Operating Mode Normal 802 11b g Default Channel 6 Bl AutoChannel Setting OFF Use default HJ Enable Closed n System Mode Block Wireless Bridging Privacy WEP Manual 8 2 ryption Key Size 40 64 bit 10 characters E Encryption Key 1 abcdefabcd pem Key Size 45164 bit 10 characters i Encryption Key 2 efabc
205. he tunnel is ter minated hardware handshake Method of flow control using two control lines usu ally Request to Send RTS and Clear to Send CTS header The portion of a packet preceding the actual data containing source and destination addresses and error checking fields HMAC Hash based Message Authentication Code hop A unit for measuring the number of routers a packet has passed through when traveling from one network to another 357 hop count Distance measured in the number of routers to be traversed from a local router to a remote network See metric hub Another name for a repeater The hub is a critical network element that connects everything to one centralized point A hub is simply a box with mul tiple ports for network connections Each device on the network is attached to the hub via an Ethernet cable IGMP Internet Group Management Protocol allows a router to determine which host groups have members on a given network segment IKE Internet Key Exchange protocol provides automated key management and is a preferred alternative to manual key management as it provides bet ter security Manual key management is practical in a small static environ ment of two or three sites Exchanging the key is done through manual means Because IKE provides automated key exchange it is good for larger more dynamic environments INSPECTION The best option for Internet communications security is to have an SMLI
206. her or not they are currently online show ip routes Displays the IP routes stored in your Netopia Gateway show ip state insp Displays whether stateful inspection is enabled on an interface or not exposed addresses and blocked packet statistics because of stateful inspection show ipmap Displays IPMap table NAT show log Displays blocks of information from the Netopia Gateway diagnostic log To see the entire log you can repeat the show log command or you can enter Show log all show memory all Displays memory usage information for your Netopia Gateway If you include the optional all argument your Netopia Gateway will display a more detailed set of memory statistics show pppoe Displays status information for each PPPoE socket such as the socket state service names and host ID values 261 show security log Displays blocks of information from the Netopia Gateway security log show status Displays the current status of a Netopia Gateway the device s hardware and software revi sion levels a summary of errors encountered and the length of time the Netopia Gateway has been running since it was last restarted Identical to the status command show summary Displays a summary of WAN LAN and Gateway information show wireless all Shows wireless status and statistics show wireless clients MAC_address Displays details on connected clients or more details on a particular client
207. holes link Click the Add button Add the next Pinhole Type the specific data for the second Pinhole Pinhole Entry Pinhole Name my mailserver f Protocol TCP External Port Start 25 External Port End 25 Internal IP Address 192 168 1 2 Internal Port 25 f Submit Add or Edit more Pinholes Configure 7 Click on the Add or Edit more Pinholes link Click the Add button Add the next Pinhole Type the specific data for the third Pinhole Pinhole Name my games Protocol UDP External Port Start 1100 External Port End 1200 Internal IP Address 192 168 1 3 Internal Port 1100 f Submit Add or Edit more Pinholes er NOTE Note the following parameters for the my games Pinhole 1 The Protocol ID is UDP 2 The external port is specified as a range 3 The Internal port is specified as the lower range entry 8 Click on the Add or Edit more Pinholes link Review your entries to be sure they are correct To create a new pinhole entry press the Add button To edit or delete a pinhole entry select the e nd press the Edit or Delete button Name my webserver Protocol TCP InsidelPAddr 192 168 1 1 Name my mailserver Protocol TCP InsidelPAddr 192 168 1 2 Name my games Protocol UDP InsidelPAddr 192 168 1 3 f Add Edit Delete T 9 Click the A ert icon 95 10 Click the Save and Restart link to complete the entire Pinhole creation task and ensure
208. i dues is 49 How to Use the Quickstart Page ocoooococccococo ooo 49 Setup Your Gateway using a PPP Connection 49 AN a EL Rr utu Eri udin Le ud S ae Er eS CIE 51 Wireless loenpxpgecbe RE RERO SP a 56 Mc TP 57 Advanced 1er a debere RR PP E A x 60 About Closed System Mode 0 00 e eee eee 62 WPA Version Allowed 0000 cee eee eee 64 Multiple SSIDS 24 0506 scene tien A eee ee 65 WiFi Multimedia cocos orita ead boas ee ede tae eee ee 67 Wireless MAC Authorization llle 69 Use RADIUS Server ooiocooranrc n ann 71 WAN ocio ia id en aw ond Rr dake bee oh dede 73 PPP over Ethernet interface llle 73 Advanced es irrita ii deh ede uns 76 Ethernet WAN interface ooococccccooorco eee 78 WAN Ethernet and VDSL GatewayS o ocoo ooooo o 81 ADSL Gateways cori 60 05 eee eee eee ee eee 82 AVANCE ergere iw eU Wiad weds s ae e RN E ear 87 Table of Contents IP Static Routes ooo a a nd es 88 IP Static ARPA Onde Sek hese da 90 Pinholes zoe eee A Ey ies 90 Configure Specific Pinholes 002000eeeeue 90 Planning for Your Pinholes 00220000 ee oo 90 Example A LAN Requiring Three Pinholes 91 Pinhole Configuration Procedure o ooocoocooocooooo 93 IPMaps via rca n Rea und Dawa ub EX Pee a eee 96 Configure the IPMaps Feature 00 00 e eee eee eee 97 FAQs for the IPMaps Feature 0 e eee
209. i e bee or debe p ee ee 200 Using the Security Monitoring Log 200 Timestamp Background ooococccccco eee eee eae 202 Install coronan bea owe te aera dra 203 Install Software o ae 2 teas 204 Updating Your Gateway s Netopia Firmware Version 204 Step 1 Required Files 000000 eee 205 Step 2 Netopia firmware Image File o o o oo 205 Install Key Ji he bte thuc be dale dade ada 209 Use Netopia Software Feature KeyS o oooooooccocooo 209 Obtaining Software Feature Keys 00 0 0 ee 209 Procedure Install a New Feature Key File 209 To check your installed features o o oooooooo 211 Install Certificate 522 see ee eel een 213 CHAPTER 4 Basic Troubleshooting e 215 Status Indicator Lights eee ee 216 LED Function Summary Matrix 225 Factory Reset Switch oooooccoccooo ooo 228 Table of Contents CHAPTER 5 Advanced Troubleshooting 231 Home Page etes thoro Aa ees 232 Expert Modere Libo RODA REY Ep DP thee Endo 234 Systemi Sfat s oseesss neq Eae Rx ER RR Re dc 235 Ports Etli rnet uio ebore R3 RR eR RAE 236 Ponts DSL mitemas eod Ea ec Ed ai 237 IP Interfaces 23 lucis nto Idem ep delo 238 DSL Circuit Configuration 0 0 0 cee eee 239 System Log Entire ccc i sk eer eee ee meg RR e 240 DIagnastiCS evitas el chanted ay hued ia 241 N
210. iagnostic utility to conduct a series of internal checks and loopback tests to verify network connectivity over each interface on your Netopia Gateway The console displays the results of each test as the diagnostic utility runs If one test is dependent on another the diagnostic utility indents its entry in the console window For example the diagnostic utility indents the Check IP connect to Ethernet LAN entry since that test will not run if the Check Ethernet LAN Connect test fails Each test generates one of the following result codes CODE Description PASS The test was successful FAIL The test was unsuccessful SKIPPED The test was skipped because a test on which it depended failed or because the test did not apply to your particular setup or model PENDING The test timed out without producing a result Try running the test again download server_address filename confirm This command installs a file of configuration parameters into the Netopia Gateway from a TFTP Trivial File Transfer Protocol server The TFTP server must be accessible on your Ethernet network You can include one or more of the following arguments with the download command If you omit arguments the console prompts you for this information e The server_address argument identifies the IP address of the TFTP server from which you want to copy the Netopia Gateway configuration file e The filename argument identifies the path and name of the configura
211. ics USB Port Status Link down General Transmit OK Receive OK Tx Errors Rx Errors Tx Octets Rx Octets Ethernet driver statistics 10 100 Ethernet Type 100BASET Port Status Link up General Transmit OK Receive OK Tx Errors 0 Rx Errors 0 Rx CRC Errors 0 Rx Frame Errors 0 Upper Layers Rx No Handler 0 Rx No Message 0 Rx Octets 976327 Rx Unicast Pkts 4159 Rx Multicast Pkts 204 Tx Discards 0 236 Link Ports DSL The DSL port selection shows the state of the DSL line whether it is up or down and how many times the Gateway attempted to train The state should indicate up for a working configuration If it is not check the DSL cable and make sure it is plugged in correctly and not connected to a micro filter Below is an example ADSL Line State Up ADSL Startup Attempts 5 ADSL Modulation DMT Datapump Version 3 22 Downstream Upstream SNR Margin Line Attenuation Errored Seconds Loss of Signal Loss of Frame CRC Errors Data Rate 237 Link IP Interfaces The IP interfaces selection shows the state and configuration information for your IP LAN and WAN interfaces Below is an example IP interfaces Ethernet 100BT up broadcast default rip send vl rip receive vl inet 192 168 1 1 netmask 255 255 255 0 broadcast 192 168 1 255 physical address 00 00 00 00 00 00 mtu 1500 up address mapping broadcast default admin disabled ri
212. ides the wireless net work from the scanning features of wireless client computers Unless both the wireless cli ents and the Gateway share the same SSID in Closed System mode the Gateway s wireless LAN will not appear as an available network when scanned for by wireless enabled 61 computers Members of the Closed System WLAN must log onto the Gateway s wireless network with the identical SSID as that configured in the router Closed System mode is an ideal way to increase wireless security and to prevent casual detection by unwanted neighbors office users or malicious users such as hackers If you do not enable Closed System Mode it is more convenient but potentially less secure for clients to access your WLAN by scanning available access points You must decide based on your own network requirements About Closed System Mode Enabling Closed System Mode on your wireless Gateway provides another level of security since your wireless LAN will no longer appear as an available access point to client PCs that are casually scanning for one Your own wireless network clients however must log into the wireless LAN by using the exact SSID of the Netopia Gateway In addition if you have enabled WEP encryption on the Netopia Gateway your network cli ents must also have WEP encryption enabled and must have the same WEP encryption key as the Netopia Gateway Once the Netopia Gateway is located by a client computer by setting t
213. if the MAC address is added as an argument telnet hostname ip_address port Lets you open a telnet connection to the specified host through your Netopia Gateway e The hostname argument is the name of the device to which you want to connect for example telnet ftp netopia com e The ip address argument is the IP address in dotted decimal notation of the device to which you want to connect e The port argument is the number of t he port over which you want to open a telnet session traceroute ip address hostname Traces the routing path to an IP destination 262 SHELL Commands upload server_address filename confirm Copies the current configuration settings of the Netopia Gateway to a TFTP Trivial File Transfer Protocol server The TFTP server must be accessible on your Ethernet network The server_address argument identifies the IP address of the TFTP server on which you want to store the Netopia Gateway settings The filename argument identifies the path and name of the configuration file on the TFTP server If you include the optional confirm keyword you will not be prompted to confirm whether or not you want to perform the oper ation view config Dumps the Netopia Gateway s configuration just as the view command does in config mode who Displays the names of the current shell and PPP users WAN Commands atmping vccn segment end to end Lets you check the ATM connection reacha
214. ify a rip send key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper operation of MD5 support 291 set ip ip ppp vccn rip receive off v1 v2 1 v1 compat v2 MD5 Specifies whether the Netopia Gateway should use Routing Information Protocol RIP broadcasts to update its routing tables with information received from other routers on the other side of the PPP link If you specify v2 MD5 you must also specify a rip receive key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper oper ation of MD5 support set ip ip ppp vccn igmp null source addr on off Specifies whether you want the Netopia Gateway to identify the source IP address of every IGMP packet transmitted from this interface as 0 0 0 0 when mcast fwd is set to on This complies with the requirements of TR 101 and removes the need for a publicly advertised IP address on the WAN interface set ip ip ppp vccn mcast fwd on off Specifies whether you want the Netopia Gateway interface to act as an IGMP proxy host set ip ip ppp vccn unnumbered on off Specifies whether you want the Netopia Gateway to have its WAN interface unnumbered i e set to O 292 CONFIG Commands Static ARP Settings Your Netopia Gateway maintains a dynamic Address Resolution Protocol ARP table to map IP addresses to Ethernet MAC addresses Your
215. ilter will match on the source address Enter 0 0 0 0 to force the filter to match on all source IP addresses or enter 255 255 255 255 to match the source IP address exclusively Enter the Destination IP Address this filter will match on You can enter a subnet or a host address Enter the Destination Mask for the destination IP address This allows you to further modify the way the filter will match on the destination address Enter 0 0 0 0 to force the filter to match on all destination IP addresses If desired you can enter a TOS and TOS Mask value See Policy based Routing using Filtersets on page 197 for more information Select Protocol from the pull down menu ICMP TCP UDP Any or the number of another IP transport protocol see the table on page 184 If Protocol Type is set to TCP or UDP the settings for port comparison will appear These settings only take effect if the Protocol Type is TCP or UDP 192 Working with IP Filters and Filter Sets 9 From the Source Port Compare pull down menu choose a comparison method for the filter to use on a packet s source port number Then select Source Port and enter the actual source port number to match on see the table on page 182 10 From the Destination Port Compare pull down menu choose a compari son method for the filter to use on a packet s destination port number Then select Destination Port and enter the actual destination port number to
216. in UPnP and TR 064 is strictly over the LAN whereas the communication in TR 069 is over the WAN link for some features and over the LAN for others TR 069 allows a remote Auto Config Server ACS to provision and manage the Netopia Gateway TR 069 protects sensitive data on the Gateway by not advertising its presence and by password protection set dslf cpewan option off on set dslf cpewan acs url acs url port number set dslf cCpewan acs user name acs username set dslf cpewan acs user password acs password Turns TR 069 WAN side management services on or off For 3300 Series Gateways the default is off for 2200 Series Gateways the default is on If TR 069 WAN side manage ment services are enabled specifies the auto config server URL and port number A user name and password must also be supplied if TR 069 is enabled The auto config server is specified by URL and port number The format for the ACS URL is as follows http some url com port number or http 123 45 678 910 port number On units that support SSL the format for the ACS URL can also be https some url com port number or https 123 45 678 910 port number 349 350 CHAPTER7 Glossary 10Base T IEEE 802 3 specification for Ethernet that uses unshielded twisted pair UTP wiring with RJ 45 eight conductor plugs at each end Runs at 10 Mbps 100Base T IEEE 802 3 specification for Ethernet that uses unshielded twisted pair
217. ing a response to a scan from a port or series of ports which is the expected behavior according to the IP standard hackers can identify an existing device and gain a potential opening for access to an internet connected device To protect LAN users and their network from these types of attacks BreakWater offers three levels of increasing protection The following tables indicate the state of ports associated with session types both on the WAN side and the LAN side of the Gateway 151 This table shows how inbound traffic is treated Inbound means the traffic is coming from the WAN into the WAN side of the Gateway Gateway WAN Side BreakWater Setting gt gt ClearSailing SilentRunning LANdLocked Session Type Port State ftp data Enabled Disabled Disabled 21 ftp control Enabled Disabled Disabled 23 telnet external Enabled Disabled Disabled 23 telnet Netopia server Enabled Disabled Disabled 80 http external Enabled Disabled Disabled 80 http Netopia server Enabled Disabled Disabled 67 DHCP client Enabled Enabled Disabled 68 DHCP server Not Applicable Not Applicable Not Applicable 161 snmp Enabled Disabled Disabled ping ICMP Enabled Disabled Disabled This table shows how outbound traffic is treated Outbound means the traffic is coming from the LAN side computers into the LAN side of the Gateway Gateway LAN Side BreakWater Settin
218. ing decisions It is important to note that a packet filter does not look into the IP data stream the User Data from above to make filtering decisions Basic protocol types TCP Transmission Control Protocol TCP provides reliable packet delivery and has a retransmission mechanism so packets are not lost RFC 793 is the specification for TCP UDP User Datagram Protocol Unlike TCP UDP does not guarantee reliable sequenced packet delivery If data does not reach its destination UDP does not retransmit the data RFC 768 is the specification for UDP There are many more ports defined in the Assigned Addresses RFC The table that follows shows some of these port assignments 171 Example TCP UDP Ports TCP Port Service UDP Port Service 20 21 FTP 161 SNMP 23 Telnet 69 TFTP 25 SMTP 80 WWW 144 News Firewall design rules There are two basic rules to firewall design e What is not explicitly allowed is denied and e What is not explicitly denied is allowed The first rule is far more secure and is the best approach to firewall design It is far easier and more secure to allow in or out only certain services and deny anything else If the other rule is used you would have to figure out everything that you want to disallow now and in the future Firewall Logic Firewall design is a test of logic and filter rule ordering is critical If a packet is forwarded through a series of filte
219. ion 1 Select the Configure toolbar button then Advanced then the Default Server link Default Server Nat Default Mode Off is 2 From the pull down menu select Default Server The NAT Server IP Address field appears Default Server Nat Default Mode Default Server Hd NAT Server IP Address 0 0 0 0 f Submit 3 Determine the IP address of the LAN computer you have chosen to receive the unexpected or unknown traffic 99 Enter this address in the NAT Server IP Address field 4 Click the Submit button 5 Click the Alert button 6 Click the Save and Restart link to confirm Typical Network Diagram A typical network using the NAT Default Server looks like this m Gateway am LAN STN 3 192 168 1 3 WAN Ethernet Interface 210 219 41 20 LAN Ethernet Interface a LAN STN 2 lt gt 192 168 1 2 WN 1 NAT protected lt e Y N A Embedded NAT Default Web Server Server E 210 219 41 20 NAT Default Server Port 80 default 192 168 1 1 You can also use the LAN side address of the Gateway 192 168 1 x to access the web and telnet server 100 Configure NAT Combination Application Netopia s NAT security feature allows you to con figure a sophisticated LAN layout that uses both the Pinhole and Default Server capabili ties With this topology you configure the embedded administratio
220. ion tests a number of different things at the same time including the DSL line the Ethernet interface and the PPPoE session Checking LAN Interfaces Check Ethernet LAN connect PASS Check IP connect to Ethernet LAN PASS Pinging Gateway PASS Check MAC Bridge connect to Ethernet LAN PASS Checking DSL WAN Interfaces Check DSL Synchronization PASS Check ATM Cell Delineation PASS ATM OAM Segment Ping through vccl WARNING Don t worry your service provider may not support this test ATM OAM End To End Ping through vccl WARNING Don t worry your service provider may not support this test Check Ethernet connect to AAL5 vccl PASS Check PPPOE connect to Ethernet vccl PASS Check PPP connect to PPPOE vccl PASS Check IP connect to PPP vccl PASS Pinging Gateway PASS Checking Miscellaneous Check DNS Query for netopia com SKIPPED Ping DNS Server Primary IP Address SKIPPED TEST DONE The following table summarizes the possible results PASS The test was successful FAIL The test was unsuccessful SKIPPED The test was skipped because a test on which it depended failed or it was not sup ported by the service provider equipment to which it is connected or it does not apply PENDING The test timed out without producing a result Try running the test again WARNING The test was unsuccessful The Service Provider equipment your Gateway connects to may not support this test 241
221. irmware image file Background Firmware upgrade image files are posted periodically on the Netopia website You can download the latest operating system software for your Gateway by accessing the following URL http www netopia com support hardware Be sure to download the correct file for your particular Gateway Different Gateway models have different firmware files Also be sure your ISP supports the version of firmware you want to use When you download your firmware upgrade from the Netopia website be sure to download the latest User Guide PDF files These are also posted on the Netopia website in the Docu mentation Center Confirm Netopia Firmware Image Files The Netopia firmware Image file is specific to the model and the product identification num ber 1 Confirm that you have received the appropriate Netopia Firmware Image file 2 Save the Netopia Firmware image file to a convenient location on your PC Step 2 Netopia firmware Image File Install the Netopia firmware Image To install the Netopia firmware in your Netopia Gateway from the Home Page use the fol lowing steps 1 Open a web connection to your Netopia Gateway from the computer on your LAN 2 Click the Install Software button on the Netopia Gateway Home page The Install Operating System Software window opens 205 3 Enter the filename into the text box by using one of these techniques The Netopia firmware file name begins with
222. itate troubleshooting Security on page 381 Network Address Translation NAT password protection Stateful Inspection firewall and other built in security features prevent unauthorized remote access to your network Pinholes default server and other features permit access to computers on your home network that you can specify 377 Wide Area Network Termination PPPOE PPPOA Point to Point Protocol over Ethernet ATM The PPPoE specification incorporating the PPP and Ethernet standards allows your com puter s to connect to your Service Provider s network through your Ethernet WAN connec tion The Netopia series Gateway supports PPPoE eliminating the need to install PPPoE client software on any LAN computers Service Providers may require the use of PPP authentication protocols such as Challenge Handshake Authentication Protocol CHAP or Password Authentication Protocol PAP CHAP and PAP use a username and password pair to authenticate users with a PPP server A CHAP authentication process works as follows 1 The password is used to scramble a challenge string 2 The password is a shared secret known by both peers 3 The unit sends the scrambled challenge back to the peer PAP a less robust method of authentication sends a username and password to a PPP server to be authenticated PAP s username and password pair are not encrypted and are therefore sent unscrambled Instant On PPP You can c
223. itch back and forth in this manner until it successfully connects 74 Configure ISP Username This is the username used to authenticate your Gateway with the Service Provider s network This value is given to you by your Service Provider ISP Password This is the password used to authenticate your Gateway with the Service Provider s network This value is given to you by your Service Provider Connection Type The pull down menu allows you to choose to have either an uninter rupted connection or an as needed connection Always On This setting provides convenience but it leaves your network perma nently connected to the Internet e Instant On furnishes almost all the benefits of an Always On connection but has additional security benefits Your network cannot be attacked when it is not connected Your network may change address with each connection making it more difficult to attack Timeout only appears if Instant On Connection Type is selected Specifies the time in seconds before disconnect if there is no traffic over the Internet link 75 Advanced If you click the Advanced link the Advanced WAN IP Interface configuration page appears Advanced WAN IP Interface PPP over Ethernet vcc1 Local Address 0 0 0 0 Peer Address 0 0 0 0 RIP Receive Mode Off is v Multicast Forward IGMP Null Source Address LCP Settings Authentication PAP and or CHAP MRU 1492 M
224. legal for your network 8 Click the Save and Restart link This will restart the Netopia Gateway and retain the VLAN configuration er Note To make a set of VLANs non routable the uplink port must be included in at least one VLAN It must then be excluded from any VLANs that are non routable The VLANs that have this excluded will not only be prevented from accessing the Gateway or the Internet they will not obtain an IP address through DHCP on the Gateway If you want to allow them these privileges the uplink option will need to be selected By default if the vcc1 option in this case PPP over Ethernet VCC1 is not added to any VLAN all users will be able to access the Internet unless uplink has been disabled If you add the vcc1 interface to a VLAN only that VLAN will be able to access the Internet while the rest will be restricted 134 Configure Link System The System Name defaults to your Gateway s factory identifier combined with its serial number Some cable oriented Service Providers use the System Name as an important identification and support parameter System Name Netopia 3000 9437188 Log Message Level High HJ Submit The System Name can be 1 255 characters long it can include embedded spaces and special characters The Log Message Level alters the severity at which messages are collected in the Gate way s system log Do not alter this field unless instructed by your Su
225. lick OK to continue or Cancel to return to the previous screen You should carefully consider any configuration changes you want to make and be sure that your service provider supports them Once you click the OK button you will be taken to the Expert Mode Home Page The Expert Mode Home Page is the main access point for configuring and managing the advanced features of your Gateway See Expert Mode on page 41 for information 37 Link Update Firmware Se NOTE This link is not available on the 3342 3352 models since firmware updates must be upgraded via the USB host driver 3342N 3352N models do support this feature Periodically the embedded firmware in your Gateway may be updated to improve the oper ation or add new features Your gateway includes its own onboard installation capability Your service provider may inform you when new firmware is available or you can check for yourself Click the Update Firmware link The Firmware Update Confirmation page appears Firmware Update Confirmation Firmware is what makes your Netopia 3000 run and occasionally it needs to be updated Click Continue to automatically check to see if newer firmware exists download it and install the new firmware If newer firmware is found you will have the option to install or cancel Click Cancel to go back to the previous screen Continue Cancel If you click the Continue button the Gateway
226. ll 229 230 CHAPTER 5 Advanced Troubleshooting Advanced Troubleshooting can be accessed from the Gateway s Web Ul Point your browser to http 192 168 1 254 The main page displays the device status If this does not make the Web Ul appear then do a release and renew in Windows networking to see what the Gateway address really s 231 Home Page The home page displays basic information about the Gateway This includes the ISP User name Connection Status Device Address Remote Gateway Address DNS 1 and DNS 2 If you are not able to connect to the Internet verify the following 6008 Netopia Basic Administration Page Home netopia Netopia 3347NWG Home Page Software Manage My Account Serial Number 9437188 Release 7 6 1r0 Status Details EASBIS RAMO MAMI Warranty Date m dlyyyy 4 26 2006 Expert Mode Status of DSL Update Firmware FOTON AGA Local WAN IP Address 0 0 0 0 Primarypns N nameservers are available Remote Gateway Address 0 0 0 0 Secondary DNS 0 0 0 0 ISP Username joesurfer happyinternet com Ethernet Status Up Wed Apr 26 11 24 24 Date amp Time 2006 Item Description Local WAN IP Address This is the negotiated address of the Gateway s WAN interface This address is usually dynamically assigned Remote Gateway This is the negotiated address of the remote router to which this Gate Address way is connected 232 Item Status of Connection
227. ller RF Exposure Statement NOTE Installation of the wireless models must maintain at least 20 cm between the wireless router and any body part of the user to be in compliance with FCC RF exposure guidelines Electrical Safety Advisory Telephone companies report that electrical surges typically lightning transients are very destructive to customer terminal equipment connected to AC power sources This has been identified as a major nationwide problem Therefore it is advised that this equipment be connected to AC power through the use of a surge arrestor or similar protection device 376 CHAPTER 9 Overview of Major Capabilities The Netopia Gateway offers simplified setup and management features as well as advanced broadband router capabilities The following are some of the main features of the Netopia Gateway Wide Area Network Termination on page 378 The Gateway combines an ADSL modem with an Internet router It translates protocols used on the Internet to protocols used by home personal computers and eliminates the need for special desktop software i e PPPoE Simplified Local Area Network Setup on page 379 Built in DHCP and DNS proxy features minimize or eliminate the need to program any network configuration into your home personal computer Management on page 380 A Web server built into the Netopia Operating System makes setup and maintenance easy using standard browsers Diagnostic tools facil
228. lnet server append the IP address with lt port number gt e g telnet 210 219 41 20 2323 You can also use the LAN side address of the Gateway 192 168 1 x 8100 to access the web server and 192 168 1 x 2323 to access the telnet server The value of O for an inter nal server port will disable that server You can disable Telnet or Web but not both If you disabled both ports you would not be able to reconfigure the unit without pressing the reset button 140 Configure Link Software Hosting Software Hosting allows you to host internet applications when NAT is enabled User PC specifies the machine on which the selected software is hosted You can host different games and software on different PCs Host Games and Services Select a User PC to Host Games and 10 132 250 E Rename a User PC Click Services nimii Here or User PC 10 1 32 250 Games Services Select Games Enabled Games and Services Age of Empires v 1 0 Add software to this User PC Age of Empires The Rise of Rome v 1 0 Age of Wonders Asheron s Call Baldur s Gate Battlefield Communicator CART Precision Racing v 1 0 Close Combat for Windows 1 0 Close Combat Ill The Russian Front v 1 Close Combat A Bridge Too Far v 2 0 Combat Flight Sim 2 WWII Pacific Thr v Combat Flight Sim WWII Europe Series Dark Reign Delta Force Client and Server y Delta Force 2 To select the games or software that you want to host for a spe
229. ls page parameters Xauth Enable Extended Authentication XAuth an extension to the Internet Key Exchange IKE protocol The Xauth extension provides dual authentication for a remote user s Netopia Gateway to establish a VPN authorizing net work access to the user s central office IKE establishes the tunnel and Xauth authenticates the specific remote user s Gateway Since NAT is sup ported over the tunnel the remote user network can have multiple PCs behind the client Gateway accessing the VPN By using XAuth network VPN managers can centrally control remote user authentication Xauth Username Xauth authentication credentials Password 163 Link Stateful Inspection All computer operating systems are vulnerable to attack from outside sources typically at the operating system or Internet Protocol IP layers Stateful Inspection firewalls intercept and analyze incoming data packets to determine whether they should be admitted to your private LAN based on multiple criteria or blocked Stateful inspection improves security by tracking data packets over a period of time examining incoming and outgoing packets Out going packets that request specific types of incoming packets are tracked only those incoming packets constituting a proper response are allowed through the firewall Stateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled You can configure UDP and TCP no acti
230. ly set bridge table timeout 30 6000 Sets the timeout value for bridging table timeout Default 2 30 secs range 30 secs 6000 secs 5 100 mins DHCP Settings As a Dynamic Host Control Protocol DHCP server your Netopia Gateway can assign IP addresses and provide configuration information to other devices on your network dynami cally A device that acquires its IP address and other TCP IP configuration settings from the Netopia Gateway can use the information for a fixed period of time called the DHCP lease Common Commands set dhcp option off server relay agent Enables or disables DHCP services in the Netopia Gateway You must enable DHCP ser vices before you can enter other DHCP settings for the Netopia Gateway 275 If you turn off DHCP services and save the new configuration the Netopia Gateway clears its DHCP settings set dhcp start address p_address If you selected server specifies the first address in the DHCP address range The Neto pia Gateway can reserve a sequence of up to 253 IP addresses within a subnet beginning with the specified address for dynamic assignment set dhcp end address ip address If you selected server specifies the last address in the DHCP address range set dhcp lease time ease time If you selected server specifies the default length for DHCP leases issued by the Neto pia Gateway Enter lease time in dd hh mm ss day hour minute second format
231. mately 2 minutes Restart the Gateway 46 Restart Link Alert Symbol The Alert symbol appears in the upper right corner if you make a database change one in which a change is made to the Gateway s configuration The Alert serves as a reminder that you must Save the changes and Restart the Gateway before the change will take effect You can make many changes on various pages and even leave the browser for up to 5 minutes but if the Gateway is restarted before the changes are applied they will be lost When you click on the Alert symbol the Save Changes page appears Here you can select various options to save or discard these changes figure Save Changes Troubleshoot Security Install Restart Help If more than one Alert is triggered you will need to take action to clear the first Alert before you can see the second Alert Home Configure Save Changes Changes have been made to the Gateway database You must save the changes and restart the Gateway in order for the changes to take effect Save Database ave Apply changes made to the database Save and Restart Apply changes and restart Gateway Check Database Review Review the contents of the database Validate Validate edited database Revert Database Revert Restore to settings before edits Validation passed 47 Help Button Help Context sensitive Help is provided in your Gateway The page shown here is displayed
232. ming cannot be bridged cr NOTE For bridging in the 3341 or any model with a USB port you cannot set the bridge option off or bridge ethernet option off these are on by default because of the USB port Common Commands set bridge sys bridge on off Enables or disables bridging services in the Netopia Gateway You must enable bridging services within the Netopia Gateway before you can enable bridging for a specific inter face set bridge concurrent bridging routing on off Enables or disables Concurrent Bridging Routing set bridge dhcp filterset string Assigns a filterset named string to the bridge configuration 274 CONFIG Commands Se NOTE A filterset can only be configured for the bridge if the system bridge or concur rent bridging routing is enabled set bridge ethernet option on off Enables or disables bridging services for the specified virtual circuit using Ethernet fram ing set bridge dsl vccn option on off Enables or disables bridging services for the specified interface Specified interface must be part of a VLAN if bridge is turned on Only RFC 1483 Bridged encapsulation is sup ported currently e show log command will show that WAN Bridge is enabled when at least one WAN inter face is bridged show ip interfaces and show bridge interfaces commands will show the interfaces that are not in bridged mode and that are in bridged modes respective
233. n network must represent the same network class A B or C or a lower class such as a class C subnet mask for class B network number to be valid 303 set ip static routes destination network net_address interface ip address ppp vccn Specifies the interface through which the static route is accessible set ip static routes destination network net_address gateway address gate_address Specifies the IP address of the Gateway for the static route The default Gateway must be located on a network connected to the Netopia Gateway configured interface set ip static routes destination network net_address metric integer Specifies the metric hop count for the static route The default metric is 1 Enter a num ber from 1 to 15 for the integer argument to indicate the number of routers actual or best guess a packet must traverse to reach the remote network You can enter a metric of 1 to indicate either e The remote network is one router away and the static route is the best way to reach it e The remote network is more than one router away but the static route should not be replaced by a dynamic route even if the dynamic route is more efficient set ip static routes destination network net_address rip advertise SplitHorizon Always Never Specifies whether the gateway should use Routing Information Protocol RIP broadcasts to advertise to other routers on your network and which mode to use The default i
234. n ports as a first task fol lowed by the Pinholes and finally the NAT Default Server When using both NAT pinholes and NAT Default Server the Gateway works with the follow ing rules in sequence to forward traffic from the Internet to the LAN 1 If the packet is a response to an existing connection created by outbound traffic from a LAN PC forward to that station 2 If not check for a match with a pinhole configuration and if one is found forward the packet according to the pinhole rule 3 If there s no pinhole the packet is forwarded to the Default Server IP Passthrough Your Gateway offers an IP passthrough feature The IP passthrough feature allows a single PC on the LAN to have the Gateway s public address assigned to it It also provides PAT NAPT via the same public IP address for all other hosts on the private LAN subnet Using IP passthrough e The public WAN IP is used to provide IP address translation for private LAN computers e The public WAN IP is assigned and reused on a LAN computer e DHCP address serving can automatically serve the WAN IP address to a LAN computer When DHCP is used for addressing the designated passthrough PC the acquired or configured WAN address is passed to DHCP which will dynamically configure a single servable address subnet and reserve the address for the configured MAC address This dynamic subnet configuration is based on the local and remote WAN address and subnet mask If the WA
235. nd attack 11 TCP SYN flood detected 12 Telnet receive DoS attack packets dropped 13 dropped reas sembly timeout 14 dropped illegal size Access related Log Messages This log message is generated whenever a packet traversing the router is dropped because it is fragmented stateful inspection is turned ON on the packet s transmit or receive interface and deny fragment option is enabled This log message is generated whenever a packet traversing the router is dropped because the packet cannot be sent without frag mentation but the do not fragment bit is set This log message is generated whenever a packet traversing the router or destined to the router itself is dropped because no route is found to forward the packet This log message is generated whenever a packet traversing the router or destined to the router itself is dropped because the IP ver sion is not 4 This log message is generated whenever a packet traversing the router or destined to the router itself is dropped because the packet is TCP UDP packet and source IP Address and source port equals the destination IP Address and destination port This log message is generated whenever a SYN packet destined to the router s management interface is dropped because the number of SYN sent and SYN receives exceeds one half the number of allow able connections in the router This log message is generated whenever TCP packets destined to the rou
236. nds of the range of determining final random backoff The value you choose must be higher than cwMin 68 Configure e TXOP Limit Time interval in microseconds that clients may initiate transmissions When Operating Mode is B only default values are used and this field is not config urable Wireless MAC Authorization Wireless MAC Authorization allows you to specify which client PCs are allowed to join the wireless LAN by specific hardware address Once it is enabled only entered MAC addresses that have been set to Allow will be accepted onto the wireless LAN All unlisted addresses will be blocked in addition to the listed addresses with Allow disabled To enable Wireless MAC Authentication click the MAC Authorization link When the Wireless MAC Authentication screen appears check the Enable Wireless MAC Authorization checkbox Wireless MAC Authorization Enable Wireless MAC Authorization Submit The screen expands as follows Wireless MAC Authorization Enable Wireless MAC Authorization sf When MAC Authorization is enabled all wireless clients are blocked until their MAC addresses are added to the Authorized list To add a new Wireless MAC Address press the Add button Authorized Wireless MAC Addresses No wireless MAC entries have been defined 69 Click the Add button The Authorized Wireless MAC Address Entry screen appears Authorized Wireless MAC Address Entry Allow A
237. nect a port on one Ethernet hub to a port on another Ethernet hub You can order an Ethernet crossover cable from Netopia if needed CSU DSU Channel Service Unit Data Service Unit Device responsible for connecting a digital circuit such as a T1 link with a terminal or data com munications device data bits Number of bits used to make up a character datagram Logical grouping of information sent as a network layer unit Compare frame packet DCE Digital Communication Equipment Device that connects the communi cation circuit to the network end node DTE A modem and a CSU DSU are examples of a DCE dedicated line Communication circuit that is used exclusively to connect two network devices Compare dial on demand DES Data Encryption Standard is a 56 bit encryption algorithm developed by the U S National Bureau of Standards now the National Institute of Stan dards and Technology 3DES Triple DES with a 168 bit encryption key is the most accepted vari ant of DES 354 DH Group Diffie Hellman is a public key algorithm used between two sys tems to determine and deliver secret keys used for encryption Groups 1 2 and 5 are supported Also see Diffie Hellman listing DHCP Dynamic Host Configuration Protocol A network configuration proto col that lets a router or other device assign IP addresses and supply other network configuration information to computers on your network dial on demand Communicati
238. ned a password to the Netopia Gateway previously enter your current password in the O d Password field 3 Enter your new password in the New Password field Netopia s rules for a Password are e t can have up to eight alphanumeric characters e t is case sensitive 4 Enter your new password again in the Confirm Password field You confirm the new password to verify that you entered it correctly the first time 5 When you are finished click the Submit button to store your modified configuration in the Netopia unit s memory Password changes are automatically saved and take effect immediately 148 Security Link Firewall Use a Netopia Firewall BreakWater Basic Firewall BreakWater delivers an easily selectable set of pre configured firewall protection levels For simple implementation these settings comprised of three levels are readily available through Netopia s embedded web server interface BreakWater Basic Firewall s three settings are ClearSailing ClearSailing BreakWater s default setting supports both inbound and outbound traffic It is the only basic firewall setting that fully interoperates with all other Netopia software features SilentRunning Using this level of firewall protection allows transmission of outbound traffic on pre con figured TCP UDP ports It disables any attempt for inbound traffic to identify the Gate way This is the Internet equivalent of having an unlisted number LANdLock
239. nfigure menu Setup Your Gateway using a PPP Connection This example screen is the for a PPP Quickstart configuration Your gateway authenti cates with the Service Provider equipment using the ISP Username and Password These values are given to you by your Service Provider Quickstart ISP Username ISP Password f Connect to the Internet 1 Enter your ISP Username and ISP Password 49 2 Click Connect to the Internet A brief message is displayed while the Gateway attempts to establish a connection Home Configure Connecting Please wait Please wait while the device configures itself to access the Internet This may take a few minutes You will be notified automatically when the configuration is complete 3 When the connection succeeds your browser will display your Service Provider s home page If you encounter any problems connecting refer to the chapters Basic Troubleshooting on page 215 or Advanced Troubleshooting on page 231 50 Configure Link LAN LAN IP Interface Ethernet 100BT Enable Interface M IP Address 192 168 1 254 IP Netmask 255 255 255 0 Restrictions None 13 f Submit Advanced Configure advanced IP settings IP Subnets Configure more LAN IP Subnets DHCP Server Configure DHCP server options Wireless Configure Wireless Options Enable Interface Enables all LAN connected computers to share resources and to con
240. nfigured your Netopia Gateway for bridging and it will bridge all traffic across the WAN You will need to make configurations to your machines on your LAN These settings must be made in accordance with your ISP If you ever need to get back into the Netopia Gateway again for management reasons you will need to manually configure your machine to be in the same subnet as the Ethernet interface of the Netopia since DHCP server is not operational in bridge mode 120 Configure Link VLAN When you click the VLAN link the VLANs page appears VLANF Enabled Name Type By Port By Port By Port By Port By Port By Port By Port By Port Edit Clear f Enable Disable Details A Virtual Local Area Network VLAN is a network of computers that behave as if they are connected to the same wire even though they may be physically located on different seg ments of a LAN You set up VLANs by configuring the Gateway software rather than hard ware This makes VLANs very flexible An important advantage of VLANs is that when a computer is physically moved to another location it can stay on the same VLAN without hardware reconfiguration VLANs behave like separate and independent networks Your Gateway supports the following e Global Enable Disable of VLANs e VLANs of Global type e Packet prioritization based on VLAN e Support for VLAN ID O on the Ethernet WAN To configure VLANs check the Enable che
241. ngs 340 Wireless Privacy Settings ooooocoooooooomoo 343 Wireless MAC Address Authorization Settings 345 RADIUS Server Settings llli eee eee 345 VLAN Settings s eine a bee A 346 Example 5 2 eR Ee PROUD Aa dee toledo aed 347 UPnP settings xs beach cR RR pe XO RR 348 DSL Forum settings 2 000 cece eee eee eee 348 TR ET 348 WROG69 io debe Rb eR RA RR dete ed PA eC ehe 349 E AA Dade med ed aD Rad 351 A a na SOO Besora pare beeen S2 E E A a ba di OOO Dais mangeur ekea ss ana RS da a a pna dud OA dd oid da Ada did OOO Fetes AA Reed eee td BOO Mea OT RS Ke copian rro eed abe db pa BOD E e a e g a aaa S DOS Mes ada OOF Noi o aa 300 Pra e rs a aaa 301 dees a aa a Eun a REDE a E Rabe aaa eed a OO Ress est Ree RA Rd A a Rus aaa OZ 10 Table of Contents Oe s id ei ada aeS Vd is BOO Usa ii ia eye BOD Vaea a dira 00 A GOB A as auda ues mente aO CHAPTER 8 Technical Specifications and Safety Information 369 Description 0c ooo 369 DIMENSIONS iria iia ds 369 Communications interfaces 0 000 369 Power requirements o o ooccoccco teas 369 Environment ssa era o a BE ade goes 369 Operating temperature 0 0 cee ee eee 369 Storage temperature 0 eee ee 369 Relative storage humidi
242. nk option off off on on ipsec mgmt1 option off off on Netopia 3000 9437188 vlan gt gt CE Note To make a set of VLANs non routable the uplink port must be included in at least one VLAN and must be excluded from any VLANs that are non routable UPnP settings set upnp option on off PCs using UPnP can retrieve the Gateway s WAN IP address and automatically create NAT port maps This means that applications that support UPnP and are used with a UPnP enabled Netopia Gateway will not need application layer gateway support on the Netopia Gateway to work through NAT The default is on You can disable UPnP if you are not using any UPnP devices or applications DSL Forum settings TR 064 is a LAN side DSL CPE configuration specification and TR 069 is a WAN side DSL CPE Management specification TR 064 DSL Forum LAN Side CPE Configuration TR 064 is an extension of UPnP It defines more services to locally manage the Netopia Gateway While UPnP allows open access to configure the Gateway s features TR 064 requires a password to execute any command that changes the Gateway s configuration set dslf lanmgmt option off on Turns TR 064 LAN side management services on or off The default is on 348 CONFIG Commands TR 069 DSL Forum CPE WAN Management Protocol TR O69 provides services similar to UPnP and TR 064 The communication between the Netopia Gateway and management agent
243. nly available if the address is set to O for the inter face Enables or disables unnumbered IP addressing where an address of O is allowed AND the DHCP client is disabled on the specified interface This setting applies to native IP as well as PPP interfaces to support running an IPoE interface without an address set ip dsl vccn rip send off v1 1 v2 v1 compat v2 MD5 Specifies whether the Netopia Gateway should use Routing Information Protocol RIP broadcasts to advertise its routing tables to other routers RIP Version 2 RIP 2 is an extension of the original Routing Information Protocol RIP 1 that expands the amount of useful information in the RIP packets While RIP 1 and RIP 2 share the same basic algo rithms RIP 2 supports several additional features including inclusion of subnet masks in RIP packets and implementation of multicasting instead of broadcasting which reduces the load on hosts which do not support routing protocols RIP 2 with MD5 authentication is an extension of RIP 2 that increases security by requiring an authentication key when routes are advertised Depending on your network needs you can configure your Netopia Gateway to support RIP 1 RIP 2 or RIP 2MD5 If you specify v2 MD5 you must also specify a rip send key Keys are ASCII strings with a maximum of 31 characters and must match the other router s keys for proper operation of MD5 support set ip dsl vccn rip receive off v11 v2 1 vi compat
244. now how to reach the destination host set ip gateway interface ip address ppp vccn Specifies how the Netopia Gateway should route information to the default Gateway If you select ip address you must enter the IP address of a host on a local or remote network If you specify ppp the Netopia unit uses the default gateway being used by the remote PPP peer IP over PPP Settings Use the following commands to configure settings for routing IP over a virtual PPP interface C NOTE For a DSL platform you must identify the virtual PPP interface vccn a num ber from 1 to 8 289 set ip ip ppp vecn option on I off Enables or disables IP routing through the virtual PPP interface By default IP routing is turned on If you turn off IP routing and save the new configuration the Netopia Gateway clears IP routing settings set ip ip ppp vccn address ip address Assigns an IP address to the virtual PPP interface If you specify an IP address other than 0 0 0 0 your Netopia Gateway will not negotiate its IP address with the remote peer If the remote peer does not accept the IP address specified in the ip address argument as valid the link will not come up The default value for the ip address argument is 0 0 0 0 which indicates that the vir tual PPP interface will use the IP address assigned to it by the remote peer Note that the remote peer must be configured to supply an IP address to your Netopia Gatew
245. nt allows you to choose which of its keys it will use to transmit Therefore you must have an identical key in the same numeric slot on the Gate way 343 For simplicity it is easiest to have both the Gateway and the client transmit with the same key The default is 1 set wireless network id privacy encryption key1 length 40 64bit 128bit 256bit set wireless network id privacy encryption key2 length 40 64bit 128bit 256bit set wireless network id privacy encryption key3 length 40 64bit 128bit 256bit set wireless network id privacy encryption key4 length 40 64bit 128bit 256bit Selects the length of each encryption key 40bit encryption is equivalent to 64bit encryp tion The longer the key the stronger the encryption and the more difficult it is to break the encryption set wireless network id privacy encryption key1 hexadecimal digits set wireless network id privacy encryption key2 hexadecimal digits set wireless network id privacy encryption key3 hexadecimal digits set wireless network id privacy encryption key4 hexadecimal digits The encryption keys Enter keys using hexadecimal digits For 40 64bit encryption you need 10 digits 26 digits for 128bit and 58 digits for 256bit WEP Valid hexadecimal char acters are O 9 a f Example 40bit key 02468ACEO2 Example 128bit key 0123456789ABCDEFO123456789 Example 256bit key 592CA140F0A238B0C61AE162F592CA140F0A238B0C61AE162F21A09C
246. ocol for devices behind it This is a way to make a computer that is physically located on one network appear to be part of a different physical network connected to the same Gateway It allows you to hide a computer with a public IP 32 Configure address on a private network behind your Gateway and still have the computer appear to be on the public network in front of the Gateway e Static Client Address Translation If you check this checkbox this feature allows a statically addressed computer whose IP address falls outside of the LAN subnet s to simply plug in and get online without any manual configuration on either the host or the Netopia Gateway If enabled statically addressed LAN hosts that have an address out side of LAN subnets will be able to communicate via the Router s WAN interface to the Internet Supported static IP address values must fall outside of the Router s LAN sub net s IP Subnets The IP Subnets screen allows you to configure up to seven secondary sub nets and their DHCP ranges by entering IP address subnet mask pairs To edit an IP subnet entry select the entry and press the Edit button IP Subnets IP Address Netmask DHCP Start 0 0 0 E Note You need not use this screen if you have only a single Ethernet IP subnet This screen displays seven rows of editable columns All seven row labels are always visi ble regardless of the number of subnets configured e
247. odem at the other end of the connection converts the analog signal back to a digi tal signal MRU Maximum Receive Unit The maximum packet size in bytes that a network interface will accept MSSID Multiple Service Set IDentifier Unique identifiers of data sent over a wireless connection that act as passwords when wireless devices try to join wireless networks An SSID differentiates one wireless network from another so all access points and all devices attempting to connect to a spe cific network must use the same SSID Netopia Gateways support up to four SSIDs SSIDs are also sometimes referred to as Network Names because they are names that identify wireless networks MTU Maximum Transmission Unit The maximum packet size in bytes that can be sent over a network interface MULTI LAYER The Open System Interconnection OSI model divides net work traffic into seven distinct levels from the Physical hardware layer to the Application software layer Those in between are the Presentation Ses sion Transport Network and Data Link layers Simple first and second gen eration firewall technologies inspect between 1 and 3 layers of the 7 layer model while our SMLI engine inspects layers 2 through 7 NAK Negative acknowledgment See ACK NCP Network Control Protocol 360 Negotiation Method This parameter refers to the method used during the Phase key exchange or IKE process SafeHarbour supports Main or Ag
248. odule port authenti cation command 310 Set preference more command 314 Set preference verbose command 314 set security state insp 322 Set servers command 315 Set servers telnet tcp command 315 Set snmp sysgroup location command 328 Set snmp traps authentifica tion traps ip address command 328 Set system diagnostic level command 330 Set system heartbeat command 331 Set system name command 329 Set system NTP command 332 Set system password command 331 set system syslog 333 Set wireless option command 336 Set wireless user auth option command 345 SHELL Command Shortcuts 252 Commands 251 Prompt 251 SHELL level 265 SHELL mode 251 show config 258 Show ppp 264 Simple Network Management Protocol SNMP 328 SMTP 305 SNMP 109 305 328 SNMP Notify Type settings 329 src port 184 SSL certificates 213 392 Stateful Inspection 164 stateful inspection 261 Static route 303 Step mode 267 Subnet mask 287 subnets multiple 53 Syslog 135 System contact SNMP 328 System diagnostics 330 system idle timeout 330 T Telnet 250 305 Telnet command 262 Telnet traffic 315 TFTP 305 TFTP server 254 Toolbar 45 TOS bit 181 197 TraceRoute 242 381 Trap 328 Trivial File Protocol 254 Truncation 265 U UPnP 115 User name 250 User password 41 147 250 V set atm 272 273 View command 267 Transfer view config 263 VLAN ID 124 VLAN Settings 346 VLANs 121 VPN IPSec Pass Through 385 IPSec T
249. of security keys in the IPSec protocol architecture SafeHarbour supports the standard Internet Key Exchange IKE em LCP Link Control Protocol Protocol responsible for negotiating connection configuration parameters authenticating peers on the link determining whether a link is functioning properly and terminating the link Documented in RFC 1331 loopback test Diagnostic procedure in which data is sent from a devices s output channel and directed back to its input channel so that what was sent can be compared to what was received magic number Random number generated by a router and included in packets it sends to other routers If the router receives a packet with the same magic number it is using the router sends and receives packets with new random numbers to determine if it is talking to itself MD5 A 128 bit message digest authentication algorithm used to create digital signatures It computes a secure irreversible cryptographically strong hash value for a document Less secure than variant SHA 1 359 metric Distance measured in the number of routers a packet must traverse that a packet must travel to go from a router to a remote network A route with a low metric is considered more efficient and therefore prefera ble to a route with a high metric See hop count modem Modulator demodulator Device used to convert a digital signal to an analog signal for transmission over standard telephone lines A m
250. of the Ethernet ports may cause a hazard or damage to the telecommunication network or facility or persons with consequential liability for substantial compensation Caution m The direct plug in power supply serves as the main power disconnect locate the direct plug in power supply near the product for easy access m For use only with CSA Certified Class 2 power supply rated 12VDC Telecommunication installation cautions W Never install telephone wiring during a lightning storm W Never install telephone jacks in wet locations unless the jack is specifically designed for wet locations m Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface W Usecaution when installing or modifying telephone lines W Avoid using a telephone other than a cordless type during an electrical storm There may be a remote risk of electric shock from lightning m Donotuse the telephone to report a gas leak in the vicinity of the leak 374 47 CFR Part 68 Information 47 CFR Part 68 Information FCC Requirements 1 The Federal Communications Commission FCC has established Rules which permit this device to be directly connected to the telephone network Standardized jacks are used for these connections This equipment should not be used on party lines or coin phones 2 If this device is malfunctioning it may also be causing harm to the telephone network this
251. of the web page It will remain until all of your changes are entered and validated You need not imme diately restart the Gateway until your filter set is complete See Associating a Filter Set with an Interface on page 194 Adding filters to a filter set There are two kinds of filters you can add to a filter set input and output Input filters check packets received from the Internet destined for your network Output filters check packets transmitted from your network to the Internet 189 packet O input filter packet output filter WAN 4 LAN The Netopia Router Packets in Netopia Firmware Version 7 7 pass through an input filter if they originate from the WAN and through an output filter if they re being sent out to the WAN The process for adding input and output filters is exactly the same The main difference between the two involves their reference to source and destination From the perspective of an input filter your local network is the destination of the packets it checks and the remote network is their source From the perspective of an output filter your local network is the source of the packets and the remote network is their destination Type of filter Source means Destination means Input filter The remote network The local network Output filter The local network The remote network To add a filter select the Filter Set Name to which y
252. oft Seconds value The value can be configured between 60 and 1 000 000 seconds This param eter does not need to match the peer gateway Setting the Hard MBytes parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Hard MByte value The value can be configured between 1 and 1 000 000 MB and refers to data traffic passed This parameter does not need to match the peer gate way Setting the Hard Seconds parameter forces the renegotiation of the IPSec Security Associations SAs at the configured Hard Seconds value The value can be configured between 60 and 1 000 000 seconds This parame ter does not need to match the peer gateway Some ISPs require a setting of e g 1492 or other value The default 1500 is the most common and you usually don t need to change this unless otherwise instructed Accepted values are from 100 1500 This is the starting value that is used for the MTU when the IPSec tunnel is installed It specifies the maximum IP packet length for the encapsulated AH or ESP packets sent by the router The MTU used on the IPSec connec tion will be automatically adjusted based on the MTU value in any received ICMP can t fragment error messages that correspond to IPSec traffic initi ated from the router Normally the MTU only requires manual configuration if the ICMP error messages are blocked or otherwise not received by the router 162 Security Table 3 IPSec Tunnel Detai
253. on circuit opened over standard telephone lines when a network connection is needed Diffie Hellman A group of key agreement algorithms that let two computers compute a key independently without exchanging the actual key It can gen erate an unbiased secret key over an insecure medium diffserv Differentiated Services A method for controlling Quality of Service QoS queue priority settings It allows a Gateway to make Quality of Service QoS decisions about what path Internet traffic such as Voice over IP VoIP should travel across your network domain name Name identifying an organization on the Internet Domain names consists of sets of characters separated by periods dots The last set of characters identifies the type of organization GOV COM EDU or geographical location US SE domain name server Network computer that matches host names to IP addresses in response to Domain Name System DNS requests Domain Name System DNS Standard method of identifying computers by name rather than by numeric IP address DSL Digital Subscriber Line Modems on either end of a single twisted pair wire that delivers ISDN Basic Rate Access DTE Data Terminal Equipment Network node that passes information to a DCE modem for transmission A computer or router communicating through a modem is an example of a DTE device DTR Data Terminal Ready Circuit activated to indicate to a modem or other DCE that the computer or o
254. on real time traffic such as IP data traffic This class yields a fair amount of Cell Delay Variation CDV b VBR real time VBR rt Typical applications are real time traffic such as compressed voice over IP and video conferencing This class transmits cells with a more tightly bounded Cell Delay Variation The applications follow CBR 85 ATM Traffic Shaping Service Peak Cell Sustained Maximum Class Rate Cell Rate Burst Size VBR 0 vcc 1 CE Note The difference between VBR rt and VBR nrt is the tolerated Cell Delay Varia tion range and the provisioned Maximum Burst Size Class UBR CBR VBR PCR SCR MBS Transmit Priority Comments X N A N A Low PCR is a cap X N A N A High PCR is a guaranteed rate X X X High PCR SCR SCR is a guaranteed rate PCR is a cap 86 Configure Link Advanced Selected Advanced options are discussed in the pages that follow Many are self explana tory or are dictated by your service provider The following are links under Configure gt Advanced Network Configuration IP Static Routes Build IP static route table IP Static ARP Build IP static ARP table NAT Pinholes Set up pinholes through NAT IPMaps Setup NAT one to one IP address mappings Default Server Setup NAT default server options Services Differentiated Services Set up Differentiated Service options DNS Set up DNS options DHCP Server Set up DHCP server and relay agent options RA
255. onds after which a UDP session will be ter minated if there is no traffic on the session e TCP no activity time out The time in seconds after which an TCP session will be ter minated if there is no traffic on the session e Exposed Addresses The hosts specified in Exposed Addresses will be allowed to receive inbound traffic even if there is no corresponding outbound traffic This is active only if NAT is disabled on a WAN interface e Stateful Inspection Options Enable and configure stateful inspection on a WAN inter face Exposed Addresses You can specify the IP addresses you want to expose by clicking the Exposed addresses link Exposed Addreses No exposed address entries have been defined Add 165 Add Edit or delete exposed addresses options are active only if NAT is disabled on a WAN interface The hosts specified in exposed addresses will be allowed to receive inbound traf fic even if there is no corresponding outbound traffic Exposed Address Entry 1 Start Address 0 0 0 0 End Address 0 0 0 0 Protocol Any Submit e Start Address Start IP Address of the exposed host range e End Address End IP Address of the exposed host range e Protocol Select the Protocol of the traffic to be allowed to the host range from the pull down menu Options are Any TCP UDP or TCP UDP Exposed Address Entry 1 Start Address 192 168 1 10 End Address 192 168 1 12 Protocol Tcp Udp HJ
256. onfigure your Gateway for one of two types of Internet connections Always On Instant On These selections provide either an uninterrupted Internet connection or an as needed con nection While an Always On connection is convenient it does leave your network permanently con nected to the Internet and therefore potentially vulnerable to attacks Netopia s Instant On technology furnishes almost all the benefits of an Always On connec tion while providing two additional security benefits Your network cannot be attacked when it is not connected 378 Simplified Local Area Network Setup Your network may change address with each connection making it more difficult to attack When you configure Instant On access you can also configure an idle time out value Your Gateway monitors traffic over the Internet link and when there has been no traffic for the configured number of seconds it disconnects the link When new traffic that is destined for the Internet arrives at the Gateway the Gateway will instantly re establish the link Your service provider may be using a system that assigns the Internet address of your Gateway out of a pool of many possible Internet addresses The address assigned varies with each connection attempt which makes your network a moving target for any attacker Simplified Local Area Network Setup DHCP Dynamic Host Configuration Protocol Server DHCP Server functionality enables the Gateway to
257. onnect all users If you logon as Admin you can disconnect any or all users If you logon as User you can only disconnect yourself 257 restart seconds Restarts your Netopia Gateway If you include the optional seconds argument your Neto pia Gateway will restart when the specified number of seconds have elapsed You must enter the complete restart command to initiate a restart show all info Displays all settings currently configured in the Netopia Gateway show bridge interfaces Displays bridge interfaces maintained by the Netopia Gateway show bridge table Displays the bridging table maintained by the Netopia Gateway show config Dumps the Netopia Gateway s configuration script just as the script command does in config mode show crash Displays the most recent crash information if any for your Netopia Gateway show dhcp agent Displays DHCP relay agent leases show dhcp server leases Displays the DHCP leases stored in RAM by your Netopia Gateway show diffserv Displays the Differentiated Services and QoS values configured in the Netopia Gateway 258 SHELL Commands show enet all Displays Ethernet interface statistics maintained by the Netopia Gateway Beginning with Firmware Version 7 7 supports display of individual LAN switch port statistics as well as WAN Ethernet statistics where applicable Example show enet status all 10 100 Ethernet 1 Port Statu
258. oolbar button The Confirmation screen appears 210 Install Restart Gateway Restarting the Gateway is needed to enable Changes to your Gateway database configuration New feature keys Operating System Software Upgrades When you restart All users will be disconnected You will be returned to the Home page The Gateway will not respond to your web requests This inactivity may last for approximately 2 minutes Restart the Gateway e Click the Restart the Gateway link to confirm To check your installed features 7 Click the Install toolbar button 8 Click the ist of features link 211 The System Status page appears with the information from the features link displayed below You can check that the feature you just installed is enabled Select an option from the table below All Status Overview Features Memory EX W Ethernet DSL Wireless QE interfaces Routes ARP LAN Discovery Statistics Circuit Configuration Entire Page by Page Reset 713 DHCP Client DHCP Server PPPoE Wireless Clients Available features Expiration Security Monitoring ATM VCCs PPPoE Sessions Concurrent WAN Users Basic Firewall VPN Enterprise Class Upgrade 212 Install Link Install Certificate Secure Sockets Layer SSL is a protocol for transmitting private information over the Inter net SSL uses two keys to encrypt data a public key known to everyone and a private
259. or secret key known only to the recipient of the message Netopia Firmware Version 7 7 uses SSL certificates for TR 069 support SSL certificates are issued by trusted Certification Authorities CAs The CA digitally signs each certificate Each client contains a list of trusted CAs When an SSL handshake between a server and your Gateway occurs the client verifies that the server certificate was issued by a trusted CA If the CA is not trusted a warning will appear Certificates installed in your Gateway and servers to which it connects verify to each other that commu nications between them are encrypted and private Certificates are purchased from an issuing Certificate Authority usually by your corporate IT department or other service provider and provided to users for secure communications You must obtain a certificate file before you can install it 1 To install an SSL certificate click the nsial Certificate link The descriptions below provide information on the links displayed on the left of the screen Install A Installation page for SSL certificate Certificate pag Installation page for software keys These allow additional features to run Install Key on the Gateway A list of features available for the Gateway can be viewed from the System Status page Install Software Installation page for upgrading the operating system software 213 The Install Certificate page appears Install Certific
260. or IKE process SafeHarbour supports Main or Aggressive Mode Main mode requires 3 two way message exchanges while Aggres sive mode only requires 3 total message exchanges If Aggressive mode is selected as the Negotiation Method this option appears Selection options are IP Address Subnet Hostname ASCII If Aggressive mode is selected as the Negotiation Method this field appears This is the local Gateway side IP address or Name Value if Sub net or Hostname are selected as the Local ID Type If Aggressive mode is selected as the Negotiation Method and Subnet as the Local ID Type this field appears This is the local Gateway side sub net mask If Aggressive mode is selected as the Negotiation Method this option appears Selection options are IP Address Subnet Hostname ASCII If Aggressive mode is selected as the Negotiation Method this field appears This is the remote central office side IP address or Name Value if Subnet or Hostname are selected as the Local ID Type If Aggressive mode is selected as the Negotiation Method and Subnet as the Remote ID Type this field appears This is the remote central office side subnet mask The Pre Shared Key Type classifies the Pre Shared Key SafeHarbour sup ports ASCII or HEX types The Pre Shared Key is a parameter used for authenticating each side The value can be ASCII or Hex and a maximum of 64 characters ASCII is case sensitive Diffie Hellman is a publi
261. or user password to a Netopia Gateway does not affect communications through the device set system heartbeat option on off protocol udp tcp port client 1 65535 ip server ip address dns name port server 1 65535 url server server name number 1 1073741823 interval 00 00 00 20 sleep 00 00 30 00 contact email string domain name location string The heartbeat setting is used in conjunction with the configuration server to broadcast con tact and location information about your Gateway You can specify the protocol port IP port and URL server e The interval setting specifies the broadcast update frequency Part of sequence con trol The interval is the spacing between heartbeats in d h m s e The contact email setting is a quote enclosed text string giving an email address for the Gateway s administrator e The location setting is a text string allowing you to specify your geographical or other location such as Secaucus NJ e The number setting is part of the sequence control This is the number of heartbeats to send at each interval before sleeping For example if this is 20 in the above lay 331 out each heartbeat sequence will send out a total 20 heartbeats spaced at 30 second intervals and then sleep for 30 minutes So to have the Gateway send out packets forever this number can be set very high If it is 1440 and the interval is 1 minute say the he
262. ou will add a filter and click the Edit button 190 Working with IP Filters and Filter Sets Filter Set Associations Ethernet 100BT PPP over Ethernet vcc1 Filter Sets 1 Filter Set Name Filter Set 1 The Filter Set page appears Filter Set Filter Set 1 Input Rules No Input Filter Rules have been defined Add Output Rules No Output Filter Rules have been defined Add Note There are two Add buttons in this page one for input filters and one for out put filters In this section you ll learn how to add an input filter to a filter set Adding an output filter works exactly the same way providing you keep the dif ferent source and destination perspectives in mind 1 To add a filter click the Add button under Input Rules The Input Rule Entry page appears 191 Filter Input Rule Entry 1 Forward C Source IP 0 0 0 0 Source Mask 0 0 0 0 Destination IP 0 0 0 0 Destination Mask 0 0 0 0 TOS 0 TOS Mask 0 Protocol Any If you want the filter to forward packets that match its criteria to the desti nation IP address check the Forward checkbox If Forward is unchecked packets matching the filter s criteria will be discarded Enter the Source P address this filter will match on You can enter a subnet or a host address Enter the Source Mask for the source IP address This allows you to further modify the way the f
263. oubleshooting utility to test the Gateway System Status Displays an overall view of the system and its condition Network Tools Includes NSLookup Ping and TraceRoute Diagnostics Runs a multi layer diagnostic test that checks the LAN WAN PPPoE and other connection issues 234 Link System Status In the system status screen there are several utilities that are useful for troubleshooting Select an option from the table below General All Status Overview Features Memory Ports Ethernet DSL Wireless FC Interfaces Routes ARP LAN Discovery Statistics Circuit Configuration ee Entire Page by Page Reset Log DHCP Client DHCP Server PPPoE Wireless Clients Some examples are given in the following pages 235 Link Ports Ethernet The Ethernet port selection shows the traffic sent and received on the Ethernet interface There should be frames and bytes on both the upstream and downstream sides If there are not this could indicate a bad Ethernet cable or no Ethernet connection Below is an example Ethernet Driver Statistics 10 100 Ethernet Type 100BASET Port Status Link up General Transmit OK Receive OK Tx Errors 0 Rx Errors 0 Rx CRC Errors 0 Rx Frame Errors 0 Upper Layers Rx No Handler 0 No Message 0 Octets 975576 Unicast Pkts 4156 Multicast Pkts 203 Tx Discards 0 Tx Octets 2117992 Tx Unicast Pkts 3789 Tx Multicast Pkts 4073 Ethernet driver statist
264. outer via telnet from the private LAN DHCP server is enabled on the LAN by default The product s stateful inspection feature must be enabled in order to examine TCP UDP and ICMP packets destined for the router or the private hosts This can be done by entering the CONFIG interface Type config Type the command to enable stateful inspection set security state insp ip ppp vccl option on Type the command to enable the router to drop fragmented packets set security state insp ip ppp vccl deny fragments on Enabling syslog Type config Type the command to enable syslog set system syslog option on e Set the IP Address of the syslog host set system syslog host nameip lt ip addr gt example set system syslog host nameip 10 3 1 1 Enable change the options you require set system syslog log facility locall set system syslog log violations on set system syslog log accepted on set system syslog log attempts on Set NTP parameters Type config e Set the time zone Default is O or GMT set system ntp time zone zone example set system ntp time zone 8 Set NTP server address if necessary default is 204 152 184 72 set system ntp server address lt ip addr gt example set system ntp server address 204 152 184 73 e Set alternate server address 334 CONFIG Commands set system ntp alt server address lt ip addr gt 5 Type the command to save the configuration e Type save e Exit the configuration interface by
265. oves the need for a publicly advertised IP address on the WAN interface This checkbox is only available if Multicast Forward is checked 80 Configure IP Gateway Enable Gateway Option You can configure the Gateway to send packets to a default gateway if it does not know how to reach the destination host Interface Type If you have PPPoE enabled you can specify that packets destined for unknown hosts will be sent to the gateway being used by the remote PPP peer If you select ip address you must enter the IP address of a host on a local or remote network to receive the traffic Default Gateway The IP Address of the default gateway Other WAN Options PPPoE You can enable or disable PPPoE This link also allows configuration of NAT admin restrictions PPPoE username password and connection type PPP over Ethernet Enable PPPoE vi PPPoE with IPoE Number of Sessions 1 Submit WAN Ethernet and VDSL Gateways To allow for concurrent PPPoE and IPoE support on WAN Ethernet Gateways including VDSL units PPPoE with IPoE is available on the PPPoE configuration page Checking the checkbox will provide this concurrent support When you enable PPPoE with IPoE the additional WAN interface becomes available for configuration 81 WAN IP Interfaces PPP over Ethernet WAN Configure this IP interface Ethernet WAN Configure this IP interface IP Gateway Enable Gateway Option M Interface Type P
266. p send vl rip receive vl PPP over Ethernet vccl inet 0 0 0 0 netmask 0 0 0 0 broadcast 0 0 0 0 physical address 00 00 00 00 00 00 mtu 1500 238 Link DSL Circuit Configuration The DSL Circuit Configuration screen shows the traffic sent and received over the DSL line as well as the trained rate upstream and downstream and the VPI VCI Verify traffic is being sent over the DSL line If not check the cabling and make sure the Gateway is not connected to a micro filter Also verify the correct PVC is listed which should be 0 35 some providers use other values such as 8 35 Check with your provider If not go to the WAN setup and change the VPI VCI to its correct value Below is an example ATM port status Up Rx data rate bps 8000 Tx data rate bps 800 ATM Virtual Circuits vcc Type VPI VCI Encapsulation 1 PVC 8 PPP over Ethernet LLC SNAP encapsulation ATM Circuit Statistics Rx Frames 17092 Frames 25078 Rx Octets a 905876 Octets 1329134 Rx Errors 0 Errors 0 Rx Discards D 0 Discards 0 No Rx Buffers 0 Queue Full 0 239 Link System Log Entire The system log shows the state of the WAN connection as well as the PPPoE session Ver ify that the PPPoE session has been correctly established and there are no failures If there are error messages go to the WAN configuration and verify the settings The follow ing is an example of a successful connection Mess
267. p xposed addr 323 exposed address n protocol tcp udp I both any Sets the protocol for the stateful inspection feature for the exposed address list Accepted values for protocol are tcp udp both or any If protocol is not any you can set port ranges set security state insp xposed addr exposed address n start port 1 65535 set security state insp xposed addr exposed address n end port 1 65535 Packet Filtering Settings Packet Filtering has two parts e Create Edit Delete Filter Sets create edit delete rules to a Filter Set e Associate a created Filter Set with a WAN or LAN interface See Packet Filter on page 178 for more information set security pkt filter filterset filterset name in out index forward on off Creates or edits a filter rule specifying whether packets will be forwarded or not Se NOTE If this is the first rule it will create the filter set called filterset name other wise it will edit the filterset If the index is not consecutive the system will select the next consecutive index If the index does not exist a rule will be created If a rule exists the rule will be edited 324 CONFIG Commands set security pkt filter filterset filterset name in out ndex idle reset on off Turns idle reset on or off for the specified filter rule A match on this rule resets idle time out status and keeps the WAN connection alive The
268. pport representative Link Syslog Parameters You can configure a UNIX compatible syslog client to report a number of subsets of the events entered in the Gateway s WAN Event History Syslog sends log messages to a host that you specify To enable syslog logging click on the Syslog Parameters link Syslog Parameters Syslog Submit Check the Syslog checkbox The screen expands 135 Syslog Parameters Syslog Syslog Host Name IP Address Facility localO Log Violations Log Access Attempts Log Accepted Packets Syslog Enable syslog logging in the system Syslog Host Name IP Address Enter the name or the IP Address of the host that should receive syslog messages Facility From the pull down menu select the Syslog facility to be used by the router when generating syslog messages Options are oca O through local7 Log Violations If you check this checkbox the Gateway will generate messages when ever a packet is discarded because it violates the router s security policy Log Access Attempts If you check this checkbox the Gateway will generate mes sages whenever a packet attempts to access the router or tries to pass through the router This option is disabled by default Log Accepted Packets If you check this checkbox the Gateway will generate mes sages whenever a packet accesses the router or passes through the router This option is disabled by default cr NOTE Syslog n
269. r as soon as possible Also you will be advised of your right to file a complaint with the FCC if you believe it is necessary f The telephone company may make changes in its facilities equipment operations or procedures that could affect the operation of the equipment If this happens the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service g If trouble is experienced with this equipment the Netopia 3300 or 2200 Series router for repair or warranty information please contact Netopia Technical Support 510 597 5400 www netopia com If the equipment is causing harm to the telephone network the telephone company may request that you disconnect the equipment until the problem is resolved h This equipment not intended to be repaired by the end user In case of any problems please refer to the troubleshooting section of the Product User Manual before calling Netopia Technical Support i Connection to party line service is subject to state tariffs Contact the state public utility commission public service commission or corporation commission for information j If your home has specially wired alarm equipment connected to the telephone line ensure the installation of this Netopia 3300 or 2200 Series router does not disable your alarm equipment If you have questions about what will disable alarm equipment consult your telephone company or qualified insta
270. r fragmented packets are allowed to be received or not on the specified inter face set security state insp tcp timeout 30 65535 Sets the stateful inspection TCP timeout interval in seconds 322 CONFIG Commands set security state insp udp timeout 30 65535 Sets the stateful inspection UDP timeout interval in seconds set security state insp dos detect off on Enables or disables the stateful inspection Denial of Service detection feature If set to on the device will monitor packets for Denial of Service DoS attack Offending packets may be discarded if it is determined to be a DoS attack set security state insp xposed addr exposed address n Allows you to add an entry to the specified list or if the list does not exist creates the list for the stateful inspection feature xposed addr settings only apply if NAT is off Example set security state insp xposed addr exposed address 32 32 has been added to the xposed addr list Sets the exposed list address number set security state insp xposed addr exposed address n start ip ip address Sets the exposed list range starting IP address in dotted quad format set security state insp xposed addr exposed address n end ip ip address Sets the exposed list range ending IP address in dotted quad format 32 exposed addresses can be created The range for exposed address numbers are from 1 through 32 set security state ins
271. r rules and then the packet matches a rule the appropriate action is taken The packet will not forward through the remainder of the filter rules For example if you had the following filter set Allow WWW access Allow FTP access Allow SMTP access Deny all other packets 172 Firewall Tutorial and a packet goes through these rules destined for FTP the packet would forward through the first rule WWW go through the second rule FTP and match this rule the packet is allowed through If you had this filter set for example Allow WWW access Allow FTP access Deny FTP access Deny all other packets and a packet goes through these rules destined for FTP the packet would forward through the first filter rule WWW match the second rule FTP and the packet is allowed through Even though the next rule is to deny all FTP traffic the FTP packet will never make it to this rule Implied rules With a given set of filter rules there is an Implied rule that may or may not be shown to the user The implied rule tells the filter set what to do with a packet that does not match any of the filter rules An example of implied rules is as follows Y Y Y N If all filter rules are YES the implied rule is NO N N N Y If all filter rules are NO the implied rule is YES Y N Y N If a mix of YES and NO filters the implied rule is NO 173 Example filter set page This is an example of the
272. re specified Filtering example 1 Returning to our filtering rule example from above See page 181 look at how a rule is translated into a filter Start with the rule then fill in the filter s attributes e The rule you want to implement as a filter is Block all Telnet attempts that originate from the remote host 199 211 211 17 e The host 199 211 211 17 is the source of the Telnet packets you want to block while the destination address is any IP address How these IP addresses are masked deter mines what the final match will be although the mask is not displayed in the table that displays the filter sets you set it when you create the filter In fact since the mask for the destination IP address is 0 0 0 0 the address for Destination IP address could have been anything The mask for Source IP address must be 255 255 255 255 since an exact match is desired 184 Firewall Tutorial e Source IP Address 199 211 211 17 e Source IP address mask 255 255 255 255 e Destination IP Address 0 0 0 0 e Destination IP address mask 0 0 0 0 e Using the tables on page 182 find the destination port and protocol numbers the local Telnet port e Protocol TCP or 6 e Destination Port 23 e The filter should be enabled and instructed to block the Telnet packets containing the source address shown in step 2 e Forward unchecked This four step process is how we produced the following filter from the original rul
273. relay agent options RADIUS Server Setup RADIUS server options SNMP Setup SNMP community trap and system group options IGMP Setup IGMP options UPnP Enable or disable Universal Plug n Play LAN Management TR 064 Enable or disable DSL Forum LAN Side DSL CPE Configuration services Ethernet Bridge Set up ethernet MAC bridge VLAN Setup VLAN Configuration System Configure System parameters Syslog Parameters Setup Syslog Internal Servers Configure internal web and telnet ports Software Hosting Setup Software Hosting Ethernet MAC Override Override or spoof the WAN ethernet address Clear Options Restore the Gateway to its factory configuration Time Zone Time Zone settings You access the RADIUS Server configuration screen from the Advanced Network Configura tion web page by clicking the RADIUS Server link 72 Configure Link WAN When you click the WAN link the WAN IP configuration page appears This page varies depending on the WAN interface of your Netopia Gateway WAN IP Interfaces Your IP interfaces are listed PPP over Ethernet interface WAN IP Interfaces PPP over Ethernet vcc1 Configure this IP interface IP Gateway Enable Gateway Option M Interface Type PPP vccl Hd ATM Setup ATM circuits Click the PPP over Ethernet link to configure it 73 The WAN IP Interface page appears WAN IP Interface PPP over Ethernet vcc1 Enable Interface v Address Mapping NAT M R
274. rently configuring itself You will automatically be forwarded to the next step in the installation sequence when it completes Please wait while your unit configures and tests its DSL settings This may take several minutes The browser then displays the Quickstart web page Quickstart ISP Username ISP Password f Connect to the Internet 3 Enter the username and password supplied by your Internet Service Pro vider Click the Connect to the Internet button Once you enter your username and password here you will no longer need to enter them whenever you access the Internet The Netopia Gateway stores this information and automatically connects you to the Internet The Gateway displays a message while it configures itself 27 4 When the connection succeeds your browser will display a success message Home Configure Connecting Connection Successful Your device has successfully configured itself Please wait while it accesses the internet Once a connection is established your browser is redirected to your service provider s home page or a registration page on the Internet 5 Congratulations Your installation is complete You can now surf to your favorite Web sites by typing an URL in your browser s location box or by selecting one of your favorite Internet bookmarks 28 Configuring the Netopia Gateway Set up the Netopia Pocket Gateway Your Netopia 3342N 3352N Pocket Gatewa
275. resses Secondary DNS is optional and may validly be blank 0 0 0 0 If these are not the correct addresses go to Expert Mode and verify the addresses have not been manually assigned This is the unique serial number of your Gateway if so equipped not available on 3342 3342N 3352 3352N This is the status of your Ethernet connection If you are connecting via Ether net it should be Up This is the status of your USB connection if equipped If you are con necting via USB it should be Up This is the version number of the current embedded software in your Gateway This is the date that your Gateway was installed and enabled 233 Item Description Date amp Time If this is blank you likely lack a network connection or your NTP server information is incorrect If all of the above seem correct then access Expert Mode by clicking the Expert Mode link Button Troubleshoot Expert Mode Expert Mode has advanced troubleshooting tools that are used to pinpoint the exact source of a problem Clicking the Troubleshoot tab displays a page with links to System Status Network Tools and Diagnostics Home Troubleshoot The descriptions below provide information on the links displayed on the left of the screen System Status Access to a variety of Gateway information including statistics and the system log Network Tools Specific tools to test connectivity routes and perform a NS lookup Diagnostics Tr
276. reviously defined flow for editing e protocol Allows you to choose the IP protocol for the stream TCP UDP ICMP or other other is appropriate for setting up flows on protocols with non standard port definitions for example IPSEC or PPTP If you select other an additional field numbered proto col will appear with a range of 0 255 Choose the protocol number from this field e direction Allows you to choose whether to apply the marking and gateway queue behavior for inbound packets outbound packets or to both If the Gateway is used as an edge gateway its more important function is to mark the packets for high priority streams in the outbound direction e start port end port Allows you to specify a range of ports to check for a particular flow if the protocol selection is TCP or UDP inside ip mask If you want packets originating from a certain LAN IP address to be marked enter the IP address and subnet mask here If you leave the address equal to zero this check is ignored for outbound packets The check is always ignored for inbound packets The DiffServe queuing function must be applied ahead of NAT and before NAT re maps the inbound packets all inbound packets are destined for the Gate way s WAN IP address outside ip mask If you want packets destined for and originating from a certain WAN IP address to be marked enter this address and subnet mask here If you leave the address equal to zero the outsi
277. rface The Netopia Gateway operating software includes a command line interface CLI that lets you access your Netopia Gateway over a telnet connection You can use the command line interface to enter and update the unit s configuration settings monitor its performance and restart it This chapter covers the following topics Overview on page 248 Starting and Ending a CLI Session on page 250 Using the CLI Help Facility on page 251 About SHELL Commands on page 251 SHELL Commands on page 252 About CONFIG Commands on page 265 CONFIG Commands on page 269 247 Overview The CLI has two major command modes SHELL and CONFIG Summary tables that list the commands are provided below Details of the entire command set follow in this sec tion SHELL Commands arp atmping clear clear_certificate clear_log configure diagnose download exit help install license log loglevel netstat nslookup ping quit reset restart show start status telnet traceroute to send ARP request to send ATM OAM loopback to erase all stored configuration information to remove an SSL certificate that has been installed to erase all stored log info in flash memory to configure unit s options to run self test to download config file to quit this shell to get more help all or help help to download and program an image into flash to enter an upgrade key to add a featur
278. rmat IP Static ARP Entry IP Address Hardware MAC Address 0 0 0 0 00 00 00 00 00 00 Submit Link Pinholes Pinholes allow you to transparently route selected types of network traffic such as FTP requests or HTTP Web connections to a specific host behind the Gateway Creating a pin hole allows access traffic originating from a remote connection WAN to be sent to the internal computer LAN that is specified in the Pinhole page Pinholes are common for applications like multiplayer online games Refer to software manufacturer application documentation for specific traffic types and port numbers press the Add button No pinhole entries have been defined Add A Configure Specific Pinholes Planning for Your Pinholes Determine if any of the service applications that you want to provide on your LAN stations use TCP or UDP protocols If an application does then you must configure a pinhole to implement port for warding This is accessed from the Advanced gt Pinholes page 90 Configure Example A LAN Requiring Three Pinholes The procedure on the following pages describes how you set up your NAT enabled Netopia Gateway to support three sepa rate applications This requires passing three kinds of specific IP traffic through to your LAN Application 1 You have a Web server located on your LAN behind your Netopia Gateway and would like users on the Internet to have access to it Wit
279. rmine which host groups have members on a given network segment See IGMP Internet Group Management Protocol on page 112 for more information RIP Send Mode Specifies whether the gateway should use Routing Information Proto col RIP broadcasts to advertise its routing tables to other routers on your network You may choose from the following protocols e RIP 1 Routing Information Protocol version 1 RIP 2 RIP Version 2 is an extension of the original Routing Information Protocol RIP 1 that expands the amount of useful information in the RIP packets While RIP 1 and RIP 2 share the same basic algorithms RIP 2 supports several new features including inclusion of subnet masks in RIP packets and implementation of multicasting instead of broadcasting which reduces the load on hosts which do not support routing protocols RIP 1 compatibility Compatible with RIP version 1 RIP 2 with MD5 MD5 authentication is an extension of RIP 2 that increases security by requiring an authentication key when routes are advertised RIP MD5 Key Secret password when using RIP 2 with MD5 e RIP Receive Mode Specifies whether the Gateway should use Routing Information Protocol RIP broadcasts to update its routing tables with information received from other routers on your network The protocol choices are the same as for the RIP send mode e Proxy ARP Specifies whether you want the Gateway to respond when it receives an address resolution prot
280. rred to as a feature key to enable additional capability within the unit Software feature key properties are specific to a unit s serial number they will not be accepted on a platform with another serial number Once installed and the Gateway restarted the new feature s functionality becomes avail able This allows full access to configuration operation maintenance and administration of the new enhancement Obtaining Software Feature Keys Contact Netopia or your Service Provider to acquire a Software Feature Key Procedure Install a New Feature Key File With the appropriate feature keycode use the steps listed below to enable a new function 1 From the Home page click the nsia toolbar button 2 Click Install Keys The Install Key File page appears 3 Enter the feature keycode in the input Text Box Type the full keycode in the Text Box 209 You may be able to extend the features of your Gateway by purchasing an Upgrade Key A list of upgrades is available online at www netopia com To purchase an upgrade you must provide your serial number which is 10095016 Type in the Upgrade Key exactly as given It is case sensitive After the install has completed restart your Gateway to enable the new features 4 Click the Install Key button File Installation Success The file installation was successful You must restart your Gateway in order for the changes to take effect 5 Click the Restart t
281. rs nearby 339 Wireless Multi media WMM Settings Router EDCA Parameters Enhanced Distributed Channel Access govern wireless data from your Gateway to the client Client EDCA Parameters govern wireless data from the client to your Gateway set wireless wmm option off on Enables or disables wireless multi media settings option which allows you to fine tune WiFi Multimedia Quality of Service QoS by transmitting data depending on Diffserv priority set tings These priorities are mapped into four Access Categories AC in increasing order of priority Background BK Best Effort BE Video VI and Voice VO It requires WiFi Multi media capable clients usually a separate feature enabled at the client aifs Arbitration Interframe Spacing the wait time in milliseconds for data frames Valid values are 1 255 e cwmin Minimum Contention Window upper limit in milliseconds of the range for determining initial random backoff The value you choose must be lower than cwmax Valid values are 1 3 7 15 31 63 127 255 511 or 1023 e cwmax Maximum Contention Window upper limit in milliseconds of the range of determining final random backoff The value you choose must be higher than cwmin Valid values are 1 3 7 15 31 63 127 255 511 or 1023 e txoplimit Time interval in microseconds that clients may initiate transmissions Valid values are O 9999 Se NOTE It is not recommended that
282. rt the Netopia Gateway and retain the VLAN configuration 131 Example 2 You want to create three separate VLANs for different purposes that will not be communi cating with one another e A Digital Video Recorder DVR plugged into port 1 e A Server plugged into port 2 e A Switch plugged into port 3 1 In the VLAN Name box enter the name you would like Enable v VLAN Name DVR Type By Port is Admin Restricted Submit For example call it DVR Leave Admin Restricted unchecked 2 Click the Submit button 3 Here you add the Port Interfaces you want associated with the VLAN Port Configuration for VLAN 1 nable Tag Priority JOOODODA ADO ipsec mgmtt 132 Configure For this case check uplink and ethO 1 Click the Submit button Inthe VLAN page select VLAN 2 in the VLANs list and click the Edit but ton Continue to add two more VLANs each with a unique Name Enable v VLAN Name Server Type By Port HJ Admin Restricted One will need uplink and eth0 2 Port Configuration for VLAN 2 nable Tag Priority JOAO JO JAI f Submit 133 the other with uplink and ethO0 3 ipsec mgmtt Port Configuration for VLAN 3 nable Tag Priority submit 7 Once you have finished with the configuration of the VLANs click on the Alert icon in the upper right hand corner This will validate that the settings are
283. rver is only known to Software Hosting It is not used as an identifier in other network functions such as DNS or DHCP Link Ethernet MAC Override Your Gateway comes with its own MAC Media Access Control address also called the Hardware Address a 12 character number unique for each LAN connected device Your Service Provider particularly cable service providers may instruct you to override the default MAC address Ethernet MAC Address Override Enable Override M MAC Address 00 00 00 00 00 00 f Submit Noe If so check the Enable Override checkbox and enter the new MAC address in the field provided 144 Configure Link Clear Options To restore the factory configuration of the Gateway choose Clear Options You may want to upload your configuration to a file before performing this function You can do this using the upload command via the command line interface See the upload command on page 263 Clear Options does not clear feature keys or affect the software image You must restart the Gateway for Clear Options to take effect Clear Options Choosing the Clear Options link below will restore the Gateway s factory configuration You will be returned to the Restart Page because the Gateway must be restarted in order to complete the process Clear Options Link Time Zone When you click the Time Zone link the Time Zone page appears Time Zone Greenwich
284. s Link down Transmit OK Transmit unicastpkts Receive OK Receive unicastpkts Tx Octets Rx Octets 10 100 Ethernet 2 Port Status Link down Transmit OK H Transmit unicastpkts Receive OK E Receive unicastpkts Tx Octets Rx Octets H 10 100 Ethernet 3 Port Status Link up Duplex Full duplex not Speed 100BASE X Transmit OK Transmit unicastpkts Receive OK Receive unicastpkts Tx Octets Rx Octets H O O OOGO O O O O O 0D active 3309 31 5588 1976 31 1976 259 10 100 Ethernet 4 Port Status Link down Transmit OK Transmit unicastpkts Receive OK Receive unicastpkts Tx Octets Rx Octets OOOO show features Displays standard and keyed features installed in the Netopia Gateway show group mgmt Displays the IGMP Snooping Table See IGMP Internet Group Management Protocol on page 112 for detailed explanation show ip arp Displays the Ethernet address resolution table stored in your Netopia Gateway show ip igmp Displays the contents of the IGMP Group Address table and the IGMP Report table main tained by your Netopia Gateway show ip interfaces Displays the IP interfaces for your Netopia Gateway show ip ipsec Displays IPSec Tunnel statistics 260 SHELL Commands show ip firewall Displays firewall statistics show ip lan discovery Displays the LAN Host Discovery Table of hosts on the wired or wireless LAN and whet
285. s Gate way and its clients It is strongly recommended to turn this on as it is the primary way to protect your network and data from intruders Note that 40bit is the same as 64bit and will work with either type of wireless client The default is off A single key is selected see default key for encryption of outbound transmitted packets The WEP enabled client must have the identical key of the same length in the identical slot 1 4 as the wireless Gateway in order to successfully receive and decrypt the packet Similarly the client also has a default key that it uses to encrypt its transmis sions In order for the wireless Gateway to receive the client s data it must likewise have the identical key of the same length in the same slot For simplicity a wireless Gateway and its clients need only enter share and use the first key set wireless network id privacy pre shared key string The Pre Shared Key is a passphrase shared between the Router and the clients and is used to generate dynamically changing keys when WPA PSK is selected or enabled The passphrase can be 8 63 characters It is recommended to use at least 20 characters for best security set wireless network id privacy default keyid 1 4 Specifies which WEP encryption key of 4 the wireless Gateway will use to transmit data The client must have an identical matching key in the same numeric slot in order to suc cessfully decode Note that a clie
286. s SplitHo rizon delete ip static routes destination network net_address Deletes a static route Deleting a static route removes all information associated with that route 304 CONFIG Commands IPMaps Settings set ip maps name lt name gt internal ip lt ip address gt Specifies the name and static ip address of the LAN device to be mapped set ip maps name lt name gt external ip ip address gt Specifies the name and static ip address of the WAN device to be mapped Up to 8 mapped static IP addresses are supported Network Address Translation NAT Default Settings NAT default settings let you specify whether you want your Netopia Gateway to forward NAT traffic to a default server when it doesn t know what else to do with it The NAT default host function is useful in situations where you cannot create a specific NAT pinhole for a traffic stream because you cannot anticipate what port number an application might use For example some network games select arbitrary port numbers when a connection is being opened By identifying your computer or another host on your network as a NAT default server you can specify that NAT traffic that would otherwise be discarded by the Netopia Gateway should be directed to a specific hosts set nat default mode off default server ip passthrough Specifies whether you want your Netopia Gateway to forward unsolicited traffic from the WAN to a default server or an IP passthrough
287. s port number e Not Equal To For the filter to match the packet s port number cannot equal the port number specified in the filter 182 Firewall Tutorial e LessThan For the filter to match the packet s port number must be less than the port number specified in the filter e Less Than or Equal For the filter to match the packet s port number must be less than or equal to the port number specified in the filter e Equal For the filter to match the packet s port number must equal the port number specified in the filter e Greater Than For the filter to match the packet s port number must be greater than the port number specified in the filter e Greater Than or Equal For the filter to match the packet s port number must be greater than or equal to the port number specified in the filter Other filter attributes There are three other attributes to each filter e The filter s order i e priority in the filter set e Whether the filter is currently active e Whether the filter is set to forward packets or to block discard packets Putting the parts together When you display a filter set ts filters are displayed as rows in a table Filter Set Filter Input Rules 1 Fwd No Src IP 199 211 211 17 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Sre Port 23 Dst Port NC 2 Fwd No Src IP 0 0 0 0 Src Mask 0 0 0 0 Dst IP 0 0 0 0 Dst Mask 0 0 0 0 TCP Sre Port NC Dst Port 6000 3 Fwd Y es Src I
288. s set to obtain an IP address via DHCP USB Unlit 3 Make sure the PC has obtained an address in the 192 168 1 x range Active You may have changed the subnet addressing 4 Make sure the PC is configured to access the Internet over a LAN 5 Disable any installed network devices Ethernet HomePNA wireless that are not being used to connect to the 2200 and 3300 series DSL Gateway DSL Launch a browser and try to browse the Internet If the DSL Active light still nlit i Traffic U does not flash then proceed to Advanced Troubleshooting below 226 Status Indicator Lights Make sure your client PC s have their wireless cards correctly installed and configured Unlit Check your client PC s TCP IP settings to make sure they are receiving an IP address from the wireless Router Wireless Link Check the Gateway s log for wireless driver failure messages 227 Factory Reset Switch not supported on some models 3342 3342N 3352 3352N models do not have a reset switch Lose your password This section shows how to reset the Netopia Gateway so that you can access the configuration screens once again NOTE Keep in mind that all of your settings will need to be reconfigured If you don t have a password the only way to access the Netopia Gateway is the following 1 Referring to the following diagram find the round Reset Switch opening 228 Factory Reset Switch 3397G
289. sabled is the default Advanced If you click the Advanced link the Advanced WAN IP Interface configuration page appears ton Protocol RIP ls needed there Ethernet WAN z are IP routers on other segments of RIP Receive Mode Off He your Ethernet network that the Netopia Enable Proxy ARP Gateway needs to recognize Set to Off Netopia Firmware Version 7 7 will accept information from either RIP 1 or RIP 2 routers With Receive RIP Mode Multicast Forward v IGMP Null Source Address f Submit gt set to RIP 1 the Netopia Gateway will LL accept routing information provided by RIP packets from other routers that use the same subnet mask Set to RIP 2 Netopia Firmware Version 7 7 will accept routing information provided by RIP packets from other routers that use different subnet masks From the pull down menu choose Off RIP 1 RIP 2 RIP 1 compatibility or RIP 2 with MD5 Enable Proxy ARP Checking the checkbox will enable the Gateway to respond when it receives an Address Resolution Protocol message for devices behind it Multicast Forward If you check this checkbox this interface acts as an IGMP proxy host and IGMP packets are transmitted and received on this interface on behalf of IGMP hosts on the LAN interface IGMP Null Source Address If you check this checkbox the source IP address of every IGMP packet transmitted from this interface is set to 0 0 0 0 This complies with the requirements of TR 101 and rem
290. sed to connect to your PC in some cases the USB port also serves as the power source Some models contain an 802 11b or 802 11g wireless LAN transmitter Power requirements m 12 VDC input m USB powered models only For Use with Listed I T E Only Environment Operating temperature 0 to 40 C Storage temperature 0 to 70 C 369 Relative storage humidity 20 to 80 noncondensing Software and protocols Software media Software preloaded on internal flash memory field upgrades done via download to internal flash memory via TFTP or web upload does not apply to 3342 3352 Routing TCP IP Internet Protocol Suite RIP WAN support PPPoA PPPoE DHCP static IP address Security PAP CHAP UI password security IPsec SSL certificate Management configuration methods HTTP Web server Telnet SNMP TR 069 DSL Forum CPE WAN Management Protocol Diagnostics Ping event logging routing table displays statistics counters web based management traceroute nslookup and diagnostic commands 370 Agency approvals Agency approvals North America Safety Approvals United States UL 60950 Third Edition m Canada CSA CAN CSA C22 2 No 60950 00 EMC m United States FCC Part 15 Class B m Canada ICES 003 Telecom m United States 47 CFR Part 68 m Canada CS 03 International Safety Approvals W Low Voltage European directive 73 23 m EN60950 Europe EMI Compatibili
291. shed by the Service Provider DHCP Server Server Mode Relay agent i Server IP Address 0 0 0 0 Submit er NOTE The relay agent option only works when NAT is off and the Gateway is in router mode 107 Link RADIUS Server RADIUS servers allow external authentication of users by means of a remote authentica tion database The remote authentication database is maintained by a Remote Authentica tion Dial In User Service RADIUS server In conjunction with Wireless User Authentication you can use a RADIUS server database to authenticate users seeking access to the wire less services as well as the authorized user list maintained locally within the Gateway If you click the RADIUS link the RADIUS Servers screen appears Radius Servers RADIUS Server Addr Name RADIUS Server Secret Alt RADIUS Server Addr Name Alt RADIUS Server Secret Radius Server Port 1812 Submit e RADIUS Server Addr Name The default RADIUS server name or IP address that you want to use RADIUS Server Secret The RADIUS secret key used by this server The shared secret should have the same characteristics as a normal password RADIUS Server Port The port on which the RADIUS server is listening typically the default 1812 Click the Submit button You can also configure alternate RADIUS servers from the Wireless Configuration pages See Use RADIUS Server on page 71 for more information 108 Config
292. sk p mask set security ipsec tunnels name 123 remote id type IP address Subnet Hostname ASCII Specifies the NAT remote ID type for the specified IPsec tunnel when Aggressive Mode is set set security ipsec tunnels name 123 remote id id value Specifies the NAT remote ID value as specified in the remote id type for the specified IPsec tunnel when Aggressive Mode is set re Note If subnet is selected the following two values are used instead set security ipsec tunnels name 123 remote id addr p address set security ipsec tunnels name 123 remote id mask p mask 320 CONFIG Commands Internet Key Exchange IKE Settings The following four IPsec parameters configure the rekeying event set security ipsec tunnels name 123 IKE mode ipsec soft mbytes 1000 1 1000000 set security ipsec tunnels name 123 IKE mode ipsec soft seconds 82800 60 1000000 set security ipsec tunnels name 123 IKE mode ipsec hard mbytes 1200 1 1000000 set security ipsec tunnels name 123 IKE mode ipsec hard seconds 86400 60 1000000 e The soft parameters designate when the system begins to negotiate a new key For example after 82800 seconds 23 hours or 1 Gbyte has been transferred whichever comes first the key will begin to be renegotiated e The hard parameters indicate that the renegotiation must be complete or the tunnel will be disabled For example 86400 seconds 24 hours means
293. ss IDs are Closed System Mode Wireless IDs that will not be shown by a client scan and therefore must be manually configured at the client In addi tion wireless bridging between clients is disabled for all members of these additional net work IDs Click the Submit button After your first entry the Alert icon A appear in the upper right corner of your screen When you are finished adding SSIDs click the Alert icon and Save your changes and restart the Gateway 66 Configure WiFi Multimedia WiFi Multimedia is an advanced feature that allows you to prioritize various types of data travelling over the wireless network Certain types of data that are sensitive to delays such as voice or video must be prioritized ahead of other less delay sensitive types such as email WiFi Multimedia currently implements wireless Quality of Service QOS by transmitting data depending on Diffserv priority settings These priorities are mapped into four Access Categories AC in increasing order of priority e Background BK e Best Effort BE e Video VI and e Voice VO It requires WiFi Multimedia WMM capable clients usually a separate feature enabled at the client network settings and client PC software that makes use of Differentiated Ser vices Diffserv Refer to your operating system instructions for enabling Diffserv QoS When you click the WiFi Multimedia link the WiFi Multimedia page appears WiFi M
294. ssured best effort best effort best effort best effort best effort expedite network control network control network control network control network control network control network control network control 297 Queue Configuration Beginning with Firmware Version 7 7 the queuing characteristics of a 3397 VDSL series Gateway s WAN interface can now be configured for e strict priority queuing as currently e weighted fair queuing e rate limiting funnel er Note The configuration mechanism is designed to be flexible enough to accommo date complex queuing requirements However it may be restricted to the underlying queuing capabilities of the 3397 Gateway Configurations not sup ported by the Gateway will be flagged during configuration verification You configure the WAN outbound queue as follows e create and configure one or more queues which can be a basic queue or a priority queue comprising a group of basic queues a weighted fair queue comprising a group of basic queues or a funnel comprising a group of basic queues e assign a queue instance to the Ethernet WAN interface e map packet attributes to a queue The same queue name can be assigned to multiple interfaces which require identical queue configuration however currently the only interface available for queueing configura tion is ethernet 1 To help you configure queues and to maintain compatibility with previous firmware releases sev
295. stained Maximum Class Rate Cell Rate Burst Size 1 Y UBR 0 CBR VBR You can choose UBR Unspecified Bit Rate CBR Constant Bit Rate or VBR Variable Bit Rate from the pull down menu and set the Peak Cell Rate PCR in the editable field UBR Unspecified Bit Rate guarantees no minimum transmission rate Cells are transmitted on a best effort basis However there is a cap on the maximum transmis sion rate for UBR VCs In a practical situation e UBR VCs should be transmitted at a priority lower than CBR e Bandwidth should be shared equally among UBR VCs UBR applications are non real time traffic such as IP data traffic CBR Constant Bit Rate guarantees a certain transmission rate although the appli cation may underutilize this bandwidth A Peak Cell Rate PCR characterizes CBR CBR is most suited for real time applications such as real time voice video although it can be used for other applications VBR Variable Bit Rate This class is characterized by a Peak Cell Rate PCR which is a temporary burst not a sustained rate and a Sustained Cell Rate SCR a Burst Tolerance BT specified in terms of Maximum Burst Size MBS The MBS is the maximum number of cells that can be transmitted at the peak cell rate and should be less than or equal to the Peak Cell Rate which should be less than or equal to the line rate VBR has two sub classes a VBR non real time VBR nrt Typical applications are n
296. start command 252 SHELL mode 251 View command 267 Command ARP 252 263 Ping 255 Telnet 262 Command line interface see CLI Community 328 Compression protocol 308 Concurrent Bridging Routing 119 274 CONFIG Command List 249 Configuration mode 265 D D port 184 Default IP address 41 denial of service 364 designing a new filter set 187 DHCP 275 DHCP filtering 277 DHCP lease table 257 Diagnostic log 257 261 Level 330 Diagnostics 380 DNS 280 DNS Proxy 379 Documentation conventions 16 389 Domain Name System DNS 280 DSL Forum settings 348 E Echo request 308 echo period 308 Embedded Web Server 380 Ethernet address 274 Ethernet statistics 257 F Feature Keys Obtaining 209 filter parts 181 parts of 181 filter priority 180 filter set adding 188 display 183 filter sets adding 188 defined 179 deleting 194 disadvantages 178 using 188 filtering example 1 184 filters actions a filter can take 180 adding to a filter set 190 defined 179 deleting 194 input 189 modifying 194 output 189 using 187 188 viewing 193 firewall 261 FTP 305 H Hardware address 274 hijacking 364 Hop count 304 HTTP traffic 315 l ICMP Echo 255 IGMP Snooping 113 281 Install 203 Install Certificate 213 IP address 284 287 Default 41 IP interfaces 260 IP routes 261 IPMap table 261 IPSec Tunnel 260 K Keywords CLI 266 L LAN Host Discovery Table 261 latency 197 390
297. sted to the beginning of the log When the log becomes full the oldest entries are dropped The default is 30000 set system persistent log off on When set to on causes the log information to be kept in flash memory set system idle timeout telnet 1 120 http 1 120 Specifies a timeout period of inactivity for telnet or HTTP access to the Gateway after which a user must re login to the Gateway Defaults are 5 minutes for HTTP and 15 min utes for telnet set system username administrator name user name Specifies the usernames for the administrative user the default is admin and a non administrative user the default is user 330 CONFIG Commands set system password admin user Specifies the administrator or user password for a Netopia Gateway When you enter the set system password command you are prompted to enter the old password if any and new password You are prompted to repeat the new password to verify that you entered it correctly the first time To prevent anyone from observing the password you enter characters in the old and new passwords are not displayed as you type them For security you cannot use the step method to set the system password A password can be as many as 8 characters Passwords are case sensitive Passwords go into effect immediately You do not have to restart the Netopia Gateway for the password to take effect Assigning an administrator
298. t is 2 set igmp fast leave off on Sets fast leave on or off Set to off by default fast leave enables a non standard expedited leave mechanism The querier keeps track of which client is requesting which channel by IP address When a leave message is received the querier can check its internal table to see if there are any more clients on this group If there are none it immediately sends an IGMP leave message to the upstream querier 283 IP Settings You can use the command line interface to specify whether TCP IP is enabled identify a default Gateway and to enter TCP IP settings for the Netopia Gateway LAN and WAN ports C NOTE For the DSL platform you must identify the virtual PPP interface vccn a num ber from 1 to 8 Common Settings set ip option on off Enables or disables TCP IP services in the Netopia Gateway You must enable TCP IP ser vices before you can enter other TCP IP settings for the Netopia Gateway If you turn off TCP IP services and save the new configuration the Netopia Gateway clears its TCP IP settings ARP Timeout Settings set ip arp timeout 60 6000 Sets the timeout value for ARP timeout Default 2 600 secs 10 mins range 60 secs 6000 secs 1 100 mins DSL Settings set ip dsl vccn address ip address Assigns an IP address to the virtual circuit Enter 0 0 0 0 if you want the virtual circuit to obtain its IP address from a remote DHCP server
299. t purchase See Install Key on page 209 It enables Gateway terminated VPN support 154 Security SafeHarbour IPSec VPN SafeHarbour VPN IPSec Tunnel provides a single encrypted tunnel to be terminated on the Gateway making a secure tunnel available for all LAN connected users This imple mentation offers the following e Eliminates the need for VPN client software on individual PCs e Reduces the complexity of tunnel configuration e Simplifies the ongoing maintenance for secure remote access If you have purchased the SafeHarbour IPSec feature key the IPSec configuration screen offers additional options Two separate mechanisms for IPSec tunnel support are provided by your Gateway IPSec PassThrough supports VPN clients running on LAN connected computers Disable this checkbox if your LAN side VPN client includes its own NAT interoperability solution SafeHarbour is a keyed feature that enables Gateway terminated VPN support IPSec PassThrough Enable IPSec PassThrough v SafeHarbour IPSec Enable SafeHarbour IPSec v Submit SafeHarbour IPSec Tunnel Entry Peer External IP M Authentication Address Protocol Key 155 A typical SafeHarbour configuration is shown below Encrypted IPSec Tunnel Tunnel Terminates Tunnel Terminates at Standards based Gateway at Netopia Gateway SafeHarbour VPN IPSec Tunnel Termination Configuring a Safe
300. t url redirection URL Specifies the URL s of the desired redirection server s when the zerotouch option is set to on URLs may be a maximum of 192 characters long and may be in any of the following forms http domain name OR IP address gt optionalPath port 332 CONFIG Commands http lt domain name OR IP address gt optionalPath https lt domain name OR IP address gt optionalPath port https lt domain name OR IP address gt optionalPath lt domain name OR IP address gt optionalPath port lt domain name OR IP address gt optionalPath If the port number is omitted port 80 will be assumed Syslog set system syslog option off on Enables or disables system syslog feature If syslog option is on the following commands are available set system syslog host nameip p_address hostname Specifies the syslog server s address either in dotted decimal format or as a DNS name up to 64 characters set system syslog log facility localO local7 Sets the UNIX syslog Facility Acceptable values are local0 through local7 set system syslog log violations off on Specifies whether violations are logged or ignored set system syslog log accepted off on Specifies whether acceptances are logged or ignored set system syslog log attempts off on Specifies whether connection attempts are logged or ignored 333 Default syslog installation procedure 1 Access the r
301. tation previously provided by traditional DSL networks twisted pair Cable consisting of two copper strands twisted around each other The twisting provides protection against electromagnetic interference UTP Unshielded twisted pair cable 365 V VDSL Very high rate Digital Subscriber Line VDSL transmits high speed data over short reaches of twisted pair copper telephone lines with a range of speeds depending upon actual line length Both data channels will be separated in frequency from bands used for POTS and ISDN enabling ser vice providers to overlay VDSL on existing services At present the two high speed channels will also be separated in frequency VLAN Virtual Local Area Network A network of computers that behave as if they are connected to the same wire even though they may be physically located on different segments of a LAN VLANs are configured in software rather than hardware WAN Wide Area Network Private network facilities usually offered by pub lic telephone companies but increasingly available from alternative access providers sometimes called Competitive Access Providers or CAPs that link business network nodes WFQ Weighted Fair Queueing A packet scheduling technique allowing guar anteed bandwidth services in order to let multiple sessions share the same link It regulates the flow of data in networks by sorting packets to minimize latency WFQ passes along narrowband signals first
302. ted on all models This command configures the wiring mode setting for your ADSL line Selecting auto the default causes the Gateway to detect which pair of wires inner or outer pair are in use on your phone line Specifying tip ring forces the inner pair to be used and A A1 the outer pair set dmt metallic termination auto disabled always on not supported on all models This command allows you to apply a sealing current to dry DSL lines so that the wiring doesn t corrode 279 e auto The device will scan for standard telephone service POTS If it finds POTS it dis ables metallic termination If it does not find POTS during the search period then metal lic termination is enabled e disabled There is no POTS detection and metallic termination is disabled e always_on The device will scan for POTS for information only Metallic termination is always enabled Domain Name System Settings Domain Name System DNS is an information service for TCP IP networks that uses a hierarchical naming system to identify network domains and the hosts associated with them You can identify a primary DNS server and one secondary server Common Commands set dns domain name domain name Specifies the default domain name for your network When an application needs to resolve a host name it appends the default domain name to the host name and asks the DNS server if it has an address for the fully qualified host nam
303. ter s telnet management interface are dropped due to over whelming receive data This log message is generated whenever packets traversing the router or destined to the router itself are dropped because of reas sembly timeout This log message is generated whenever packets traversing the router or destined to the router itself are dropped during reassembly because of illegal packet size in a fragment 139 Link Internal Servers Your Gateway ships with an embedded Web server and support for a Telnet session to allow ease of use for configuration and maintenance The default ports of 80 for HTTP and 23 for Telnet may be reassigned This is necessary if a pinhole is created to support appli cations using port 80 or 23 See Pinholes on page 90 for more information on Pinhole configuration Internal Servers Enter a value from 1 to 65534 0 to disable the server Web HTTP Server Port 80 Telnet Server Port 23 submit Web HTTP Server Port To reassign the port number used to access the Netopia embedded Web server change this value to a value greater than 1024 When you next access the embedded Netopia Web server append the IP address with lt port number gt e g Point your browser to http 210 219 41 20 8080 Telnet Server Port To reassign the port number used to access your Netopia embedded Telnet server change this value to a value greater than 1024 When you next access the Netopia embedded Te
304. ter the Gateway IP address in standard dotted quad notation to which the traffic should be forwarded e You can enter Source and Destination IP Address es and Mask s Protocol Type Source IP 0 0 0 0 Destination IP 0 0 0 0 Destination Mask 0000 TOS 116 and Source and Destination Port ID s for the TOS Mask 16 filter if desired Protocol An v Any il TOS field matching Idie Resst O Netopia Firmware Version 7 7 includes two Force Route parameters for an IP filter TOS and TOS Mask Both fields accept values in the range O Gateway IP 1127 0 0 3 255 Certain types of IP packets such as voice or multimedia packets are sensitive to latency Add or Edit more Filter Rules introduced by the network A delay sensitive packet is one that has the low latency bit set in the TOS field of the IP header This means that if such packets are not received rapidly the quality of service degrades If you expect to route significant amounts of such traffic you can configure your router to route this type of traffic to a gateway other than your normal gateway using this feature The TOS field matching check is consistent with source and destination address matching 197 If you check the Idle Reset checkbox a match on this rule will keep the WAN connection alive by resetting the idle timeout status The Idle Reset setting is used to determine if a packet which matches the filter will
305. that all required settings for all services are present and that settings are consistent Netopia 3000 9437188 top gt gt validate Error Subnet mask is incorrect Global Validation did not pass inspection You can use the validate command to verify your configuration settings at any time Your Netopia Gateway automatically validates your configuration any time you save a modi fied configuration 268 CONFIG Commands CONFIG Commands This section describes the keywords and arguments for the various CONFIG commands Remote ATA Configuration Commands Netopia firmware supports configuration of a maximum of four Netopia ATA profiles which are stored in the Gateway s configuration database When a Netopia ATA is discovered the Gateway compares the MAC address of the ATA with one of the existing profiles stored in the database If there is a match the configuration is downloaded to the Netopia ATA and the ATA is restarted Once the Netopia ATA is restarted it comes up with the newly down loaded configuration set ata profile 0 3 ata option on off Enables or disables the remote ATA configuration option for the specified ATA configuration profile to be stored in the Gateway set ata profile 0 3 ata mac addr MAC_addr Specifies the MAC address of the ATA for the specified configuration profile set ata profile 0 3 ata qos enable on off Enables or disables QoS for the specifie
306. ther DTE is ready to send and receive data 355 dynamic DNS Allows you to use the free services of www dyndns org Dynamic DNS automatically directs any public Internet request for your com puter s name to your current dynamically assigned IP address a Ex echo interval Frequency with which the router sends out echo requests encapsulation Technique used to enclose information formatted for one protocol such as AppleTalk within a packet formatted for a different proto col such as TCP IP Encrypt Protocol Encryption protocol for the tunnel session Parameter values supported include NONE or ESP encryption The application of a specific algorithm to a data set so that any one without the encryption key cannot understand the information ESP Encapsulation Security Payload ESP header provides confidentiality data origin authentication connectionless integrity anti replay protection and limited traffic flow confidentiality It encrypts the contents of the data gram as specified by the Security Association The ESP transformations encrypt and decrypt portions of datagrams wrapping or unwrapping the dat agram within another IP datagram Optionally ESP transformations may per form data integrity validation and compute an Integrity Check Value for the datagram being sent The complete IP datagram is enclosed within the ESP payload Ethernet crossover cable See crossover cable E FCS Frame Check Sequenc
307. thernet or USB Status Refers to internal circuit board series useful in determining which software upgrade applies to your hardware type This is the current UTC time blank if this is not available due to lack of a network connection If the optional feature key is installed Status of the Breakwater Firewall ClearSailing SilentRunning or LANdLocked If the optional feature key is installed SafeHarbour VPN IPsec Tunnel option if installed either On or Off Wide Area Network may be Waiting for DSL or other waiting status Up or Down Once connected displays DSL speed rate Downstream and Upstream IP address assigned to the WAN port The IP address of the gateway to which the connection defaults If doing DHCP this info will be acquired If doing PPP this info will be negotiated May be either Instant On or Always On On or Off ON if using Network Address Translation to share the IP address across many LAN users Displays the number of users allotted and the total number available for use Internal IP address of the Netopia Gateway Defines the IP subnet for the LAN Default is 255 255 255 0 for a Class C device On or Off ON if using DHCP to get IP addresses for your LAN client machines A lease is held by each LAN client that has obtained an IP address through DHCP Status of your Ethernet network connection if Supported Up or Down Toolbar Toolbar The toolbar is the dark blue
308. through host will use the same IP address new sessions that conflict with existing sessions will be rejected by the Gateway For example suppose you are a teleworker using an IPSec tunnel from the Gateway and from the passthrough host Both tunnels go to the same remote endpoint such as the VPN access concentrator at your employer s office In this case the first one to start the IPSec traffic will be allowed the second one since from the WAN it s indistinguishable will fail 102 Configure Link Differentiated Services supported models When you click the Differentiated Services link the Differentiated Services configura tion screen appears Differentiated Services Diffserv allow your Gateway to make Quality of Service QoS decisions about what path Internet traffic such as Voice over IP VolP should travel across your network For example you may want streaming video conferencing to use high quality but more restrictive connections or you might want e mail to use less restrictive but less reliable connections VDSL and Bonded ADSL models display this screen Differentiated Services Enable Submit Custom Flows will take effect after you Enable Differentiated Services Save and Restart To create a new Custom Flow entry press the Add button Custom Flows No Custom Flow entries have been defined Add Most other models display this screen Differentiated Services Enable
309. ting which channel by IP address When a leave message is received the querier can check its internal table to see if there are any more clients on this group If there are none it immediately sends an IGMP leave message to the upstream querier By default Fast Leave is set to Off Click the Submit button Click the Alert icon and in the resulting page click the Save and Restart link 114 Configure Link UPnP Universal Plug and Play UPnP is a set of protocols that allows a PC to automatically dis cover other UPnP devices anything from an internet gateway device to a light switch retrieve an XML description of the device and its services control the device and sub scribe to real time event notification By default UPnP is enabled on the Netopia Gateway UPnP Parameters UPnP Enabled For Windows XP users the automatic discovery feature places an pen icon representing the Netopia Gateway automatically in the My Submit Network Places folder Double clicking this icon opens the Gate way s web UI PCs using UPnP can retrieve the Gateway s WAN IP address and automatically create NAT port maps This means that applications that support UPnP and are used with a UPnP enabled Netopia Gateway will not need application layer gateway support on the Netopia Gateway to work through NAT You can disable UPnP if you are not using any UPnP devices or applications e Uncheck the UPnP Enabled checkbo
310. tion The capability to bridge individual VLANs is supported only if the underlying encap sulation is RFC1483 Bridged ether llc 117 Configuring for Bridge Mode 1 Browse into the Netopia Gateway s web interface 2 Click on the Configure button in the upper Menu bar 3 Click on the LAN link The LAN page appears 4 In the box titled LAN IP Inter face Ethernet 100BT Ethernet 100BT Enable Interface IP Address 192 168 1 254 IP Netmask 255 255 2550 Restrictions None Submit Other LAN Options Advanced Configure advanced IP settings DHCP Server Configure DHCP server options Make note of the Ethernet IP Address and LAN IP Interface subnet mask Ethernet 100BT You can use this address to access the Enable Interface v router in the future IP Address 192 168 1254 5 Click on the Advanced link in the left hand links toolbar IP Netmask 255 255 255 0 e Under the heading of Services click Restrictions None E on the Ethernet Bridge link Submit 118 Configure 1 o 11 Click on the Alert symbol and you will see whether The Ethernet Bridge page appears Ethernet Bridge The appearance of this page varies depending on your Gateway s inter faces Enable Concurrent Bridging Routing L If available 8 Check the Enable Bridging on Port selection This may be Always On Enable System Bridge O b Click Submit Enable Bridging on Port
311. tion file on the TFTP server e f you include the optional confirm keyword the download begins as soon as all infor mation is entered 253 You can also download an SSL certificate file from a trusted Certification Authority CA on platforms that support SSL as follows download cert server_address filename confirm install server_address filename confirm Not supported on model 3342 3352 Downloads a new version of the Netopia Gateway operating software from a TFTP Trivial File Transfer Protocol server validates the software image and programs the image into the Netopia Gateway memory After you install new operating software you must restart the Netopia Gateway The server_address argument identifies the IP address of the TFTP server on which your Netopia Gateway operating software is stored The filename argument identifies the path and name of the operating software file on the TFTP server If you include the optional keyword confirm you will not be prompted to confirm whether or not you want to perform the operation license key This command installs a software upgrade key An upgrade key is a purchased item based on the serial number of the gateway log message_string Adds the message in the message_string argument to the Netopia Gateway diagnostic log loglevel evel Displays or modifies the types of log messages you want the Netopia Gateway to record If you enter the lo
312. tion page for upgrading the operating system software On selected models you can install a Secure Sockets Layer SSL V3 0 certificate from a trusted Certification Authority CA for authentication purposes If this feature is available on your Gateway the Install Certificate link will appear in the Install page as shown Otherwise it will not appear 203 Link Install Software This link is not available on the 3342 3352 models since firmware updates must be upgraded via the USB host driver 3342N 3352N models are upgradeable by this proced sure This page allows you to install an updated release of the Netopia Firmware Browse your computer to find the system software file or type in the full path and filename Next to install the file on your Gateway click the Install Software button The latest releases are available online at Netopia s website www netopia com The install may take a few minutes After the install has completed restart your Gateway to run the new software Install Software Updating Your Gateway s Netopia Firmware Version You install a new oper ating system image in your unit from the Install Operating System Software page For this process the computer you are using to connect to the Netopia Gateway must be on the same local area network as the Netopia Gateway 204 Install Step 1 Required Files Upgrading Netopia Firmware Version 7 7 requires a Netopia f
313. to the Command Line Interface CLI See D Command Line Interface on page 247 e Reset WAN port counter and CLI command to display individual Ethernet port statistics See reset enet all on page 257 and show enet all on page 259 e CLI for Netopia ATA Remote Management See Remote ATA Configuration Commands on page 269 e Provide Bandwidth Management using Weighted Fair Queueing for VDSL2 Platforms See Queue Configuration on page 298 14 About Netopia Documentation About Netopia Documentation Se NOTE This guide describes the wide variety of features and functionality of the Neto pia Gateway when used in Router mode The Netopia Gateway may also be delivered in Bridge mode In Bridge mode the Gateway acts as a pass through device and allows the workstations on your LAN to have public addresses directly on the Internet Netopia Inc provides a suite of technical information for its 2200 and 3300 series family of intelligent enterprise and consumer Gateways It consists of e Software User Guide e Dedicated Quickstart guides e Specific White Papers The documents are available in electronic form as Portable Document Format PDF files They are viewed and printed from Adobe Acrobat Reader Exchange or any other applica tion that supports PDF files They are downloadable from Netopia s website http www netopia com Intended Audience This guide is targeted primarily to
314. ts of nine chapters including a glossary and an index It is organized as follows Chapter 1 Introduction Describes the Netopia document suite the purpose of the audience for and structure of this guide It gives a table of conventions Chapter 2 Basic Mode Setup Describes how to get up and running with your Netopia Gateway Chapter 3 Expert Mode Focuses on the Expert Mode Web based user inter face for advanced users It is organized in the same way as the Web UI is organized As you go through each section functions and procedures are discussed in detail Chapier 4 Basic Troubleshooting Gives some simple suggestions for trouble shooting problems with your Gateway s initial configuration Chapter 5 Advanced Troubleshooting Gives suggestions and descriptions of expert tools to use to troubleshoot your Gateway s configuration Chapter 6 Command Line Interface Describes all the current text based com mands for both the SHELL and CONFIG modes A summary table and individual com mand examples for each mode is provided Chapter 7 Glossary Chapter 8 Technical Specifications and Safety Information Chapter 9 Overview of Major Capabilities Presents a product description sum mary Index A Word About Example Screens This manual contains many example screen illustrations Since Netopia 2200 and 3300 Series Gateways offer a wide vari
315. ts that were scanned 9 Highest port 1167 Lowest port E 1094 1102 1108 1094 1099 1166 1167 1151 1160 1164 Security alert type Excessive Pings IP source address 143 137 137 92 IP destination address z 143 137 199 8 Number of attempts E 90 Time at last attempt Fri May 21 17 52 22 2004 UTC Security alert type Port Scan Protocol type TCP IP source address 143 137 50 2 Time at last attempt E Fri May 21 17 51 37 2004 UTC Number of ports that were scanned 241 Highest port 5302 Lowest port B 73 111 473 602 863 817 1994 805 395 5302 1670 Only the first 10 ports are recorded Security alert type E Port Scan Protocol type UDP IP source address 143 137 50 2 Time at last attempt D Fri May 21 17 52 43 2004 UTC Number of ports that were scanned 162 Highest port E 5236 Lowest port H nk 583 1 1471 444 4133 811 5236 650 776 1492 Only the first 10 ports are recorded Security alert type Illegal Packet Size Ping of Death IP source address E 192 168 1 3 IP destination address E 143 137 199 8 Number of attempts i 5 Time at last attempt Fri May 21 18 05 33 2004 UTC Illegal packet size 65740 The capacity of the security log is 100 security alert messages When the log reaches capacity subsequent messages are not captured but they are noted in the log entry count 201 To reset this log select Reset from the Security Monitor tool bar The following message is displayed
316. twork 0 0 0 0 Netmask 0 0 0 0 Interface Type IP Address HJ Gateway 0 0 0 0 Metric 1 RIP Advertise Split Horizon is Submit e Destination Network Enter the IP address of the static route It may not be 0 0 0 0 e Netmask Enter the subnet mask for the IP network at the other end of the static route The subnet mask associated with the destination network must represent the same network class A B or C or a lower class Such as a class C subnet mask or class B network number to be valid 88 Configure e Interface Type Choose PPP vcc1 depending on the interface typically vcc1 for DSL or IP Address from the pull down menu to specify whether the static route is accessible through PPP or IP address Gateway Enter the IP address of the gateway for the static route The default gateway must be located on a network connected to your Netopia Gateway configured interface e Metric Specifies the hop count for the static route Enter a number from 1 to 15 to indi cate the number of routes actual or best guess a packet must traverse to reach the remote network Some metric or a value of 1 will be used to indicate The remote network is one router away and the static route is the best way to reach it The remote network is more than one router away but the static route should not be replaced by a dynamic route even if the dynamic route is more efficient RIP Advertise From the pull down menu
317. ty 0 0 0 0 eese 370 Software and protocols auauua cee eee 370 Software media 222 04 eee eee ead pee ewe xk RE men 370 peine UTE 370 WAN support once ce ee eee ne bead Rn Rd eee 370 S nde ER 370 Management configuration methods lusus 370 DiagnostiCs 2 1 eoo eL I LL bee Pd wed 370 Agency approvals sseeeese ee 371 North America o oococccccoo eh 371 International eyed Rr RR EE a a UE E 371 Regulatory notices lees 371 European COMMUNItY o ooooccooccoo eee 371 Manufacturer s Declaration of Conformance 372 United States iesus eel od pue 372 Service requirements 0 00 0 cece eee 372 Canada CETT 373 Declaration for Canadian users lille eese 373 Caution 242054 uen hg on dene Ru AE HR pos MR dos 373 Important Safety Instructions oooocoooocooooo 374 Australian Safety Informati0N ooooooooooooo o 374 Cautin das Edere puelle ees 374 CautiON sss onec EE ce Rr Ra gne XS Fd RR s 374 Telecommunication installation cautions 374 47 CFR Part 68 Information seules 375 FCC Requirements sessuale e mS 375 11 Table of Contents FCC Statements 0 0000 0 cee eee 375 Electrical Safety Advisory 000000 eee eee 376 CHAPTER 9 Overview of Major Capabilities 377 Wide Area Network Termination lllssss 378 PPPOE PPP
318. ty m 89 336 EEC European directive W EN55022 1994 CISPR22 Class B m EN3OO 386 V1 2 1 non wireless products m EN 301 489 wireless products Regulatory notices European Community This Netopia product conforms to the European Community CE Mark standard for the design and manufacturing of information technology equipment This standard covers a broad area of product design including RF emissions and immunity from electrical disturbances 371 The Netopia Firmware Version 7 7 complies with the following EU directives W Low Voltage 73 23 EEC m EMC Compatibility 89 336 EEC conforming to EN 55 022 Manufacturer s Declaration of Conformance er Warnings This is a Class B product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Ade quate measures include increasing the physical distance between this product and other electrical devices Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment United States This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency
319. typing exit Restart the router by typing restart The router will reboot with the new configuration in effect 335 Wireless Settings supported models set wireless option on off Administratively enables or disables the wireless interface set wireless network id ssid network_name Specifies the wireless network id for the Gateway A unique ssid is generated for each Gateway You must set your wireless clients to connect to this exact id which can be changed to any 32 character string set wireless auto channel mode off at startup continuous Specifies the wireless AutoChannel Setting for 802 11G models AutoChannel is a feature that allows the Netopia Gateway to determine the best channel to broadcast automatically For details see Advanced on page 60 set wireless default channel 1 14 Specifies the wireless 2 4GHz sub channel on which the wireless Gateway will operate For US operation this is limited to channels 1 11 Other countries vary for example Japan is channel 14 only The default channel in the US is 6 Channel selection can have a signifi cant impact on performance depending on other wireless activity in proximity to this AP Channel selection is not necessary at the clients clients will scan the available channels and look for APs using the same ssid as the client set wireless network id closed system on off When this setting is enabled a client must know
320. u telnet IP protocol that lets a user on one host establish and use a virtual terminal connection to a remote host TR 064 TR 064 is a LAN side DSL Gateway configuration specification an extension of UPnP It defines more services to locally manage a Gateway TR 069 TR 069 is a WAN side DSL Gateway Management specification pro vides services similar to UPnP and TR 064 The communication between a Gateway and management agent in UPnP and TR 064 is strictly over the LAN whereas the communication in TR 069 is over the WAN link for some features and over the LAN for others TR 069 allows a remote Auto Config Server to provision and manage a Gateway TR 101 Standard for a network architecture where the aggregation network is Ethernet based while the DSL access network is still ATM over DSL based This facilitates multiplay service delivery over a range of scaleable broad band access technologies Ratified by the DSL Forum in late April 2006 TR 101 enables service providers to evolve their DSL access networks to better support faster access rates and to introduce new multiplay services across IP based broadband networks all through a single gateway These standards are particularly important for widespread delivery of Internet Protocol Televi sion IPTV TR 101 outlines the specific features necessary for IP based net work equipment to deliver multiple services with the same levels of Quality of Service authentication and service segmen
321. ught must go into designing a new filter set You should consider the following guidelines e Be sure the filter set s overall purpose is clear from the beginning A vague purpose can lead to a faulty set and that can actually make your network less secure e Be sure each individual filter s purpose is clear e Determine how filter priority will affect the set s actions Test the set on paper by determining how the filters would respond to a number of different hypothetical pack ets e Consider the combined effect of the filters If every filter in a set fails to match on a par ticular packet the packet is e Forwarded if all the filters are configured to discard not forward e Discarded if all the filters are configured to forward e Discarded if the set contains a combination of forward and discard filters An approach to using filters The ultimate goal of network security is to prevent unauthorized access to the network with out compromising authorized access Using filter sets is part of reaching that goal Each filter set you design will be based on one of the following approaches e That which is not expressly prohibited is permitted e That which is not expressly permitted is prohibited It is strongly recommended that you take the latter and safer approach to all of your filter set designs 187 Working with IP Filters and Filter Sets To work with filters and filter sets begin by accessing the filter set
322. ultimedia WMM Mode Disabled submit To enable the WiFi Multimedia custom settings select Diffserv from the pull down menu 67 The screen expands WiFi Multimedia WMM Mode DiffServ Warning It is not recommended that you modify these settings without direct knowledge or instructions to do so Modifying these settings inappropriately could have an undesirable impact on network performance Router EDCA Parameters Access Categories AC AIFs cwMin Max 15 BEST EFFORT BE uw 63 1023 un elas BACKGROUND BK Access Categories AC AlFs cwMin cwMax TXOP Limit 15 3008 1504 m un BEST EFFORT BE BACKGROUND BK I un Dp wu E o 3 5 Router EDCA Parameters Enhanced Distributed Channel Access govern wireless data from your Gateway to the client Client EDCA Parameters govern wireless data from the client to your Gateway er NOTE It is not recommended that you modify these settings without direct knowl edge or instructions to do so Modifying these settings inappropriately could seriously degrade network performance e AlFs Arbitration Interframe Spacing the wait time in milliseconds for data frames e cwMin Minimum Contention Window upper limit in milliseconds of the range for deter mining initial random backoff The value you choose must be lower than cwMax e cwMax Maximum Contention Window upper limit in milliseco
323. unnel Termination 386 W Weighted Fair Queue 300 Wide Area Network 378 Wireless 56 Z Zero Touch 332 393 394 netopia Netopia 2200 and 3300 series by Netopia Netopia Inc 6001 Shellmound Street Emeryville CA 94608 August 18 2006
324. ur Netopia Gateway in the Web browser s window and press Return For example you would enter hitp 192 168 1 254 2 If an administrator or user password has been assigned to the Netopia Gateway enter Admin or User as the username and the appropriate pass word and click OK The Basic Mode Home Page opens 41 Netopia Basic Administration Page Home netopia Manage My Account Status Details Enable Remote Mgmt Expert Mode Update Firmware Factory Reset Netopia 3347NWG Home Page Software Serial Number 9437188 Release 7 6 1r0 Warranty Date m d yyyy 4 26 2006 Status of DSL Local WAN IP Address 0 00 0 Primary DNS No nameservers are available Remote Gateway Address 0 0 0 0 Secondary DNS 0 0 0 0 ISP Username joesurfer happyinternet com Ethernet Status Up Wed Apr 26 11 24 24 Date amp Time 2006 3 Click on the Expert Mode link in the left hand column of links You are challenged to confirm your choice Expert Mode Confirmation You are now entering Expert Mode which Is for advanced configuration management and troubleshooting If you change any parameters the unit may not operate properly Click OK to continue or Cancel to return to the previous screen Click OK The Home Page opens in Expert Mode 42 Accessing the Expert Web Interface Home Page Expert Mode The Home Page is the summary page for your Netopia Gateway The toolbar at the top pro vid
325. urce Filtering the ability for group memberships to incorporate source address fil tering This allows Source Specific Multicast SSM By adding source filtering a Gateway that proxies IGMP can more selectively join the specific multicast group for which there are interested LAN multicast receivers These features require no user configuration on the Gateway 112 Configure To configure IGMP options available in Netopia Gateways click the GMP link The IGMP page appears You can set the following options 3 e IGMP Snooping checking this checkbox enables icm the Netopia Gateway to listen in to IGMP traffic Robustness 2 The Gateway discovers multicast group membership for the purpose of restricting multicast transmis sions to only those ports which have requested Query Response Interval Moo them This helps to reduce overall network traffic from streaming media and other bandwidth intensive IP multicast applications e Robustness a way of indicating how sensitive to lost packets the network is IGMP can recover from Last Member Query Interval E robustness minus 1 lost IGMP packet The default value is 2 e Query Interval the amount of time in seconds Fast Leave 3 between IGMP General Query messages sent by the querier gateway The default query interval is 125 seconds e Query Response Interval the maximum amount of time in tenths of a second that the IGMP router waits to receive a response to a G
326. ure Link SNMP When you click the SNMP link the SNMP configuration page appears Each community name below must be unique Enter blank to delete Po IO Read Community Name public Write Community Name Trap Community Name System Group Notification Type vl Trap f Submit To create a new IP Trap ent IP Trap Entries No IP Trap entries have been defined f Add gt The Simple Network Management Protocol SNMP lets a network administrator monitor problems on a network by retrieving settings on remote network devices The network administrator typically runs an SNMP management station program on a local host to obtain information from an SNMP agent In this case the Netopia Gateway is an SNMP agent Your Gateway supports SNMP V1 with the exception of most sets read only and traps and SNMP V2 For certain parts of the NPAV2TRAP MIB parameters under resNat Params resDslParams resSecParams set is supported You enter SNMP configuration information on this page Your network administrator fur nishes the SNMP parameters 109 r WARNING SNMP presents you with a security issue The community facility of SNMP behaves somewhat like a password The community public is a well known community name It could be used to examine the configu ration of your Gateway by your service provider or an uninvited reviewer The information can be read from the Gateway If you are strongly concerne
327. uter on the LAN Ethernet interface When NAT is OFF a Netopia Gateway acts as a traditional TCP IP router all LAN com puters devices are exposed to the Internet A diagram of a typical NAT enabled LAN follows Netopia Gateway WAN Ethernet Ethernet Interface Interface NAT protected LAN stations Embedded Admin Services HTTP Web Server and Telnet Server Port 382 Security Se NOTE 1 The default setting for NAT is ON 2 Netopia uses Port Address Translation PAT to implement the NAT facility 3 NAT Pinhole traffic discussed below is always initiated from the WAN side Netopia Advanced Features for NAT Using the NAT facility provides effective LAN security However there are user applications that require methods to selectively by pass this security function for certain types of Inter net traffic Netopia Gateways provide special pinhole configuration rules that enable users to estab lish NAT protected LAN layouts that still provide flexible by pass capabilities Some of these rules require coordination with the unit s embedded administration ser vices the internal Web HTTP Port TCP 80 and the internal Telnet Server Port TCP 23 Internal Servers The internal servers are the embedded Web and Telnet servers of the Gateway You would change the internal server ports for Web and Telnet of the Gateway if you wanted to ha
328. ve these services on the LAN using pinholes or the Default server Pinholes This feature allows you to Transparently route selected types of network traffic using the port forwarding facility FTP requests or HTTP Web connections are directed to a specific host on your LAN Setup multiple pinhole paths Up to 32 paths are supported Identify the type s of traffic you want to redirect by port number 383 Common TCP IP protocols and ports are FTP TCP 21 telnet TCP 23 SMTP TCP 25 HTTP TCP 80 SNMP TCP 161 UDP 161 See page 90 for How To instructions Default Server This feature allows you to Direct your Gateway to forward all externally initiated IP traffic TCP and UDP protocols only to a default host on the LAN Enable it for certain situations Where you cannot anticipate what port number or packet protocol an in bound applica tion might use For example some network games select arbitrary port numbers when a connection is opened When you want all unsolicited traffic to go to a specific LAN host Combination NAT Bypass Configuration Specific pinholes and Default Server settings each directed to different LAN devices can be used together cr WARNING Creating a pinhole or enabling a Default Server allows inbound access to the specified LAN station Contact your Network Administrator for LAN security questions 384 Security IP Passthrough Netopia OS now offers an IP p
329. vity periods that will also apply to NAT time outs if stateful inspection is enabled on the interface Stateful Inspection param eters are active on a WAN interface only if enabled on your Gateway Stateful inspection can be enabled on a WAN interface whether NAT is enabled or not Stateful Inspection Firewall installation procedure ED NOTE Installing Stateful Inspection Firewall is mandatory to comply with Required Services Security Policy Residential Category module Version 4 0 specified by ICSA Labs For more information please go to the following URL http www icsalabs com html communities firewalls certification criteria Residential pdf 1 Access the router through the web interface from the private LAN DHCP server is enabled on the LAN by default 2 The Gateway s Stateful Inspection feature must be enabled in order to prevent TCP UDP and ICMP packets destined for the router or the private hosts This can be done by navigating to Expert Mode gt Security gt Stateful Inspection 164 Security No activity Time outs Enter a value from 30 to 65535 seconds UDP no activity time out 180 TCP no activity time out 14400 Submit Exposed Addresses Exposed addresses Configure Exposed Addresses Active only if NAT is disabled Stateful Inspection Options PPP over Configure stateful inspection options Ethernet vcc1 for this interface e UDP no activity time out The time in sec
330. voice video and data services VGx was developed to ensure that subscribers receive the quality of voice video and data services they expect to prevent a large data download from causing jittery video or poor voice quality VGx achieves this goal by providing superior service segmentation and QoS features obtained by mapping multiple local virtual local area networks VLANs to one or more specific permanent virtual circuits PVCs for DSL or wide area network VLANSs for a fiber network Traffic prioritization is determined through the Institute of Electrical Engineering IEEE standard 802 1p which specifies QoS algorithms to prioritize traffic based on protocol and source This insures that each service receives the QoS treatment it requires for example video is free from latency VoIP service is prioritized to insure aural quality and data is securely and efficiently routed 387 388 Index Symbols I command 252 A Access the GUI 41 Address resolution table 260 Administrative restrictions 290 Administrator password 41 147 250 Arguments CLI 266 ARP Command 252 263 ATA configuration 269 Authentication 309 Authentication trap 328 auto channel mode 336 AutoChannel Setting 61 336 B Bridging 274 Broadcast address 284 287 C CLI 247 I command 252 Arguments 266 Command shortcuts 252 Command truncation 265 Configuration mode 265 Keywords 266 Navigating 265 Prompt 251 265 Re
331. voice or mul Add or Edit more Filter Rules timedia packets are sensi tive to delays introduced by the network A delay sensitive packet is identified by a special low latency setting called the TOS bit It is important for such packets to be received rapidly or the quality of service degrades e The type of higher layer Internet protocol the packet is carrying such as TCP or UDP 181 Port numbers A filter can also match a packet s port number attributes but only if the filter s protocol type is set to TCP or UDP since only those protocols use port numbers The filter can be configured to match the following e The source port number the port on the sending host that originated the packet e The destination port number the port on the receiving host that the packet is destined for By matching on a port number a filter can be applied to selected TCP or UDP services such as Telnet FTP and World Wide Web The following tables show a few common ser vices and their associated port numbers FTP 20 21 Finger 79 Telnet 23 World Wide Web 80 SMTP mail 25 News 144 Gopher 70 rlogin 513 Who Is 43 TFTP 69 World Wide Web 80 who 513 SNMP 161 Port number comparisons A filter can also use a comparison option to evaluate a packet s source or destination port number The comparison options are e No Compare No comparison of the port number specified in the filter with the packet
332. when you are on the Home page or other transitional pages To see a context help page example go to Security gt Passwords then click Help Netopia Gateway Help Your Gateway supports Context Sensitive Help Click on Help from within your page of interest and help for that page will be presented Documentation The full product documentation is provided in electronic format Documentation is also available online at www netopia com Close Window 48 Configure Configure Button Configure The Configuration options are presented in the order of likelinood you will need to use them Quickstart is typically accessed during the hardware installation and initial configu ration phase Often these settings should be changed only in accordance with infor mation from your Service Provider LAN and WAN settings are available to fine tune your system Advanced provides some special capabilities typically used for gaming or small office environments or where LAN side servers are involved This button will not be available if you log on as User Link Quickstart How to Use the Quickstart Page Quickstart is normally used immediately after the new hardware is installed When you are first configuring your Gateway Quickstart appears first Once you have configured your Gateway logging on displays the Home page Thereafter if you need to use Quickstart choose it from the Expert Mode Co
333. will check a remote Firmware Server for the latest firmware revision If a newer version is found your firmware will be automatically updated once you confirm the installation 38 Home Page Basic Mode Link Factory Reset In some cases you may need to clear all the configuration settings and start over again to program the Netopia Gateway You can perform a factory reset to do this Click on Factory Reset to reset the Gateway back to its original factory default settings Factory Reset Confirmation Warning You are about to reset the configuration to factory defaults This means the configuration of the Netopia 3000 will be lost and will have to be re entered OK Cancel er NOTE Exercise caution before performing a Factory Reset This will erase any config uration changes that you may have made and allow you to reprogram your Gateway 39 40 Accessing the Expert Web Interface CHAPTER 3 Expert Mode Using the Expert Mode Web based user interface for the Netopia 2200 and 3300 series Gateway you can configure troubleshoot and monitor the status of your Gateway Accessing the Expert Web Interface Open the Web Connection Once your Gateway is powered up you can use any recent version of the best known web browsers such as Netscape Navigator or Microsoft Internet Explorer from any LAN attached PC or workstation The procedure is 1 Enter the name or IP address of yo
334. x and click the Submit button e The Alert icon will appear in the upper right corner of the web page Click the Alert icon and when prompted click the Save and Restart link 115 Link LAN Management TR 064 is a LAN side DSL Gateway configuration specification It is an extension of UPnP It defines more services to locally manage the Netopia Gateway While UPnP allows open access to configure the Gateway s features TR 064 requires a password to execute any command that changes the Gateway s configuration DSL Forum LAN Management Parameters LAN Side DSL CPE Configuration TR 064 Enabled M Submit TR 064 is enabled by default To disable it e Uncheck the Enabled checkbox and click the Submit button e The Alert icon will appear in the upper right corner of the web page Click the Alert icon and when prompted click the Save and Restart link 116 Configure Link Ethernet Bridge The Netopia Gateway can be used as a bridge rather than a router A bridge is a device that joins two networks As an Internet access device a bridge connects the home com puter directly to the service provider s network equipment with no intervening routing func tionality such as Network Address Translation Your home computer becomes just another address on the service provider s network In a DSL connection the bridge serves simply to convey the digital data information back and forth over your telephone
335. y Your service provider may tell you that the WAN IP Address for your Gateway is static In this case disable this checkbox and enter the IP Address and IP Netmask from your Service Provider in the appropriate fields WAN IP Interface RFC 1483 Bridged Ethernet vcc1 Enable Interface v Obtain IP Address Automatically L IP Address 0 0 0 1 IP Netmask 255 255 255 0 Address Mapping NAT v Restrictions Admin Disabled HJ Submit N Other Interface Options Advanced Advanced settings for this interface IP Address This is the IP Address from your Service Provider when using static IP addressing IP Netmask This is the Netmask from your Service Provider when using static IP addressing Se NOTE Beginning with Firmware Version 7 7 you can now run an IPoE interface with out an IP address unnumbered interface if you un check Obtain IP Address Automatically and set the IP Address to O Address Mapping NAT Specifies whether you want the Gateway to use network address translation NAT when communicating with remote routers NAT lets you conceal details of your network from remote routers By default address mapping is enabled 79 Restrictions This setting determines the types of traffic the Gateway accepts from the WAN Admin Disabled means that Gateway traffic is accepted but administrative com mands are ignored None means that all traffic is accepted When PPP is enabled Admin Di
336. y comes with its own installation wizard If you are using Windows 98 insert the CD If you are using Windows XP Windows 2000 or Windows NT you don t even need the CD Follow these easy setup steps 1 Plug the Netopia Pocket Gateway into a USB port on your PC 2 Whether you use the CD Windows 98 or not all other Windows versions on Windows based PCs the Netopia Installation Wizard will launch automatically The Netopia Installation Wizard will assist you to configure your PC to work with the Netopia pocket Gateway Follow the on screen instructions DSL Setup Wizard netopia DSL SETUP WIZARD Welcome to the DSL Setup Wizard This wizard will automatically configure your computer so you can access the internet over a high speed DSL connection To continue click Next EHE M To proceed click the Next button The Netopia Installation Wizard performs a series of checks on your system and then will install USB drivers for your connection 3 Place the Netopia Pocket Gateway near your PC so you can see it easily Make sure any cables are kept away from power cords fluorescent lighting fixtures and other sources of electrical interference 4 When the wizard prompts you connect the RJ 11 Telephone Cable from the DSL port on the Netopia Pocket Gateway to the ADSL phone jack The DSL indicator light should blink for up to two minutes and then come on solid green once the device is connected to your computer
337. you modify these settings without direct knowl edge or instructions to do so Modifying these settings inappropriately could seriously degrade network performance 340 CONFIG Commands set wireless wmm router edca voice aifs 1 255 set wireless wmm router edca voice cwmin value set wireless wmm router edca voice cwmax value Sets values for Gateway WMM voice parameters set wireless wmm router edca video aifs 1 255 set wireless wmm router edca video cwmin value set wireless wmm router edca video cwmax value Sets values for Gateway WMM video parameters set wireless wmm router edca best effort aifs 1 255 set wireless wmm router edca best effort cwmin value set wireless wmm router edca best effort cwmax value Sets values for Gateway WMM best effort parameters set wireless wmm router edca background aifs 1 255 set wireless wmm router edca background cwmin value set wireless wmm router edca background cwmax value Sets values for Gateway WMM background parameters set wireless wmm client edca voice aifs 1 255 set wireless wmm client edca voice cwmin value set wireless wmm client edca voice cwmax value set wireless wmm client edca voice txoplimit 0 9999 Sets values for client WMM voice parameters set wireless wmm client edca video aifs 1 255 set wireless wmm client edca video cwmin value set wireless wmm client edc

Download Pdf Manuals

image

Related Search

NOTE notepad++ notes notebook lm notes app notepad app notepads notepad++ download notepad online notebook llm noteflight note gpt notes apple notes online notebooklm google note taking apps notebook app notepad program notepad free notebook paper notepad++ online notebook ml notewise notebook klm

Related Contents

Dicota D30898 screen protector  コチラ - エッサム  メーカーカタログ(PDFファイル)  Service Bulletin - DriveAccord.net  Mode d`emploi  User manual - Humantechnik  Emerson Fisher Baumann 26000 Instruction Manual  Einbau- und Betriebsanleitung  Conceptronic Wireless UK Keyboard & Mouse    

Copyright © All rights reserved.
Failed to retrieve file