Home

ZyXEL MAX-306M1 User's Manual

image

Contents

1. 6 i oqec 9 i fe YEL O O0O 11 4 19 C Y O AY 25 Part I Introduction and Wizards ceeseeeeeeeee 29 Chapter 1 Gelting Started M 31 T24 Abou Your WIMAX MOGGI 4usiieiaiierdia uen c eae meee Pd rb CRI m cts AR 31 NERVIS UN ce etr 31 1 1 2 Make Calls via Internet Telephony Service Provider sssssees 32 Tos VOID Nodem Adwat sous cto bein dep esei cab UK E oo R dic d ioci d cad D apo tx dam tad a a MER d dad 33 jp URB cec CE 33 13 Good Habits Tar Managing the Device 2o oc ph Errore be iie a RA PC ERU rte es 34 Chapter 2 Introducing the Web Configurator eeeeeeeeeeeeeeeeeeeeee nennen nennen nennt nennen nnn nnn 35 CER OLI EA T OU IT IURE 35 21 1 Apcessng Me Web GOngUE Stel xa a pecie ai age ERE RANT ER ER ED RN D tus 35 2t T HERES TEE ESO OBIIT eer ene d mene Eo mere Puoi ER BE un SQ up ABl on REC NR DE RR 38 Chapter 3 Internet Connection Wizard 1 iiiiuiieiiiuniiettan tate na tna sca ipa bns nd ka kan enint i Ann peKRM a Unna aeu RM isosta 41 cxE 1 ee ere ec ean eee eer enn on reece pe
2. Speed Dial 01 Number Name Type 9 Use Proxy O Non Proxy Use IP or URL Phone Book Number Name Destination Action 01 Tij 02 T 03 Tj 04 Tij 05 fiij 06 Tij 07 fiij 08 fiij 09 wi 10 Tj dea The following table describes the icons in this screen Table 55 VOICE gt Phone Book gt Speed Dial Setup ICON DESCRIPTION imi Delete Click to delete this item User s Guide Chapter 14 The Phone Book Screens The following table describes the labels in this screen Table 56 VOICE gt Phone Book gt Speed Dial LABEL DESCRIPTION Speed Dial Select the speed dial number you want to use for this phone number Number Enter the SIP number you want the WiMAX Modem to call when you dial the speed dial number Name Enter a name to identify the party you call when you dial the speed dial number You can use up to 127 printable ASCII characters Type Select Use Proxy if you want to use one of your SIP accounts to call this phone number Select Non Proxy Use IP or URL if you want to use a different SIP server or if you want to make a peer to peer call In this case enter the IP address or domain name of the SIP server or the other party in the field below Add Click to add the new number to the list below This is a list of speed dial numbers Number This is the SIP number the WiMAX Modem calls when you use this spee
3. LOG DISPLAY PAYLOAD TYPE SA Security Association PROP Proposal TRANS Transform KE Key Exchange ID Identification CER Certificate CER REQ Certificate Request HASH Hash SIG Signature NONCE Nonce NOTFY Notification DEL Delete VID Vendor ID User s Guide Chapter 20 The Logs Screens 20 2 View Logs Click TOOLS gt Logs gt View Log to access this screen Use this screen to look at log entries and alerts Alerts are written in red Figure 99 TOOLS gt Logs gt View Logs Dispaly All Logs v Email Log Now Refresh Clear Log Time Message Source Destination Note 07 08 2008 A 1 05 09 30 Successful HTTP login 192 168 1 34 User admin 07 08 2008 pages 2 02 15 39 Successful HTTP login 192 168 1 34 User admin 07 08 2008 p 3 02 09 00 Successful HTTP login 192 168 1 34 User admin 07 08 2008 4 01 57 20 Successful HTTP login 192 168 1 34 User admin 07 08 2008 E 5 01 34 07 Successful HTTP login 192 168 1 34 User admin 6 07 08 2008 Successful HTTP login 192 168 1 34 User admin 01 10 45 07 08 2008 m 7 00 49 27 Successful HTTP login 192 168 1 34 User admin 07 08 2008 oe 8 00 08 10 Successful HTTP login 192 168 1 34 User admin 9 07 08 2008 DHCP server assigns 192 168 1 33 to 00 07 37 TWPC13435 XP 10 07 08 2008 00 07 37 11 07 08 2008 DHCP server assigns 192 168 1 33 to 00 07 34 TWPC13435 XP 12 07 08 2008 00 07 34 13 07 08 2008 00 07 34 14 07 08 2008 00 05 14
4. e eo Network 4 Show All Q Location Automatic HJ Show Built in Ethernet HJ AppleTalk Proxies Ethernet n PPPoE Using DHCP Configure IPv4 IP Address 0 0 0 0 Renew DHCP Lease Subnet Mask DHCP Client ID If required Router DNS Servers Search Domains Optional IPv6 Address ee a aa he 8 Configure IPv6 Click the lock to prevent further changes Assist me Apply Now 9 User s Guide Appendix B Setting Up Your Computer s IP Address 5 For statically assigned settings do the following From the Configure IPv4 list select Manually n the IP Address field type your IP address n the Subnet Mask field type your subnet mask In the Router field type the IP address of your device Figure 123 Mac OS X 10 4 Network Preferences Ethernet ean Network 4 ShowAl Q Location Automatic HN Show Built in Ethernet E TCP IP PPPoE AppleTalk Proxies Ethernet Configure IPv4 Manually HJ IP Address 0 0 0 0 Subnet Mask 0 0 0 0 Router 0 0 0 0 DNS Servers Search Domains Optional IPv6 Address Configure IPv6 Q M Click the lock to prevent further changes Assist me Apply Now User s Guide Appendix B Setting Up Your Computer s IP Address Click Apply Now and close the window Verifying Settings Check you
5. User s Guide Chapter 3 Internet Connection Wizard Table 6 Internet Connection Wizard gt Authentication Settings Screen continued LABEL DESCRIPTION Anonymous Identity Enter the anonymous identity provided by your Internet Service Provider Anonymous identity also known as outer identity is used with EAP TTLS encryption The anonymous identity is used to route your authentication request to the correct authentication server and does not reveal your real user name Your real user name and password are encrypted in the TLS tunnel and only the anonymous identity can be seen Leave this field blank if your ISP did not give you an anonymous identity to use PKM This field displays the Privacy Key Management version number PKM provides security between the WiMAX Modem and the base station At the time of writing the WiMAX Modem supports PKMv2 only See the WiMAX security appendix for more information Authentication This field displays the user authentication method Authentication is the process of confirming the identity of a mobile station by means of a username and password for example Check with your service provider if you are unsure of the correct setting for your account Choose from the following user authentication methods TTLS Tunnelled Transport Layer Security TLS Transport Layer Security Note Not all WiMAX Modems support TLS authentication Check with you
6. Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes User s Guide 1 77 Chapter 15 The Certificates Screens 15 3 Trusted CAs Click TOOLS gt Certificates gt Trusted CAs access this screen Use this screen to display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted The WiMAX Modem accepts any valid certificate signed by a certification authority on this list as being trustworthy thus you do not need to import any certificate that is signed by one of these certification authorities Figure 74 TOOLS gt Certificates gt Trusted CAs PKI Storage Space in Use o NENNEN 10096 Trusted CA Certificates 1896 CRL Name Subject Issuer Valid From Valid To ai Action inpar The following table describes the icons in this screen Table 62 TOOLS gt Certificates gt Trusted CAs ICON DESCRIPTION EP Edit Click to edit this item as Export Click to export an item im Delete Click to delete this item The following table describes the labels in this screen Table 63 TOOLS gt Certificates gt Trusted CAs LABEL DESCRIPTION PKI Storage This bar displays the percentage of the WiMAX Modem s PKI storage Space in Use space that is currently in use When the storage space is almost full you should consider deleting expired or unnecessa
7. LABEL DESCRIPTION Get Select this if you have a dynamic IP address A dynamic IP address automatically is not fixed the ISP assigns you a different one each time you from ISP connect to the Internet Default Use Fixed IP A static IP address is a fixed IP that your ISP gives you Type your Address ISP assigned IP address in the I P Address field below IP Subnet Mask Enter a subnet mask in dotted decimal notation Refer to the appendices to calculate a subnet mask If you are implementing subnetting Gateway IP Specify a gateway IP address supplied by your ISP Address Apply Click to save your changes Reset Click to restore your previously saved settings 8 3 WiMAX Configuration Click ADVANCED gt WAN Configuration gt WiMAX Configuration to set up the frequencies used by your WiMAX Modem In a WiMAX network a mobile or subscriber station must use a radio frequency supported by the base station to communicate When the WiMAX Modem looks for a connection to a base station it can search a range of frequencies User s Guide Chapter 8 The WAN Configuration Screens Radio frequency is measured in Hertz Hz Table 20 Radio Frequency Conversion 1 kHz 1000 Hz 1 MHz 1000 kHz 1000000 Hz 1 GHz 1000 MHz 1000000 kHz Figure 29 ADVANCED gt WAN Configuration gt WiMAX Configuration DL Frequency 1 0 kHz DL Frequency 2 0 kHz DL Frequency 3 0 kH
8. LABEL DESCRIPTION Last Outgoing This field displays the last number the SIP account called It displays Number N A if the SIP account has never dialed a number Call Statistics Phone This field displays the WiMAX Modem s phone port number Hook This field indicates whether the phone is on the hook or off the hook On The phone is hanging up or already hung up Off The phone is dialing calling or connected Status This field displays the current state of the phone call N A There are no current VoIP calls incoming calls or outgoing calls being made DIAL The callee s phone is ringing RING The phone is ringing for an incoming VoIP call Process There is a VoIP call in progress DISC The callee s line is busy the callee hung up or your phone was left off the hook Codec This field displays what voice codec is being used for a current VoIP call through a phone port Peer Number This field displays the SIP number of the party that is currently engaged in a VoIP call through a phone port Duration This field displays how long the current call has lasted Tx Pkts This field displays the number of packets the WiMAX Modem has transmitted in the current call Rx Pkts This field displays the number of packets the WiMAX Modem has received in the current call Tx B s This field displays how quickly the WiMAX Modem has transmitted packets in the current call Th
9. Help Ed close 8 Click the Close button to apply the changes Verifying Settings Check your TCP IP properties by clicking System gt Administration gt Network Tools and then selecting the appropriate Network device from the Devices User s Guide Appendix B Setting Up Your Computer s IP Address tab The Interface Statistics column shows data if your connection is working properly Figure 136 Ubuntu 8 Network Tools Mal DEVICES Network Tools meme Tool Edit Help Network device Ie B Configure IP Information Protocol IP Address Netmask Prefix Broadcast Scope IPv4 10 0 2 15 255 255 255 0 10 0 2 255 IPv6 fe80 a00 27ff fe30 el6c 64 Link Interface Information Interface Statistics Hardware address 08 00 27 30 e1 6c debacle 684 6 KiB Multicast Enabled Transmitted d pacati 1425 MTU 1500 Transmission errors 0 Link speed not available Received bytes 219 5 KiB State Active Received packets 1426 Reception errors 0 Collisions 0 User s Guide Appendix B Setting Up Your Computer s IP Address Linux openSUSE 10 3 KDE This section shows you how to configure your computer s TCP IP settings in the K Desktop Environment KDE using the openSUSE 10 3 Linux distribution The procedure screens and file locations may vary depending on your specific distribution release version and individual configuration The following screens use the default openSU
10. Valid From This field displays the date that the certificate becomes applicable none displays for a certification request Valid To This field displays the date that the certificate expires The text displays in red and includes an Expired message if the certificate has expired none displays for a certification request Key Algorithm This field displays the type of algorithm that was used to generate the certificate s key pair the WiMAX Modem uses RSA encryption and the length of the key set in bits 1024 bits for example Subject Alternative Name This field displays the certificate owner s IP address IP domain name DNS or e mail address EMAIL User s Guide Chapter 15 The Certificates Screens Table 64 TOOLS gt Certificates gt Trusted CAs gt Edit continued LABEL DESCRIPTION Key Usage This field displays for what functions the certificate s key can be used For example DigitalSignature means that the key can be used to sign certificates and KeyEncipherment means that the key can be used to encrypt text Basic Constraint This field displays general information about the certificate For example Subject Tyoe CA means that this is a certification authority s certificate and Path Length Constraint 1 means that there can only be one certification authority in the certificate s path This field does not display for a certification re
11. 15 2 2 My Certificate Edit Click TOOLS gt Certificates gt My Certificates then the Edit icon to access this screen Use this screen to view in depth certificate information and change the certificate s name Figure 72 TOOLS gt Certificates gt My Certificates gt Edit Name auto generated self signed cert Property v Default self signed certificate which signs the imported remote host certificates Certification Path CN MAX 206M2 0019CB00000 1 Certification information Type Self signed X 509 Certificate Version v3 Serial Number 946711646 Subject CN MAX 206M2 0019CB000001 Issuer CN MAX 206M2 0019CB000001 Signature Algorithm rsa pkcsi shai Valid From 2000 Jan 1st 00 00 00 GMT Valid To 2030 Jan 1st 00 00 00 GMT Key Algorithm rsaEncryption 1024 bits Subject Alternative Name EMAIL 0019CB000001 Gauto gen cert Key Usage DigitalSignature KeyEncipherment KeyCertSign Basic Constraint Subject Type CA Path Length Constraint 1 MD5 Fingerprint e1 35 6d 3d 8a b8 de 94 d2 37 98 c5 45 bd 14 31 SHA1 Fingerprint d1 bb e2 fd 9c 99 7b 59 ed 33 0c 96 1b c7 a4 47 ce a8 1b 7c Certificate in PEM Base 64 Encoded Format L BEGIN CERTIFICATE MIICCDCCAXGgAwIBAgIEOG2sXjANBakahkiG9wOBAQUFADAhMRB8wWHQYDVQQDExZN QVgtMjAZTTIgMDAxOUNCMDAWMDAxMB4XDTAWMDEwMTAwMDAWMFoXDTMwMDEWMTAw MDAWMFowITEfMBOGA 1UEAXMWTUFYLTIWNkO yIDAWMTIDQJAWMDAWMTCEnzANBakq hkiGSWOBAQEFAAOBjQAwgYkCgYEArtszQj7aCO82h2b 4py
12. Click a column header to sort log entries in descending later to earlier order Click again to sort in ascending order The small triangle next to a column header indicates how the table is currently sorted pointing downward is descending pointing upward is ascending The following table describes the labels in this screen Table 84 TOOLS gt Logs gt View Logs LABEL DESCRIPTION Display Select a category whose log entries you want to view To view all logs select All Logs The list of categories depends on what log categories are selected in the Log Settings page Email Log Now Click this to send the log screen to the e mail address specified in the Log Settings page Refresh Click to renew the log screen Clear Log Click to clear all the log entries regardless of what is shown on the log screen User s Guide Chapter 20 The Logs Screens Table 84 TOOLS gt Logs gt View Logs continued LABEL DESCRIPTION The number of the item in this list Time This field displays the time the log entry was recorded Message This field displays the reason for the log entry See Section 20 4 on page 225 Source This field displays the source IP address and the port number of the incoming packet In many cases some or all of this information may not be available Destination This field lists the destination IP address and the port number of the incoming packet In many c
13. Outgoing Call Number A VoIP phone call was set up from the listed SIP number to the WiMAX Modem VoIP Call End Phone Phone Port A VoIP phone call that came into the WiMAX Modem has terminated Table 102 Lifeline Logs LOG MESSAGE DESCRIPTION PSTN Call Start A PSTN call has been initiated PSTN Call End A PSTN call has terminated PSTN Call Established A PSTN call has been set up User s Guide Chapter 20 The Logs Screens User s Guide 21 1 Overview The Status Screen Use this screen to view a complete summary of your WiMAX Modem connection status 21 2 Status Screen Click the STATUS icon in the navigation bar to go to this screen where you can view the current status of the device system resources interfaces LAN and WAN and SIP accounts You can also register and un register SIP accounts as well as view detailed information from DHCP and statistics from WiMAX Vol P bandwidth management and traffic Figure 101 Status Device Information System Name MAX 306M1 V3 70 BIT 0 370BITb1 20090303 03 03 2009 Firmware Version WAN Information IP Address IP Subnet Mask DHCP LAN Information IP Address 192 168 1 1 IP Subnet Mask 255 255 255 0 DHCP Server WiMAX Information Sequans Firmware 4 6 1 0 trunk 17129 Patch for ALU Version Auth issue Operator ID BSID Frequency MAC Address WiMAX State DL SYN B
14. Request Authentication When you select Create a certification request and enroll for a certificate immediately online the certification authority may want you to include a reference number and key to identify you when you send a certification request Fill in both the Reference Number and the Key fields if your certification authority uses CMP enrollment protocol J ust the Key field displays if your certification authority uses the SCEP enrollment protocol For the reference number use 0 to 99999999 For the key use up to 31 of the following characters a zA Z0 9 GX 96 amp 4 lt gt User s Guide Chapter 15 The Certificates Screens Table 59 TOOLS gt Certificates gt My Certificates gt Create LABEL DESCRIPTION Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes If you configured the My Certificate Create screen to have the WiMAX Modem enroll a certificate and the certificate enrollment is not successful you see a screen with a Return button that takes you back to the My Certificate Create screen Click Return and check your information in the My Certificate Create screen Make sure that the certification authority information is correct and that your Internet connection is working properly if you want the WiMAX Modem to enroll a certificate online User s Guide 173 Chapter 15 The Certificates Screens
15. 12345678 5060 1030 9980 or 1403765535 voip example com 5060 1 65535 register example com 5060 1 65535 service example com C Send Caller ID Authentication User Name tutorial Password eeccccce Tip Unless otherwise told by a SIP service provider you can often leave the Port settings at their default values Click Apply to save your changes Next click VOICE gt Phone gt Analog Phone This is where you will configure your phone settings to bind your SIP settings to the connected phone Phone Port Settings Phonei Outgoing Call Use SIP1 Incoming Call apply to SIP1 Select a phone from the Phone Port Settings list then select whether you want to use the SIP account settings for outgoing calls incoming calls or both Click Apply to save your settings and you can begin placing Internet phone calls Go to the next section for further instructions User s Guide Chapter 5 Tutorials 5 3 1 Placing an Internet Phone Call Because you re using an analog phone you can t just enter another party s SIP number and dial straight away The reason is there is no way to enter certain SIP specific characters on your analog phone s keypad in a way that the WiMAX Modem will recognize As such you must first configure a speed dial entry in the WiMAX Modem s internal phone book Required The following table provides a summary of the information you will need to complete the tas
16. 18 5 1 SNMP Traps The WiMAX Modem sends traps to the SNMP manager when any of the following events occurs Table 74 SNMP Traps TRAP TRAP NAME DESCRIPTION 0 coldStart defined in RFC A trap is sent after booting power on 1215 1 warmStart defined in RFC A trap is sent after booting software reboot 1215 4 authenticationFailure defined A trap is sent to the manager when receiving in RFC 1215 any SNMP get or set requirements with the wrong community password 6 whyReboot defined in A trap is sent with the reason of restart before ZYXEL MIB rebooting when the system is going to restart warm start 6a For intentional reboot A trap is sent with the message System reboot by user if reboot is done intentionally for example download new files Cl command sys reboot etc 6b For fatal error A trap is sent with the message of the fatal code if the system reboots because of fatal errors User s Guide Chapter 18 The Remote Management Screens 18 5 2 SNMP Options Click TOOLS gt Remote Management gt SNMP to access this screen Use SNMP options to control SNMP access to your WiMAX Modem Figure 91 TOOLS gt Remote Management gt SNMP SNMP Configuration Get Community public Set Community public Trap Community public Trap Destination 0 0 0 0 SNMP Server Port 161 Server Access LAN amp WAN v Secured Client IP Address 9 Al
17. Web browser pop up windows from your device Web pop up blocking is enabled by default in many operating systems and web browsers JavaScript enabled by default in most web browsers Java permissions enabled by default in most web browsers See the Appendix C on page 299 for more information on configuring your web browser 2 1 1 Accessing the Web Configurator Make sure your WiMAX Modem hardware is properly connected refer to the Quick Start Guide for more information 2 Launch your web browser 3 Enter 192 168 1 1 as the URL User s Guide Chapter 2 Introducing the Web Configurator 4 A password screen displays The default password 1234 displays in non readable characters If you haven t changed the password yet you can just click Login Click Cancel to revert to the default password in the password field If you have changed the password enter your password and click Login MAX 306M1 Welcome to the ZyXEL Web Configurator Enter your user name password and click Login amp User Name user Password eeee Your user name and password may contain up to a maximum of 30 letters numerals and any printable character found on a typical English language keyboard Leoga Engish v Note Please turn on the Javascript and ActiveX control setting on Internet Explorer when operating system is Windows XP and service pack is SP2 5 The following screen displays if you have no
18. Chapter 10 The NAT Configuration Screens 10 4 Trigger Port Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side With regular port forwarding you set a forwarding port in NAT to forward a service coming in from the server on the WAN to the IP address of a computer on the client side LAN The problem is that port forwarding only forwards a service to a single LAN IP address In order to use the same service on a different LAN computer you have to manually replace the LAN computer s IP address in the forwarding port with another LAN computer s IP address Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take turns using the service The WiMAX Modem records the IP address of a LAN computer that sends traffic to the WAN to request a service with a specific port number and protocol a trigger port When the WiMAX Modem s WAN port receives a response with a specific port number and protocol incoming port the WiMAX Modem forwards the traffic to the LAN IP address of the computer that sent the request After that computer s connection for that service closes another computer on the LAN can use the service in the same manner This way you do not need to configure a new IP address each time you want a different LAN computer to use the application Click ADVANCED gt NAT Configuration gt Trigger Port to maintain trigger port forward
19. Chapter 4 VoIP Connection Wizard 4 2 1 First Voice Account Settings This VolP Connection Wizard screen allows you to configure your voice account The settings here correspond to the VOICE gt Service Configuration gt SIP Setting screen see Section 12 2 on page 133 for more information Figure 12 VoIP Connection gt First Voice Account Settings First Voice Account Settings The VoIP feature in this device requires that you have an active voice account Enter your account information below as issued by your voice account provider SIP Number changeme SIP Server Address 127 0 0 1 SIP Service Domain 127 0 0 1 Authentication User Name changeme Password 99909999 isade happa close The following table describes the labels in this screen Table 8 VolP Connection gt First Voice Account Settings LABEL DESCRIPTION SIP Number Enter your SIP number in this field use the number or text that comes before the 9 symbol in a SIP account like 1234 9Vol P provider com You can use up to 127 ASCII characters SIP Server Address Type the IP address or domain name of the SIP server in this field It doesn t matter whether the SIP server is a proxy redirect or register server You can use up to 95 ASCII characters SIP Service Domain Enter the SIP service domain name in this field the domain name that comes after the 9 symbol in a SIP account like 1234 Q Vol P provider com You can use
20. Table 87 System Maintenance Logs continued LOG MESSAGE DESCRIPTION Time initialized by Time The device got the time and date from the time server server Time initialized by NTP server The device got the time and date from the NTP server Connect to Daytime server fail The device was not able to connect to the Daytime server Connect to Time server fail The device was not able to connect to the Time server Connect to NTP server fail The device was not able to connect to the NTP server Too large ICMP packet has been dropped The device dropped an ICMP packet that was too large Configuration Change PC Ox x Task ID Ox x The device is saving configuration changes Table 88 Access Control Logs LOG MESSAGE DESCRIPTION Packet Direction lt rule d gt Firewall default policy TCP Attempted TCP UDP I GMP ESP GRE OSPF access UDP IGMP ESP GRE OSPF matched the default policy and was blocked or Packet Direction forwarded according to the default policy s setting Firewall rule NOT match TCP Attempted TCP UDP I GMP ESP GRE OSPF access UDP IGMP ESP GRE OSPF matched or did not match a configured firewall rule denoted by its number and was blocked or forwarded according to the rule Triangle route packet forwarded The firewall allowed a triangle route session to m
21. The WiMAX Modem cannot get the IP address of the external content filtering via DNS query Creating socket failed The WiMAX Modem cannot issue a query because TCP UDP Socket creation failed port port number Connecting to content filter server fail The connection to the external content filtering server failed License key is invalid The external content filtering license key is invalid For type and code details see Table 97 on page 231 Table 95 Attack Logs LOG MESSAGE DESCRIPTION attack TCP UDP IGMP The firewall detected a TCP UDP IGMP ESP GRE OSPF ESP GRE OSPF attack attack ICMP type d The firewall detected an ICMP attack code d land TCP UDP IGMP The firewall detected a TCP UDP I GMP ESP GRE OSPF ESP GRE OSPF land attack land ICMP type d The firewall detected an ICMP land attack code d ip spoofing WAN TCP The firewall detected an IP spoofing attack on the WAN UDP IGMP ESP GRE port OSPF User s Guide Chapter 20 The Logs Screens Table 95 Attack Logs continued LOG MESSAGE DESCRIPTION code d ip spoofing WAN ICMP The firewall detected an ICMP IP spoofing attack on the type d code d WAN port icmp echo ICMP The firewall detected an ICMP echo attack type d code d syn flood TCP The firewall detected a TCP syn flood attack ports
22. the entire range of frequencies the WiMAX Modem is capable of using to transmit and receive see the Product Specifications appendix for details In the figure B shows the operator frequency range This is the range of frequencies within the WiMAX frequency range supported by your operator service provider The operator range is subdivided into bandwidth steps In the figure each C is a bandwidth step The arrow D shows the WiMAX Modem searching for a connection Have the WiMAX Modem search only certain frequencies by configuring the downlink frequencies Your operator can give you information on the supported frequencies The downlink frequencies are points of the frequency range your WiMAX Modem searches for an available connection Use the Site Survey screen to set these bands You can set the downlink frequencies anywhere within the WiMAX frequency range In this example the downlink frequencies have been set to search all of the operator range for a connection 8 3 2 Configuring Frequency Settings You need to set the WiMAX Modem to scan one or more specific radio frequencies to find an available connection to a WiMAX base station Use the WiMAX Frequency screen to define the radio frequencies to be searched for available wireless connections See Section 8 3 3 on page 93 for an example of using the WiMAX Frequency screen User s Guide Chapter 8 The WAN Configuration Screens Note It may take several minutes fo
23. 5 Ifthe problem continues contact the vendor 22 2 WiMAX Modem Access and Login forgot the IP address for the WiMAX Modem 1 The default IP address is http 192 168 1 1 2 Ifyou changed the IP address and have forgotten it you might get the IP address of the WiMAX Modem by looking up the IP address of the default gateway for your computer To do this in most Windows computers click Start Run enter cmd and then enter ipconfig The IP address of the Default Gateway might be the IP address of the WiMAX Modem it depends on the network so enter this IP address in your Internet browser 3 If this does not work you have to reset the WiMAX Modem to its factory defaults See Section 22 1 on page 249 forgot the password 1 The default password is 1234 2 If this does not work you have to reset the WiMAX Modem to its factory defaults See Section 11 5 on page 126 cannot see or access the Login screen in the web configurator 1 Make sure you are using the correct IP address The default IP address is http 192 168 1 1 User s Guide Chapter 22 Troubleshooting f you changed the IP address Section 6 2 on page 66 use the new IP address f you changed the IP address and have forgotten it see the troubleshooting suggestions for forgot the IP address for the WiMAX Modem 2 Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Gu
24. DESCRIPTION ESP User Defined 50 The IPSEC ESP Encapsulation IPSEC_TUNNEL Security Protocol tunneling protocol uses this service FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on FTP TCP 20 File Transfer Program a program to enable fast transfer of files including TCP 21 large files that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client server protocol for the world wide web HTTPS TCP 443 HTTPS is a secured http session often used in e commerce ICMP User Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes ICQ UDP 4000 This is a popular Internet chat program IGMP User Defined 2 Internet Group Management Protocol MULTI CAST is used when sending packets to a specific group of hosts IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management IRC TCP UDP 6667 This is another popular Internet chat program MSN Messenger TCP 1863 Microsoft Networks messenger service uses this protocol NEW ICQ TCP 5190 An Internet chat program NEWS TCP 144 A protocol for news groups NFS UDP 2049 Network File System NFS is a client server distributed file service that provides transparent file sharing for network environments NNTP TCP 119 Network News Transport Protocol is the delivery mechanism for the USE
25. M for mega may denote 1000000 or 1048576 and so on e g is a Shorthand for for instance and i e means that is or in other words User s Guide Document Conventions Icons Used in Figures Figures in this User s Guide may use the following generic icons The WiMAX Modem icon is not an exact representation of your WiMAX Modem Table 1 Common Icons WiMAX Access Point Computer Wireless Signal Notebook Server WiMAX Base Station EJ Telephone Switch Router Internet Cloud Internet WiMAX Cloud INTERNE User s Guide 5 Safety Warnings Safety Warnings For your safety be sure to read and follow all warning notices and instructions Do NOT use this product near water for example in a wet basement or near a swimming pool Do NOT expose your device to dampness dust or corrosive liquids Do NOT store things on the device Do NOT install use or service this device during a thunderstorm There is a remote risk of electric shock from lightning Connect ONLY suitable accessories to the device Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage points or other risks ONLY qualified service personnel should service or disassemble this device Please contact your vendor for further information Make sure to connect the cables to the correct ports Place co
26. TIME SEUN airan Peer dan te o ae breed e eo De rente nits estote EES 68 Table 17 Presdatined NTP Tine Servers 12 ein dba janes add Ebo Re RU mabe D PDAS 70 Table 13 ADVANCED gt LAN Configuration gt DHCP Setup sss 75 Table 14 ADVANCED gt LAN Configuration gt Static DHOP 1 ieeeeeceuceeec eren ncn arces 76 Table 15 Advanced LAN Configuration gt IP Static Route ssssssssssseeeeeennretnns 77 Table 16 Advanced LAN Configuration gt IP Static Route ssssssssssseeeeeeeennes T7 Table 17 Advanced LAN Configuration gt IP Static Route gt Edit 78 Table 18 ADVANCED gt LAN Configuration gt Other Settings cccceeceeeseeeeeeeneeececeeeeeeeeseeeeeeeaeeeeaas 79 Table 19 ADVANCED gt WAN Configuration gt Internet Connection gt ISP Parameters for Internet Access 88 Table 20 Radio Freqguenpy COonVeltelall uasteooesssae et giesiacarseansavagentsanceose iieii idarede 91 Table 21 ADVANCED gt WAN Configuration WiMAX Configuration cccccceeseeeeeeeeeeeeeseeeeeeeenaeeneaes 91 Table 22 DL Frequency Example Seinge ausuiasensseteuidsrekequi dee zadidin xen a kaiaa ANa ASAAN ER 93 Table 23 ADVANCED gt WAN Configuration gt Advanced ou eeecececcceeeneeeeeeeeeeeaeeeeeeeeeseaaeeeeeeeeeeaaeeneaes 95 Table 24 ADVANGED VPN Transport gt General 1er erede tk a ebur RR RR dees 99 Table 25 Advanced VPN Transport gt Customer Interface ssssssssssesse
27. The SIP register server might have a different expiration Register Re Enter the number of seconds the WiMAX Modem waits before it tries send timer again to register the SIP account if the first try failed or if there is no response Session Expires Enter the number of seconds the conversation can last before the call is automatically disconnected Usually when one half of this time has passed the WiMAX Modem or the other party updates this timer to prevent this from happening Min SE Enter the minimum number of seconds the WiMAX Modem accepts for a session expiration time when it receives a request to start a SIP session If the request has a shorter time the WiMAX Modem rejects it RTP Port Range Start Port End Port Enter the listening port number s for RTP traffic if your VolP service provider gave you this information Otherwise keep the default values To enter one port number enter the port number in the Start Port and End Port fields To enter a range of ports Type tne port number at the beginning of the range in the Start Port fiel Type the port number at the end of the range in the End Port field Voice Compression Primary Secondary and Third Compression Select the type of voice coder decoder codec that you want the WiMAX Modem to use G 711 provides high voice quality but requires more bandwidth 64 kbps e G 711A is typically used in Europe G 711
28. This field displays the name used to identify this certificate It is recommended that you give each certificate a unique name Type This field displays what kind of certificate this is REQ represents a certification request and is not yet a valid certificate Send a certification request to a certification authority which then issues a certificate Use the My Certificate I mport screen to import the certificate and replace the request SELF represents a self signed certificate SELF represents the default self signed certificate which signs the imported remote host certificates CERT represents a certificate issued by a certification authority Subject This field displays identifying information about the certificate s owner such as CN Common Name OU Organizational Unit or department O Organization or company and C Country It is recommended that each certificate have unique subject information Issuer This field displays identifying information about the certificate s issuing certification authority such as a common name organizational unit or department organization or company and country With self signed certificates this is the same information as in the Subject field Valid From This field displays the date that the certificate becomes applicable Valid To This field displays the date that the certificate expires The text displays in red and includes an Expired message if the
29. s Guide 15 Table of Contents 154 1 Ger ncale AUOmMISS uuiusoiexod pte DI EE pte rl E a c E ilc aa Rr a ER ORE 184 154 2 A S COITU ais T A R cutob x r RO eDead fom dE Rad 186 Chapter 16 The Fie rl CN eiii EPI aiaa aeii aaia IE RU HL HUE CHR MX CARNE 189 QUESTO T Umm T p E 189 18 1 7 What You Gan Doin This ONSDUM iisdem cass sida onia cruor ad 189 18 1 2 What YOU Need To KNOW uiisaceividdb cue tN e etbeco tae vo ind ddayaawdlediicaculasatdaneludadeedeealeneics 189 TES Frona SS BUY areae o ER MER p S Rae Pha do Cea ce a i cmt a Hob nr ter eter errr 190 16 2 1 Firewall Rule Directions 22uncasuniciuke o Ru Esp er LR Eee r bau Yeu Rus eS oou du UE Rueda Da RE s RR EUR 190 joschtasalniri qm 191 16 2 2 Genar AIS IS cries i poa e bt Rhonda IH Dr onc FT A POUR dana eh 192 10 a 4 NES D ee emm 193 T5 SCR REICTE aa Sra Eg pend NP E R ER a ber dort usd DER edt area Peas o deebnra 194 16 4 1 Stateful Inspection Firewall 1ususacie esset Lose uiu t RUE redu buck rara a EX c daa 194 16 4 2 Guidelines For Enhancing Security With Your Firewall sesseeeeeess 195 164 23 The Triangle Route PROBIS Lice eis ori bra EE I POLREEFE parta adc n EE a 195 Chapter 17 OMIM El Ht C T I t 199 REESE T UTE 199 TEX A What You Can Do in The Chaplet n eerte ecie ope EEacs Eat rh cb t ERE P oc par Deas ERR eene 199 TUE PAUSE bisce pta rti ca pe E E ond calgary Seasons EE cube A DA ded
30. 10 3 2 Port Forwarding Rule Setup Click a port forwarding rule s Edit icon in the ADVANCED gt NAT Configuration gt Port Forwarding screen to activate deactivate or edit it Figure 47 ADVANCED gt NAT Configuration gt Port Forwarding gt Rule Setup Rule Setup CI Active Service Name Start Port End Port Server IP Address 0 0 0 0 The following table describes the labels in this screen Table 35 ADVANCED gt NAT Configuration gt Port Forwarding gt Rule Setup LABEL DESCRIPTION Active Select this to enable this rule Clear this to disable this rule Service Name Enter a name to identify this rule You can use 1 31 printable ASCII characters or you can leave this field blank It does not have to be a unique name Start Port Enter the port number or range of port numbers you want to forward to the specified server End Port To forward one port number enter the port number in the Start Port and End Port fields To forward a range of ports enter the port number at the beginning of the range in the Start Port field enter the port number at the end of the range in the End Port field Server IP Enter the IP address of the server to which to forward packets for the Address selected port number s This server is usually on the LAN Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes User s Guide
31. 2008 7 8 O Get from Time Server Time Protocol Time Server Address Time Zone Setup Time Zone GMT Greenwich Mean Time Dublin Edinburgh Lisbon London CI Daylight Savings Start Date 2008 01 06 at o clock End Date 2008 01 06 at o clock The following table describes the labels in this screen Table 11 SETUP gt Time Setting LABEL DESCRIPTION Current Time and Date Current Time Displays the current time according to the WiMAX Modem User s Guide Chapter 6 The Setup Screens Table 11 SETUP gt Time Setting continued LABEL DESCRIPTION Current Date Displays the current time according to the WiMAX Modem Time and Date Setup Manual Select this if you want to specify the current date and time in the fields below New Time Enter the new time in this field and click Apply New Date Enter the new date in this field and click Apply Get from Time Server Select this if you want to use a time server to update the current date and time in the WiMAX Modem Time Protocol Select the time service protocol that your time server uses Check with your ISP or network administrator or use trial and error to find a protocol that works Daytime RFC 867 This format is day month year time zone Time RFC 868 This format displays a 4 byte integer giving the total number of seconds since 1970 1 1 at 0 0 0 NTP RFC 1305 This format
32. 380 44 247 69 78 User s Guide Appendix Customer Support Fax 380 44 494 49 32 Web www ua zyxel com Regular Mail ZyXEL Ukraine 13 Pimonenko Str Kiev 04050 Ukraine United Kingdom Support E mail support zyxel co uk Sales E mail sales zyxel co uk Telephone 44 1344 303044 0845 122 0301 UK only Fax 44 1344 303034 Web www zyxel co uk Regular Mail ZyXEL Communications UK Ltd 11 The Courtyard Eastern Road Bracknell Berkshire RG12 2XB United Kingdom UK User s Guide Appendix Customer Support 370 User s Guide Index A AAA 87 AbS 136 accounting server see AAA ACK message 143 activity 87 Advanced Encryption Standard see AES AES 269 ALG 116 alternative subnet mask notation 312 analysis by synthesis 136 Application Layer Gateway see ALG authentication 44 87 89 267 inner 270 key server 87 types 270 authorization 267 request and reply 269 server 87 base station see BS BS 85 86 links 86 BYE request 144 Index Europe type service mode 154 hold 154 156 service mode 154 156 transfer 155 156 waiting 155 156 CBC MAC 269 CCMP 267 269 cell 85 Certificate Management Protocol CMP 172 Certificate Revocation List CRL 185 certificates 167 267 advantages 185 and CA 185 certification path 175 181 184 expired 184 factory default 185 file formats 185 fingerprints 176 182 importing 169 not used for encryption 184 revoked 184 self sign
33. Certificate Name Subject Information Common Name 9 Host IP Address 0 Host Domain Name O E Mail e Organizational Unit Organization Country Key Length 1024 Enrollment Options Create a self signed certificate L Create a certification request and save it locally for later manual enrollment Create a certification request and enroll for a certificate immediately online Enrollment Protocol Simple Certificate Enrollment Protocol SCEP CA Server Address CA Certificate v See Trusted CAs Request Authentication Key 170 User s Guide Chapter 15 The Certificates Screens The following table describes the labels in this screen Table 59 TOOLS gt Certificates gt My Certificates gt Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate You can use up to 31 alphanumeric and amp characters Subject Information Use these fields to record information that identifies the owner of the certificate You do not have to fill in every field although the Common Name is mandatory The certification authority may add fields Such as a serial number to the subject information when it issues a certificate It is recommended that each certificate have unique subject information Common Name Select a radio button to identify the certificate s owner by IP
34. Configuration screen If you are unsure of the correct values contact your service provider 5 If you are trying to access the Internet wirelessly make sure the wireless settings in the wireless client are the same as the settings in the AP 6 Disconnect all the cables from your WiMAX Modem and follow the directions in the Quick Start Guide again 7 Ifthe problem continues contact your ISP 252 User s Guide Chapter 22 Troubleshooting cannot access the Internet any more had access to the Internet with the WiMAX Modem but my Internet connection is not available any more 1 Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 2 1 on page 33 2 Disconnect and re connect the power adapter to the WiMAX Modem 3 If the problem continues contact your ISP The Internet connection is slow or intermittent 1 The quality of the WiMAX Modem s wireless connection to the base station may be poor Poor signal reception may be improved by moving the WiMAX Modem away from thick walls and other obstructions or to a higher floor in your building 2 There may be radio interference caused by nearby electrical devices such as microwave ovens and radio transmitters Move the WiMAX Modem away or switch the other devices off Weather conditions may also affect signal quality 3 There might be a lot of traffic on the network Look at the LEDs and che
35. Figure 187 Firefox 2 Options Options w CO 9 B G amp G amp i9 Main Tabs Content Feeds Privacy Security Advanced General Network Upda e Encryption Protocols Use SSL 3 0 Use TLS 1 0 Certificates When a web site requires a certificate Select one automatically Ask me every time User s Guide Appendix E Importing Certificates 3 In the Certificate Manager dialog box select the Web Sites tab select the certificate that you want to remove and then click Delete Figure 188 Firefox 2 Certificate Manager Certificate Manager TER Your Certificates Other Peopl s Web Sites afithorities You have certificates on file that identify these web sites Certificate Name Purposes Client Server Status Responder 4 In the Delete Web Site Certificates dialog box click OK Figure 189 Firefox 2 Delete Web Site Certificates Delete Web Site Certificates Are you sure you want to delete these web site certificates 172 20 37 202 If you delete a web site certificate you will be asked to accept it again the nex 5 The next time you go to the web site that issued the public key certificate you just removed a certification error appears User s Guide 337 Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional however the screens can apply to Opera 9 on all platforms 1 If your device s web c
36. Good reception Two bars Excellent reception Three bars The following table describes the labels in this screen Table 4 Main LABEL DESCRIPTION Help Click to open the web configurator s online help Wizard Click to run the Internet Connection and VolP Connection Setup Wizard All of the settings that you can configure in this wizard are also available in these web configurator screens Logout Click to log out of the web configurator Note This does not log you off the WiMAX network it simply logs you out of the WiMAX Modem s browser based configuration interface WiMAX Connection This field indicates the current status of your WiMAX connection Status Status messages are as follows Connected Indicates that the WiMAX Modem is connected to the WiMAX network Use the Strength Indicator icon to determine the quality of your network connection Disconnected Indicates that the WiMAX Modem is not connected to the WiMAX network DL SYN Indicates a download synchronization is in progress This means the firmware is checking with the server for any updates or settings alterations User s Guide Chapter 2 Introducing the Web Configurator Table 4 Main continued LABEL DESCRIPTION Software Version This field indicates the version number of the WiMAX Modem s firmware The version number takes the form of Version Build release status candidate V
37. Section 18 5 on page 207 lets you control SNMP access to your WiMAX Modem The DNS screen Section 18 6 on page 210 lets you control DNS access to your WiMAX Modem The Security screen Section 18 7 on page 211 lets you control how your WiMAX Modem responds to other types of requests e The TRO69 screen Section 18 8 on page 212 lets you configure the WiMAX Modem s auto configuration and dynamic service configuration options 18 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter Remote Management Limitations Remote management over LAN or WAN will not work when A filter in SMT menu 3 1 LAN or in menu 11 5 WAN is applied to block a Telnet FTP or Web service You have disabled that service in one of the remote management screens The IP address in the Secured Client IP field does not match the client IP address If it does not match the WiMAX Modem will disconnect the session immediately There is already another remote management session with an equal or higher priority running You may only have one remote management session running at one time Remote Management and NAT When NAT is enabled Use the WiMAX Modem s WAN IP address when configuring from the WAN Use the WiMAX Modem s LAN IP address when configuring from the LAN System Timeout There is a default system management idle timeout of five minutes three hundred seconds The WiMAX Modem aut
38. The web site 172 20 37 202 supports authentication for the page you are viewing The identity of this web site has been verified by ZyXEL a certificate authority you trust for this purpose Vi View the security certificate that verifies this web site s sew identity Connection Encrypted High grade Encryption AES 256 256 bit The page you are viewing was encrypted before being transmitted over the Internet Encryption makes it very difficult for unauthorized people to view information traveling between computers It is therefore very unlikely that anyone read this page as it traveled across the network User s Guide Appendix E Importing Certificates Installing a Stand Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you 1 Open Firefox and click TOOLS gt Options Figure 182 Firefox 2 Tools Menu Web Search Downloads Add ons Java Console Error Console Page Info Clear Private Data Ctrl Shift Del N Options 2 Inthe Options dialog box click ADVANCED gt Encryption gt View Certificates Figure 183 Firefox 2 Options Options Tabs Content Feeds Privacy Security Advanced General Network Upda e Encryption Protocols Use SSL 3 0 Use TLS 1 0 Certificates When a web site requires a certificate Select one a
39. be created per host Table 87 System Maintenance Logs LOG MESSAGE DESCRIPTION Time calibration is successful The device has adjusted its time based on information from the time server Time calibration failed The device failed to get information from the time server WAN interface gets IP s The WAN interface got a new IP address from the DHCP or PPPoE server DHCP client gets s A DHCP client got a new IP address from the DHCP server DHCP client IP expired A DHCP client s IP address has expired DHCP server assigns s The DHCP server assigned an IP address to a client Successful WEB login Someone has logged on to the device s web configurator interface WEB login failed Someone has failed to log on to the device s web configurator interface ELNET Login Successfully Someone has logged on to the router via telnet ELNET Login Fail Someone has failed to log on to the router via telnet Successful FTP login Someone has logged on to the device via ftp FTP login failed Someone has failed to log on to the device via ftp NAT Session Table is Full The maximum number of NAT session table entries has been exceeded and the table is full Time initialized by Daytime Server The device got the time and date from the Daytime server User s Guide Chapter 20 The Logs Screens
40. because they cannot re sign the message with Tim s private key Additionally Jenny uses her own private key to sign a message and Tim uses Jenny s public key to verify the message The WiMAX Modem uses certificates based on public key cryptology to authenticate users attempting to establish a connection not to encrypt the data that you send after establishing a connection The method used to secure the data that you send through an established connection depends on the type of connection For example a VPN tunnel might use the triple DES encryption algorithm The certification authority uses its private key to sign certificates Anyone can then use the certification authority s public key to verify the certificates A certification path is the hierarchy of certification authority certificates that validate a certificate The WiMAX Modem does not trust a certificate if any certificate on its path has expired or been revoked User s Guide Chapter 15 The Certificates Screens Certification authorities maintain directory servers with databases of valid and revoked certificates A directory of certificates that have been revoked before the scheduled expiration is called a CRL Certificate Revocation List The WiMAX Modem can check a peer s certificate against a directory server s list of revoked certificates The framework of servers software procedures and policies that handles keys is called PKI public key infrastructure 15
41. following two conditions This device complies with part 15 of the FCC Rules Operation is subject to the condition that this device does not cause harmful interference This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This device generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this device does cause harmful interference to radio television reception which can be determined by turning the device off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and the receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help Av FCC Radiation Exposure Statement This transmitter must not be co located or operating in conjunction with any other antenna or transmitter To comply with FCC RF exposure compliance requirements a separation distance of a
42. ntp1 cs wisc edu ntp1 gbg netnod se ntp2 cs wisc edu tock usno navy mil ntp3 cs wisc edu ntp cs strath ac uk ntpl sp se timel stupi se tick stdtime gov tw tock stdtime gov tw time stdtime gov tw 6 4 2 Resetting the Time The WiMAX Modem automatically resets the time in the following circumstances When the device starts up such as when you press the Power button When you click Apply in the SETUP Time Setting screen Once every 24 hours after starting up User s Guide ART III Advanced screens The LAN Configuration Screens 73 The WAN Configuration Screens 85 The NAT Configuration Screens 109 The System Configuration Screens 119 The LAN Configuration Screens 7 1 Overview Use the ADVANCED gt LAN Configuration screens to set up the WiMAX Modem on the LAN You can configure DHCP services and control how the WiMAX Modem sends routing information using RIP A Local Area Network LAN is a shared communication system to which many computers are attached A LAN is usually a computer network limited to the immediate area such as the same building or floor of a building 7 1 1 What You Can Do in This Chapter The DHCP Setup screen Section 7 2 on page 74 lets you enable disable and configure the DHCP server in the WiMAX Modem The Static DHCP screen Section 7 3 on page 76 lets you assign specific IP address
43. s router It is necessary to encapsulate the Ethernet pseudowire since the WiMAX connection is IP only MPLS information is carried in a packet s Ethernet header and without encapsulation would be stripped from the packet prior to the packet s transmission over the WiMAX link The following figure shows the VPLS connection between your WiMAX Modem A and your service provider s router B consisting of GRE encapsulated Ethernet pseudowire traffic Figure 37 VPLS Tunneling ETHERNET PSEUDOWRES WiMAX CONNECTION User s Guide Chapter 9 The VPN Transport Screens 9 3 3 Customer Interface Options Click ADVANCED gt VPN Transport gt Customer Interface to configure the VPNs used by the WiMAX Modem Figure 38 ADVANCED gt VPN Transport gt Customer Interface Active 1 2 3 4 5 6 7 8 Interface Type Untagged Associated Ethernet Mode Pseudowire Ingress DSCP Interface Description Action VLAN ID Egress 4 Routing for Routing NAT B wi Gu g m EAT Gu Sw GE wi Gu The following table describes the icons in this screen Table 25 Advanced VPN Transport gt Customer Interface ICON DESCRIPTION g Edit Click to edit this item dur Delete Click to delete this item The following table describes the labels in this screen Table 26 ADVANCED gt VPN Transport gt Customer Interface LABEL DESCRIP
44. so each sub network has a maximum of 2 2 or 126 possible hosts a host ID of all zeroes is the subnet s address itself all ones is the subnet s broadcast address 192 168 1 0 with mask 255 255 255 128 is subnet A itself and 192 168 1 127 with mask 255 255 255 128 is its broadcast address Therefore the lowest IP address that can be assigned to an actual host for subnet A is 192 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask to divide a 24 bit address into two subnets Similarly to divide a 24 bit address into four subnets you need to borrow two host ID bits to give four possible combinations 00 01 10 and 11 The subnet mask is 26 bits 11111111 11111111 11111111 11000000 or 255 255 255 192 User s Guide Appendix D IP Addresses and Subnetting Each subnet contains 6 host ID bits giving 29 2 or 62 hosts for each subnet a host ID of all zeroes is the subnet itself all ones is the subnet s broadcast address Table 119 Subnet 1 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address Decimal 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address Lowest Host
45. 124 5 L mm x 97 2 W mm x 40 2 H mm EMC Approvals FCC Part 15B RF Approvals FCC Part 27 User s Guide 257 Chapter 23 Product Specifications Table 110 Radio Specifications FEATURE DESCRIPTION WiMAX Operating MAX 306M1 2 5 2 7 GHz Frequency MAX 316M1 3 4 3 6 GHz Channel Bandwidth 5MHz 10MHz Maximum Transmit Power 26dbm with ODU antenna deployed WiMAX Compliance Compliant to receiver performances defined in IEEE P802 16 2005 88 4 13 Table 111 Firmware Specifications FEATURE DESCRIPTION Web based Configuration and Management Tool Also known as the web configurator this is a firmware based management solution for the WiMAX Modem You must connect using a compatible web browser in order to use it High Speed Wireless Internet Access The WiMAX Modem is ideal for high speed wireless Internet browsing WiMAX Worldwide Interoperability for Microwave Access is a wireless networking standard providing high bandwidth wide range secured wireless service The WiMAX Modem is a WiMAX mobile station MS compatible with the IEEE 802 16e standard Firewall The WiMAX Modem is a stateful inspection firewall with DoS Denial of Service protection By default when the firewall is activated all incoming traffic from the WAN to the LAN is blocked unless it is initiated from the LAN The WiMAX Modem s firewall supports TCP UDP insp
46. 125 Table 41 ADVANCED gt System Configuration gt Configuration ccccceceeceeeeeeeeeeeeeeeeeeeeeeeeeeeeaeesees 126 Table 42 ADVANCED gt System Configuration gt Restart ennt 127 Table 43 VOICE gt Service Configuration gt SIP Setting icdeccictscceiciccienicitinateegiacetnsuedaregoiannedciecemenedcay 134 Table 44 VOICE gt Service Configuration gt SIP Settings gt Advanced sss 137 Table 45 Custem ones Delale xi caseiacccsasneceiincuiagatiseeiadaareae a 140 Table 46 VOIGE Service Coniguratione CIO acionada cix Eben i E ieee eine 142 TADIG RE IP Call Tees SI us tousrent eon das Ege n ER anco ado RUE E eaa Cas duci Feb c MU daa RU FO Ea 143 Table 49 VOICE gt Phone Andog PRONE uxiecisacsctececcet etur Iber ener ERE a Corm bU Eee EEEa 151 Table 49 VOICE gt Phone gt Analog Phone gt Advanced esses essere 152 Table DB VOICE Phone gt COMMO ciraire dps De VOS ED Eee EUMD e pevUl UR Eo MT MIGObbece Idae cea qo RO DP FUIN 153 Tale DI VOCE Phong ISIN uriinis b ence Po cotes Ru or eb cua pa Repas old cese HU ear aces 153 Table 52 European Type Flash Key Commands sse sentent nennt nennen 154 Table 52 USA Type Flashi Key Commands 15 tdt bitn etie teri iae v Re Fo ey Non bred aiies 156 Table 54 VOICE gt Phone Book Incoming Gall Poligy 1 rr rrr nr nn terne 160 Table 55 VOICE Phone Book gt Speed Dial Sel uai duced nter dad du ead 162 Table 5B VOICE gt
47. 133 Figure 57 STUN EXAINIB uci seeie I tics eater order etu ccbx a Aa 135 Figure 58 VOICE gt Service Configuration gt SIP Settings gt Advanced sss 137 Figure 59 VOICE gt Service Configuration QOS 1uossseesii terra tait kon d dae oenina enidan 142 Figuic BO SIP User ABIT oraina eieaa S tu pA Dl dus C GA RE RE asensnuaprasccanmeduanemiegedcas 144 Eo TT UE Ph MNT CRT E ges sua wus E 145 Poue oe SIF Reden o SNE ERST Tt D 01 uid CS T 146 Figure 63 DiffServ Differentiated Service Field eeseesesssseesesseseeeenene nennen nnne 147 Figure 64 VOICE Phone x Analog POP uiescuniiese deae s tubi rl epo aai Ec epu aiia 150 Figure 65 VOICE gt Phone gt Analog Phone Advanced ccisicccccccsscciescsmniesecectinonecennmnenesnoenmenrsucenieneiwened 151 Figure 66 VOICE Phone o Comma qst or PO tgp dao a ela ob dos ba Lag Gr ra v RM nd 152 Figure Br VOICE Phbbg SION quus ucsutsievuteci cci ea bbre b rer a 153 Figure 68 VOICE Phone Book gt Incoming Gall Ponty 1 c pertenecen erre uet ntt un bra ERE pEced 160 Figure 69 VOICE gt Phone Book gt Speed Dial i eniece cedro trad b rtl Estaba d nas Fem ug RE Rana 162 Figure 70 TOOLS Gerlllicates My Cemificates ueocserisocs tete nM tri Erde debui na 168 Figure 71 TOOLS gt Certificates gt My Certificates gt Create eese 170 Figure 72 TOOLS gt Certificates gt My Certificates gt Edit 2a dues kid annuae deux ec ekkraaa 174
48. 21 The Status Screen 21 2 2 WiMAX Site Information Click Status gt WiMAX Site I nformation to open this screen This read only screen shows WiMAX frequency information for the WiMAX Modem These settings can be configured in the ADVANCED gt WAN Configuration gt WiMAX Configuration screen Figure 103 WiMAX Site Information DL Frequency L Frequency L Frequency L Frequency g L Frequency Bandwidth L Frequency L Frequency D D D DL Frequency D Di DL Frequency DL Frequency 10 DL Frequency DL Frequency DL Frequency DL Frequency DL Frequency DL Frequency DL Frequency DL Frequency DL Frequency WiMAX Site Information 1 2 8 kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz kHz KHz The following table describes the labels in this screen Table 105 WiMAX Site Information LABEL DESCRIPTION 1 119 DL Frequency These fields show the downlink frequency settings in kilohertz kHz These settings determine how the WiMAX Modem searches for an available wireless connection User s Guide Chapter 21 The Status Screen 21 2 3 DHCP Table Click Status gt DHCP Table to open this screen This read only screen shows the IP addresses Host Names and MAC addresses of the devices currently connected to the WiMAX Modem These settings can be configured in the ADVANCED gt
49. 3GMgROkeGF J95zYhld gMLShIYgLk8qQB7 uk JMemaDBeR 4edYWTGwPvCSETin60CjWxDkQmB3M4YYBY8k zMzhz4eL fp 4 UUMWosPKP4y9mbNCwUjH TIxXKDvkkZVXbmNuujUfJwZpQPlbhX M RSSjUCAWEAAaNNMEswDgYDVROPAQEABAQDAGKKMCUGA IUdEQQeMBYyBGjAWMTID QjAwMDAwMUBhdXRvLmdlbi5jZXJOMBIGA 1UdEwEBAAQIMAYBAfBCAQEwDQY JKoZI The following table describes the labels in this screen Table 60 TOOLS gt Certificates gt My Certificates gt Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate You can use up to 31 alphanumeric and amp _ characters Property Select Default self signed certificate which signs the imported remote host certificates to use this certificate to sign the remote host certificates you upload in the TOOLS gt Certificates gt Trusted CAs screen 174 User s Guide Chapter 15 The Certificates Screens Table 60 TOOLS gt Certificates gt My Certificates gt Edit LABEL DESCRIPTION Certification Path This field displays for a certificate not a certification request Click the Refresh button to have this read only text box display the hierarchy of certification authorities that validate the certificate and the certificate itself If the issuing certification authority is one that you have imported as a trusted certification authority it may be the only certification authority in the list along with the certificate itself I
50. 4 1 1 Advantages of Certificates Certificates offer the following benefits The WiMAX Modem only has to store the certificates of the certification authorities that you decide to trust no matter how many devices you need to authenticate Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys 15 4 1 2 Self signed Certificates You can have the WiMAX Modem act as a certification authority and sign its own certificates 15 4 1 3 Factory Default Certificate The WiMAX Modem generates its own unique self signed certificate when you first turn it on This certificate is referred to in the GUI as the factory default certificate 15 4 1 4 Certificate File Formats Any certificate that you want to import has to be in one of these file formats Binary X 509 This is an ITU T recommendation that defines the formats for X 509 certificates PEM Base 64 encoded X 509 This Privacy Enhanced Mail format uses lowercase letters uppercase letters and numerals to convert a binary X 509 certificate into a printable form Binary PKCS 7 This is a standard that defines the general syntax for data including digital signatures that may be encrypted A PKCS 7 file is used to transfer a public key certificate The private key is not included The WiMAX Modem currently allows the importation of a PKS 7 file that contains a single certificate PEM Base 64 enc
51. 65 Starting IP Address 192 168 100 33 Chapter 7 on page 73 Pool Size 32 DNS Servers From ISP In the Web Configurator open the SETUP Set IP Address screen and set the P Address to 192 168 100 1 Use the default IP Subnet Mask of 255 255 255 0 IP Address 192 168 100 1 IP Subnet Mask 255 255 255 0 2 Open the ADVANCED gt LAN Configuration gt DHCP Setup screen DHCP Setup Enable DHCP Server IP Pool Starting Address 192 168 100 33 Pool Size DNS Server DNS Servers Assigned by DHCP Server First DNS Server From ISP Second DNS Server From ISP Third DNS Server From ISP Select Enable DHCP Server then enter 192 168 100 34 as your IP Pool Starting Address and 32 for your Pool Size In the DNS Server section set the First Second and Third DNS Server fields to From ISP in order to use the DNS servers linked to your ISP Click Apply to save your DHOP settings User s Guide Chapter 5 Tutorials 6 Next go to the ADVANCED gt NAT Configuration gt General screen and select the Enable Network Address Translation option Enable Network Address Translation Max NAT Firewall Session Per User T 7 Click Apply to save your settings 8 Connect your computers to the WiMAX Modem s Ethernet ports and you re all set Note You may need to configure the computers on your LAN to automatically obtain IP addresses For information on how to do this see Appendix B on page 271 5 2
52. 76 6E A9 F5 07 41 BE 4C 8B 8B A2 D3 F0 2F Cipher in use DHE RSA AES256 SHA Details DHE RSA AES256 SHA SSLv3 Kx DH Au RSA Enc AES 256 Mac SHA1 SSL version TLSv1 SSLv3 Cipher strength 256 bits used of a 256 bit cipher Cryptography Configuration User s Guide 347 Appendix E Importing Certificates Installing a Stand Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you 1 Double click the public key certificate file Figure 204 Konqueror 3 5 Public Key Certificate File 2 Inthe Certificate Import Result Kleopatra dialog box click OK Figure 205 Konqueror 3 5 Certificate Import Result lg Certificate Import Result Kleop Detailed results of importing CA der ed Total number processed 1 Imported 1 The public key certificate appears in the KDE certificate manager Kleopatra Figure 206 Konqueror 3 5 Kleopatra Kleopatra File View Certificates CRLs Tools Settings Help search ____________________ ntecalcerfestes Subject Issuer Serial CN 10R CA 1 PN O Bundesnetzagentur C CN 10R CA 1 PN O B 2A CN 11R CA 1 PN O Bundesnetzagentur C CN 11R CA 1 PN O B 2D CN2172 20 37 202 0U XYZ200 0 ZyXEL CN 172 20 37 202 0 CN 6R Ca 1 PN NAMEDISTINGUISHER 1 0 CN 6R Ca 1 PN NAME CN 7R CA 1 PN NAMEDISTINGUI
53. Constraint This field displays general information about the certificate For example Subject Tyoe CA means that this is a certification authority s certificate and Path Length Constraint 1 means that there can only be one certification authority in the certificate s path This field does not display for a certification request MD5 Fingerprint This is the certificate s message digest that the WiMAX Modem calculated using the MD5 algorithm SHA1 Fingerprint This is the certificate s message digest that the WiMAX Modem calculated using the SHA1 algorithm Certificate in PEM Base 64 Encoded Format This read only text box displays the certificate or certification request in Privacy Enhanced Mail PEM format PEM uses lowercase letters uppercase letters and numerals to convert the binary certificate into a printable form You can copy and paste a certification request into a certification authority s web page an e mail that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment You can copy and paste a certificate into an e mail to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution via floppy disk for example Apply Click to save your changes Cancel Click to return to the previous screen without saving your chan
54. Guide Appendix Customer Support China ZyXEL Communications Shanghai Corp Support E mail cso zycn zyxel cn Sales E mail sales zyxel cn Telephone 86 021 61199055 Fax 86 021 52069033 Address 1005F ShengGao International Tower No 137 XianXia Rd Shanghai Web http www zyxel cn Costa Rica Support E mail soporte zyxel co cr Sales E mail sales zyxel co cr Telephone 506 2017878 Fax 506 2015098 Web www zyxel co cr Regular Mail ZyXEL Costa Rica Plaza Roble Escazu Etapa El Patio Tercer Piso San Jos Costa Rica Czech Republic E mail info cz zyxel com Telephone 420 241 091 350 Fax 420 241 091 359 Web www zyxel cz Regular Mail ZyXEL Communications Czech s r o Modransk 621 143 01 Praha 4 Modrany Cesk Republika Denmark Support E mail support zyxel dk Sales E mail sales zyxel dk Telephone 45 39 55 07 00 Fax 45 39 55 07 07 Web www zyxel dk Regular Mail ZyXEL Communications A S Columbusvej 2860 Soeborg Denmark Finland Support E mail support zyxel fi Sales E mail sales zyxel fi Telephone 358 9 4780 8411 User s Guide Appendix Customer Support Fax 358 9 4780 8448 Web www zyxel fi Regular Mail ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland France E mail info zyxel fr Telephone 33 4 72 52 97 97 Fax 33 4 72 52 19 20 Web www zyxel fr
55. Guide Chapter 23 Product Specifications Table 113 Voice Features Call waiting This feature allows you to hear an alert when you are already using the phone and another person calls you You can then either reject the new incoming call put your current call on hold and receive the new incoming call or end the current call and receive the new incoming call Call forwarding With this feature you can set the WiMAX Modem to forward calls to a specified number either unconditionally always when your number is busy or when you do not answer You can also forward incoming calls from one specified number to another Caller ID The WiMAX Modem supports caller ID which allows you to see the originating number of an incoming call on a phone with a suitable display REN A Ringer Equivalence Number REN is used to determine the number of devices like telephones or fax machines that may be connected to the telephone line Your device has a REN of three so it can support three devices per telephone port QoS Quality of Quality of Service QoS mechanisms help to provide better service Service on a per flow basis Your device supports Type of Service ToS tagging and Differentiated Services DiffServ tagging This allows the device to tag voice frames so they can be prioritized over the network SIP ALG Your device is a SIP Application Layer Gateway ALG It allows VolP calls to pass through NAT
56. II Science Based Industrial Park Hsinchu 300 Taiwan E mail techwriters zyxel com tw User s Guide 3 Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User s Guide Warnings tell you about things that could harm you or your WiMAX Modem Note Notes tell you other important information for example other things you may need to configure or helpful tips or recommendations Syntax Conventions The product s described in this book may be referred to as the WiMAX Modem the device the system or the product in this User s Guide Product labels screen names field labels and field choices are all in bold font A key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or choose means for you to use one of the predefined choices A right angle bracket gt within a screen name denotes a mouse click For example TOOLS gt Logs gt Log Settings means you first click Tools in the navigation panel then the Logs sub menu and finally the Log Settings tab to get to that screen Units of measurement may denote the metric value or the scientific value For example k for kilo may denote 1000 or 1024
57. IP Address An IP address identifies you to the network and you must have one to browse a local area network or surf the Internet Your IP address is generally assigned by a network administrator or ISP Select the option that is appropriate for your connection type My computer or device gets its IP address automatically from the network use fixed IP address The following table describes the labels in this screen Table 7 Internet Connection Wizard gt IP Address LABEL DESCRIPTION IP Address My computer or device Select this if you have a dynamic IP address A dynamic IP gets its IP address address is not fixed the ISP assigns you a different one automatically from the network Default each time you connect to the Internet Use Fixed IP Address A static IP address is a fixed IP that your ISP gives you Back Click to display the previous screen Next Click to proceed to the next screen Close Click to close the wizard screen without saving User s Guide Chapter 3 Internet Connection Wizard 3 1 5 Setup Complete Click Close to complete and save the Internet Connection Wizard settings Figure 10 Internet Connection Wizard gt Complete Setup Complete You have completed configuring your Internet connection Click the Close button to close the ZyXEL Setup Wizard and go to the main web configurator screen Close Launch your web browser and na
58. Information Type This field displays general information about the certificate CA signed means that a Certification Authority signed the certificate Self signed means that the certificate s owner signed the certificate not a certification authority X 509 means that this certificate was created and signed according to the ITU T X 509 recommendation that defines the formats for public key certificates Version u This field displays the X 509 version number Serial Number This field displays the certificate s identification number given by the certification authority or generated by the WiMAX Modem Subject This field displays information that identifies the owner of the certificate such as Common Name CN Organizational Unit OU Organization O and Country C Issuer This field displays identifying information about the certificate s issuing certification authority such as Common Name Organizational Unit Organization and Country With self signed certificates this is the same as the Subject Name field none displays for a certification request Signature Algorithm This field displays the type of algorithm that was used to sign the certificate The WiMAX Modem uses rsa pkcs1 shal RSA public private key encryption algorithm and the SHA1 hash algorithm Some certification authorities may use rsa pkcs1 md5 RSA public private key encryption algorithm and the MD5 hash algorithm
59. Modem The WiMAX Modem trusts any valid certificate signed by any of the imported trusted CA certificates Note You must remove any spaces from the certificate s filename before you can import the certificate Figure 76 TOOLS gt Certificates gt Trusted CAs gt Import Import Please specify the location of the certificate file to be imported The certificate file must be in one of the following formats e Binary X 509 e PEM Base 64 encoded X 509 e Binary PKCS 7 e PEM Base 64 encoded PKCS 7 e Binary PKCS 12 e PEM Base 64 encoded PKCS 12 For my certificate importation to be successful a certification request corresponding to the imported certificate must already exist on WiMAX CPE After the importation the certification request will automatically be deleted File Path Browse The following table describes the labels in this screen Table 65 TOOLS gt Certificates gt Trusted CAs Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it Choose Click to find the certificate file you want to upload Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 15 4 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter User s Guide Chapter 15 The C
60. Proxy Keyword Blocking Enable URL Keyword Blocking Keyword Keyword List _ Clear Al Message to display when a site is blocked Denied Access Message 2 Select Enable URL Keyword Blocking Enable URL Keyword Blocking User s Guide Chapter 5 Tutorials Enter the first Keyword then click Add Repeat for additional keywords Enable URL Keyword Blocking Keyword poker As you enter them the keywords appear in the Keyword List Keyword List poker sex beer Optional If you want to allow websites with these keywords for a specific computer in your household such as the computer in the master bedroom then add that computer s IP address to the Trusted I P Address field Trusted IP Setup A trusted computer has full access to all blocked resources 0 0 0 0 means there is no trusted computer Trusted Computer IP Address 192 168 1 22 Click Apply to save these settings Next open the TOOLS gt Content Filter gt Schedule screen Day to Block Everyday Sun v Mon v Tue v wed v Thu M rri v sat Time of Day to Block 24 Hour Format all day From Start hour min End hour min To keep things simple set the Days to Block to Everyday and the Time of Day to Block to All Day Click Apply to save these settings User s Guide Chapter 5 Tutorials 5 3 Configuring Your Internet Phone This tutorial shows you how to configure the WiMAX Modem s VoIP sett
61. Regular Mail ZyXEL France 1 rue des Vergers Bat 1 C 69760 Limonest France Germany Support E mail support zyxel de Sales E mail sales zyxel de Telephone 49 2405 6909 69 Fax 49 2405 6909 99 Web www zyxel de Regular Mail ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany Hungary Support E mail support zyxel hu Sales E mail info zyxel hu Telephone 36 1 3361649 Fax 36 1 3259100 Web www zyxel hu Regular Mail ZyXEL Hungary 48 Zoldlomb Str H 1025 Budapest Hungary India Support E mail support zyxel in Sales E mail sales zyxel in Telephone 91 11 30888144 to 91 11 30888153 Fax 91 11 30888149 91 11 26810715 Web http www zyxel in e Regular Mail India ZyXEL Technology India Pvt Ltd II Floor F2 9 Okhla Phase 1 New Delhi 110020 India User s Guide Appendix Customer Support Japan Support E mail support zyxel co jp Sales E mail zyp zyxel co jp Telephone 81 3 6847 3700 Fax 81 3 6847 3705 Web www zyxel co jp Regular Mail ZyXEL Japan 3F Office T amp U 1 10 10 Higashi Gotanda Shinagawa ku Tokyo 141 0022 Japan Kazakhstan Support http zyxel kz support Sales E mail sales zyxel kz Telephone 7 3272 590 698 Fax 7 3272 590 689 Web www zyxel kz Regular Mail ZyXEL Kazakhstan 43 Dostyk Ave Office 414 Dostyk Business Centre 050010 Almaty Republic of Kazakhstan Malaysia Support
62. Screens For type and code details see Table 97 on page 231 Table 91 ICMP Logs LOG MESSAGE DESCRIPTION lt Packet Direction gt lt rule d gt type d lt code d gt Firewall default policy ICMP ICMP access matched the default policy and was lt Packet Direction gt lt type d gt blocked or forwarded according to the user s lt code d gt setting Firewall rule NOT match ICMP CMP access matched or didn t match a firewall rule denoted by its number and was blocked or forwarded according to the rule Triangle route packet forwarded ICMP The firewall allowed a triangle route session to pass through Packet without a NAT table entry blocked ICMP The router blocked a packet that didn t have a corresponding NAT table entry Unsupported out of order ICMP The firewall does not support this kind of ICMP ICMP packets or the I CMP packets are out of order Router reply ICMP packet ICMP The router sent an ICMP reply packet to the sender Table 92 PPP Logs LOG MESSAGE DESCRIPTION ppp LCP Starting The PPP connection s Link Control Protocol stage has started ppp LCP Opening The PPP connection s Link Control Protocol stage is opening ppp CHAP Opening The PPP connection s Challenge Handshake Authentication Protocol stage is opening ppp IPCP Starting starting The PPP connection s Internet Protocol Control Protocol stage
63. Selected 0 0 0 0 Apply Reset The following table describes the labels in this screen Table 75 TOOLS gt Remote Management gt SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community which is the password for the incoming Get and GetNext requests from the management station The default is public and allows all requests Set Community Enter the Set community which is the password for incoming Set requests from the management station The default is public and allows all requests Trap Community Enter the trap community which is the password sent with each trap to the SNMP manager The default is public and allows all requests Trap Destination Enter the IP address of the station to send your SNMP traps to SNMP Port You may change the server port number for a service if needed however you must use the same port number in order to use that service for remote management Access Status Select the interface s through which a computer may access the WiMAX Modem using this service User s Guide Chapter 18 The Remote Management Screens Table 75 TOOLS gt Remote Management gt SNMP continued LABEL DESCRIPTION Secured Client IP A secured client is a trusted computer that is allowed to communicate with the WiMAX Modem using this service Select All to allow any computer to access the WiMAX Modem using this servi
64. Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter 16 4 1 Stateful Inspection Firewall Stateful inspection firewalls restrict access by screening data packets against defined access rules They make access control decisions based on IP address and protocol They also inspect the session data to assure the integrity of the connection and to adapt to dynamic protocols These firewalls generally provide the best speed and transparency however they may lack the granular application level access control or caching that some proxies support Firewalls of one type or another have become an integral part of standard security solutions for enterprises User s Guide Chapter 16 The Firewall Screens 16 4 2 16 4 3 Guidelines For Enhancing Security With Your Firewall Change the default password via web configurator Think about access control before you connect to the network in any way Limit who can access your router Don t enable any local service such as telnet or FTP that you don t use Any enabled service could present a potential security risk A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network For local services that are enabled protect against misuse Protect by configuring the services to communicate only with specific peers and protect by configuri
65. The base station is the client and the server is the RADIUS server The RADIUS server handles the following tasks Authentication Determines the identity of the users Authorization Determines the network services available to authenticated users once they are connected to the network Accounting Keeps track of the client s network activity RADIUS is a simple package exchange in which your base station acts as a message relay between the MS SS and the network RADIUS server Types of RADIUS Messages The following types of RADIUS messages are exchanged between the base station and the RADIUS server for user authentication Access Request Sent by an base station requesting authentication Access Reject Sent by a RADIUS server rejecting access Access Accept Sent by a RADIUS server allowing access e Access Challenge Sent by a RADIUS server requesting more information in order to allow access The base station sends a proper response from the user and then sends another Access Request message The following types of RADIUS messages are exchanged between the base station and the RADIUS server for user accounting Accounting Request Sent by the base station requesting accounting Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the access point and the RADIUS server use a shared secret key which is a password they both
66. Up Your Computer s IP Address 6 Select Internet Protocol Version 4 TCP IPv4 and then select Properties Figure 117 Windows Vista Local Area Connection Properties Local ct operties Networking Connect using La Intel R PRO 1000 MT Desktop Connection This connection uses the following items vi Client for Microsoft Networks vi d Network Monitor3 Driver ivi 5 File and Printer Sharing for Microsoft Networks wee ntemet Protocol Version 4 TCP IF v4 pee M Link Layer Topology Discovery Mapper I O Driver M Link Layer Topology Discovery Responder v p X i Uninstall Properties 2 Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks OK Cancel User s Guide 277 Appendix B Setting Up Your Computer s IP Address 7 The Internet Protocol Version 4 TCP IPv4 Properties window opens Figure 118 Windows Vista Internet Protocol Version 4 TCP IPv4 Properties Internet Protocol Version 4 TCP IPv4 Properties eo General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator For the appropriate IP settings Use the Following IP address Obtain DNS server address automatically Use the Following DNS serv
67. User s Guide Chapter 11 The System Configuration Screens 11 5 1 The Restore Configuration Process When the WiMAX Modem restores a configuration file the device automatically restarts This causes a temporary network disconnect Note Do not turn off the device while configuration file upload is in progress If the WiMAX Modem s IP address is different in the configuration file you selected you may need to change the IP address of your computer to be in the same subnet as that of the default management IP address 192 168 5 1 See the Quick Start Guide or the appendices for details on how to set up your computer s IP address You might have to open a new browser to log in again If the upload was not successful you are notified by Configuration Upload Error message Click Return to go back to the Configuration screen 11 6 Restart Click ADVANCED gt System Configuration gt Restart to reboot the WiMAX Modem without turning the power off Note Restarting the WiMAX Modem does not affect its configuration Figure 55 ADVANCED gt System Configuration gt Restart Click Restart to have the device perform a software restart The power LED blinks as the device restarts and then shines steadyily if the restart is successful Wait a minute before logging into the device again The following table describes the labels in this screen Table 42 ADVANCED gt System Configuration gt Restart LABEL DES
68. Waiting Indication Event Package for the Session Initiation Protocol SIP User s Guide Chapter 23 Product Specifications Table 112 Standards Supported continued STANDARD DESCRIPTION IEEE 802 3 1LOBASE5 10 Mbit s 1 25 MB s IEEE 802 3u 100BASE TX 100BASE T4 100BASE FX Fast Ethernet at 100 Mbit s 12 5 MB s with auto negotiation Table 113 Voice Features Call Park and Call park and pickup lets you put a call on hold park and then Pickup continue the call pickup The caller must still pay while the call is parked When you park the call you enter a number of your choice up to eight digits which you must enter again when you pick up the call If you do not enter the correct number you cannot pickup the call This means that only someone who knows the number you have chosen can pick up the call You can have more than one call on hold at the same time but you must give each call a different number Call Return With call return you can place a call to the last number that called you either answered or missed The last incoming call can be through either SIP or PSTN Country Code Phone standards and settings differ from one country to another so the settings on your WiMAX Modem must be configured to match those of the country you are in The country code feature allows you to do this by selecting the country from a list rather than changing each setting manually Configure the coun
69. Warning Open File Security Warning Do you want to open this file Name CA cer Publisher Unknown Publisher Type Security Certificate From D Documents and Settings 13435 Desktop Always ask before opening this file potentially harm your computer If you do not trust the source do not 9 While files from the Intemet can be useful this file type can open this software What s the risk 3 Refer to steps 4 12 in the Internet Explorer procedure beginning on page 322 to complete the installation process User s Guide Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7 1 Open Internet Explorer and click TOOLS gt Internet Options Figure 175 Internet Explorer 7 Tools Menu t a iz Page MES Delete Browsing History Pop up Blocker Phishing Filter Manage Add ons Work Offline Windows Update Full Screen Menu Bar Toolbars Windows Messenger Diagnose Connection Problems Sun Java Console Internet Options 2 Inthe Internet Options dialog box click Content gt Certificates Figure 176 Internet Explorer 7 Internet Options Internet Options PR General Security Priva Content Qpnnections Programs Advanced t Content Advisor Ratings help you control the Internet content that can be viewed on this computer Certificates Use certificates for encrypted connecti
70. WiMAX Modem generate the certificate and act as the Certification Authority CA itself This way you do not need to apply to a certification authority for certificates Create a certification request and save it locally for later manual enrollment Select Create a certification request and save it locally for later manual enrollment to have the WiMAX Modem generate and store a request for a certificate Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority Copy the certification request from the My Certificate Details screen and then send it to the certification authority User s Guide 171 Chapter 15 The Certificates Screens 172 Table 59 TOOLS gt Certificates gt My Certificates gt Create LABEL DESCRIPTION Create a certification request and enroll for a certificate immediately online Select Create a certification request and enroll for a certificate immediately online to have the WiMAX Modem generate a request for a certificate and apply to a certification authority for a certificate You must have the certification authority s certificate already imported in the Trusted CAs screen When you select this option you must select the certification authority s enrollment protocol and the certification authority s certificate from the drop down list boxes and enter the certification authority s server address You a
71. WiMAX Modem s SIP packets and sends them to the WiMAX Modem 3 The WiMAX Modem uses the public IP address and port number in the SIP packets that it sends to the SIP server C Figure 57 STUN Example 12 2 1 2 Outbound Proxy Your VoIP service provider may host a SIP outbound proxy server to handle all of the WiMAX Modem s VoIP traffic This allows the WiMAX Modem to work with any type of NAT router and eliminates the need for STUN or a SIP ALG Turn off a SIP ALG on a NAT router in front of the WiMAX Modem to keep it from re translating the IP address since this is already handled by the outbound proxy server 12 2 1 3 Voice Coding A codec coder decoder codes analog voice signals into digital signals and decodes the digital signals back into voice signals The WiMAX Modem supports the following codecs User s Guide 135 Chapter 12 The Service Configuration Screens G 711 is a Pulse Code Modulation PCM waveform codec PCM measures analog signal amplitudes at regular time intervals sampling and converts them into digital bits quantization Quantization reads the analog signal and then writes it to the nearest digital value For this reason a digital sample is usually slightly different from its analog original this difference is known as quantization noise G 711 provides excellent sound quality but requires 64kbps of bandwidth G 723 is an Adaptive Differential Pulse Code Modulation A
72. X 509 es xnview Binary PKCS 7 My Recent E 014125 040 jpg e PEM Base 64 encoded PKCS 7 Documents GSS e Binary PKCS 12 e PEM Base 64 encoded PKCS 12 i For my certificate importation to be successful a c exist on WiMAX CPE After the importation the ce My Documents 48 My Computer File Path DDownloads utorial cer File name tutorial cer My Network Files of type All Files 3 Next go to the ADVANCED gt WAN Configuration screen and configure your new Internet access settings based on the information provided by your ISP ISP Parameters for Internet Access User Name abcd example com Password eecccccce Anonymous Identity PKM PKMV2 v Authentication TILS v Certificate WAN IP Address Assignment 9 Get automatically from ISP Default Use Fixed IP Address IP Address 0 0 0 0 IP Subnet Mask 0 0 0 0 Gateway IP Address 0 0 0 0 Note You can also use the Internet Connection Wizard to configure these settings 4 From the Certificates menu select the security certificate that you just imported 5 Click Apply to save your settings You should now be able to connect to the Internet through your new service provider User s Guide Chapter 5 Tutorials 5 2 3 Blocking Web Access During Specific Hours 1 If your WiMAX Modem is in a home or office environment you may decide that you want to block web access and video chat during a specific block of hours such as during your
73. ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal or higher value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product has been modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or User s Guide Appendix H Legal Information implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser To obtain the services of this warranty contact your vendor You may also refer to the warranty policy for the region in which you bought the device
74. certificate Windows will automatically trust any certificate issued by this CA Installing a certificate with an unconfirmed thumbprint is a security risk If you dick Yes you acknowledge this risk Do you want to install this certificate 326 User s Guide Appendix E Importing Certificates 11 Finally click OK when presented with the successful certificate installation message Figure 171 Internet Explorer 7 Certificate Import Wizard Certificate Import Wizard e L The import was successful Lox 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page a sealed padlock icon appears in the address bar Click it to view the page s Website Identification information EE Website Identification 172 20 37 202 has identified t 172 20 37 202 This connection to the server is encrypted Should trust this site View certificates User s Guide 327 Appendix E Importing Certificates Installing a Stand Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you 1 Double click the public key certificate file Figure 173 Internet Explorer 7 Public Key Certificate File Rie S5 TET 2 In the security warning dialog box click Open Figure 174 Internet Explorer 7 Open File Security
75. certificate has expired Action Click the Edit icon to open a screen with an in depth list of information about the certificate Click the Export icon to save a copy of the certificate without its private key Browse to the location you want to use and click Save Click the Delete icon to remove a certificate A window displays asking you to confirm that you want to delete the certificate Subsequent certificates move up by one when you take this action The WiMAX Modem keeps all of your certificates unless you specifically delete them Uploading new firmware or default configuration file does not delete your certificates You cannot delete certificates that any of the WiMAX Modem s features are configured to use Import Click to a certificate into the WiMAX Modem Create Click to go to the screen where you can have the WiMAX Modem generate a certificate or a certification request Refresh Click to display the current validity status of the certificates User s Guide Chapter 15 The Certificates Screens 15 2 1 My Certificates Create Click TOOLS gt Certificates gt My Certificates and then the Create icon to open the My Certificates Create screen Use this screen to have the WiMAX Modem create a self signed certificate enroll a certificate with a certification authority or generate a certification request Figure 71 TOOLS gt Certificates gt My Certificates gt Create
76. connected User s Guide 273 Appendix B Setting Up Your Computer s IP Address 5 The Internet Protocol TCP IP Properties window opens Figure 111 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses Advanced 6 Select Obtain an I P address automatically if your network administrator or ISP assigns your IP address dynamically Select Use the following I P Address and fill in the IP address Subnet mask and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided 7 Click OK to close the Internet Protocol TCP IP Properties window Click OK to close the Local Area Connection Properties window Verifying Settings 1 Click Start gt All Programs gt Accessories gt Command Prompt 2 Inthe Command Prompt window type ipconfig and then press ENTER You can also go to Start gt Control Panel gt Network Connections righ
77. daughter s designated study hours Goal Configure the WiMAX Modem s firewall to block web and video chat access on weekdays between the hours of 3 30 PM and 8 30 PM See Also Chapter 16 on page 189 Open the TOOLS gt Firewall gt Services to screen Service Setup Enable Services Blocking Available Services Blocked Services Custom Port Any TCP Any UDP IPSEC TUNNEL ESP 0 MULTICAST IGMP 0 PING ICMP 0 PPTP TUNNEL GRE 0 BGP TCP 179 Select Custom Port you can give new port range for blocking Type TCP Port Number 0 Schedule to Block Day to Block Everyday O sun J Mon O Tue O wed O Thu O Fi EL Sat Time of Day to Block 24 Hour Format All day From Start o hour o min End o hour o 2 Select Enable Services Blocking Enable Services Blocking User s Guide Chapter 5 Tutorials 3 Under Available Services select HTTP TCP 80 then click the Add button Repeat this for CU SEEME TCP UDP 7648 24032 Available Services Available Services BOOTP CLIENT UDP 68 in BOOTP CLIENT uDP c BOOTP_SERVER UDP 67 CU SEEME TCP UDP 7648 124032 DNS TCP UDP 53 DNS TCP UDP 53 l FINGER TCP 79 FINGER TCP 79 FTP TCP 20 21 FTP TCP 20 21 ERO CP 80 i HTTP TCP 80 ICQ UDP 4000 ba ICQ UDP 4000 This blocks all web and video chat traffic while leaving other ports open for other types of traffic such as ports 25 and 587 for e mail and po
78. followed by the key if you wish to clear all your custom tones 3 You can continue to add listen to or delete tones or you can hang up the receiver when you are done User s Guide Chapter 12 The Service Configuration Screens 12 3 QoS Network traffic can be classified by setting the ToS Type Of Service values at the data source for example at the WiMAX Modem so a server can decide the best method of delivery that is the least cost fastest route and so on Virtual Local Area Network VLAN allows a physical network to be partitioned into multiple logical networks Only stations within the same group can communicate with each other Your WiMAX Modem can add IEEE 802 1Q VLAN ID tags to voice frames that it sends to the network This allows the WiMAX Modem to communicate with a SIP server that is a member of the same VLAN group Some ISPs use the VLAN tag to identify voice traffic and give it priority over other traffic Click VOI CE gt Service Configuration gt QoS to set up and maintain ToS and VLAN settings for the WiMAX Modem QoS Quality of Service refers to both a network s ability to deliver data with minimum delay and the networking methods used to provide bandwidth for real time multimedia applications Figure 59 VOICE gt Service Configuration gt QoS TOS SIP TOS Priority Setting 5 0 255 RTP TOS Priority Setting 5 0 255 VLAN Taging C Voice VLAN ID 5 0 4095 The following ta
79. for devices behind it such as a SIP based VoIP software application on a computer Other Voice SIP version 2 Session Initiating Protocol RFC 3261 Features SDP Session Description Protocol RFC 2327 RTP RFC 1889 RTCP RFC 1890 Voice codecs coder decoders G 711 G 726 G 729 Fax and data modem discrimination DTMF Detection and Generation DTMF In band and Out band traffic RFC 2833 PCM SIP INFO Point to point call establishment between two ADs Quick dialing through predefined phone book which maps the phone dialing number and destination URL Flexible Dial Plan RFC3525 section 7 1 14 Table 114 Star and Pound Code Support 0 Wireless Operator Services 2 Customer Care Access 66 Repeat Dialing 67 Plus the 10 digit phone number to block Caller ID on a single call basis 69 Return last call received User s Guide Chapter 23 Product Specifications Table 114 Star and Pound Code Support 70 Followed by the 10 digit phone number to cancel Call Waiting on a single call basis 72 Activate Call Forwarding 72 followed by the 10 digit phone number that is requesting call forwarding service 720 Activate Call Forwarding 720 followed by the 10 digit phone number that is requesting deactivation of call forwarding service 73 Plus the forward to phone number to activate Call Forwarding No Answer no VM service pl
80. for it is forwarded to the default server If the default is not defined the service request is simply discarded User s Guide Chapter 10 The NAT Configuration Screens For example let s say you want to assign ports 21 25 to one FTP Telnet and SMTP server A in the example port 80 to another B in the example and assign a default server IP address of 192 168 1 35 to a third C in the example You assign the LAN IP addresses and the ISP assigns the WAN IP address The NAT network appears as a single host on the Internet Figure 45 Multiple Servers Behind NAT Example A 192 168 1 33 192 168 1 1 10 3 1 Port Forwarding Options Click ADVANCED gt NAT Configuration gt Port Forwarding to look at the current port forwarding rules in the WiMAX Modem and to enable disable activate and deactivate each one You can also set up a default server to handle ports not covered by rules Figure 46 ADVANCED gt NAT Configuration gt Port Forwarding Default Server Setup Default Server 0 00 0 Port Forwarding Active Name Start Port End Port Server IP Address Action 1 0 0 g 2 0 0 EP A 3 0 0 gA eT User s Guide n Chapter 10 The NAT Configuration Screens The following table describes the icons in this screen Table 33 Advanced NAT Configuration gt Port Forwarding ICON DESCRIPTION g Edit Click to edit this item dur Delete Click to d
81. higher signal quality and a lower value indicates a lower signal quality CI NR deviation This field shows the amount of change in the CINR level This value is an indication of radio signal stability A lower number indicates a more stable signal and a higher number indicates a less stable signal RSSI This field shows the Received Signal Strength Indication This value is a measurement of overall radio signal strength A higher RSSI level indicates a stronger signal and a lower RSSI level indicates a weaker signal A strong signal does not necessarily indicate a good signal a strong signal may have a low signal to noise ratio SNR UL Data Rate This field shows the number of data packets uploaded from the WiMAX Modem to the base station each second DL Data Rate This field shows the number of data packets downloaded to the WiMAX Modem from the base station each second Tx Power This field shows the output transmission Tx level of the WiMAX Modem System Status System Uptime This field displays how long the WiMAX Modem has been running since it last started up The WiMAX Modem starts up when you plug it in when you restart it ADVANCED gt System Configuration gt Restart or when you reset it Current Date Time This field displays the current date and time in the WiMAX Modem You can change this in SETUP gt Time Setting User s Guide 237 Chapter 21 T
82. is ppp IPCP Opening opening The PPP connection s Internet Protocol Control Protocol stage is ppp LCP Closing The PPP connection s Link Control Protocol stage is closing ppp IPCP Closing closing The PPP connection s Internet Protocol Control Protocol stage is Table 93 UPnP Logs LOG MESSAGE DESCRIPTION UPnP pass through Firewall UPnP packets can pass through the firewall User s Guide Chapter 20 The Logs Screens Table 94 Content Filtering Logs LOG MESSAGE DESCRIPTION 851 Keyword blocking The content of a requested web page matched a user defined keyword Not in trusted web LISE The web site is not in a trusted domain and the router blocks all traffic except trusted domain sites Forbidden Web site Ss The web site is in the forbidden web site list Contains ActiveX 9 The web site contains ActiveX o Ss Contains Java applet The web site contains a J ava applet Contains cookie Ss The web site contains a cookie Ss Proxy mode detected The router detected proxy mode in the packet Trusted Web site Ss The web site is in a trusted domain oe S When the content filter is not on according to the time schedule Waiting content filter server timeout The external content filtering server did not respond within the timeout period DNS resolving failed
83. it hang up the phone European Three Way Conference allows you to make three way conference calls To do so 1 When you are on the phone talking to someone place the flash key to put the caller on hold and get a dial tone 2 Dial a phone number directly to make another call 3 When the second call is answered press the flash key and press 3 to create a three way conversation User s Guide 155 Chapter 13 The Phone Screens 4 5 13 5 3 Hang up the phone to drop the connection If you want to separate the activated three way conference into two individual connections one is on line the other is on hold press the flash key and press 42 USA Type Supplementary Services This section describes how to use supplementary phone services with the USA Type Call Service Mode Commands for supplementary services are listed in the table below After pressing the flash key if you do not issue the sub command before the default sub command timeout 2 seconds expires or issue an invalid sub command the current operation will be aborted Table 53 USA Type Flash Key Commands SUB COMMAND COMMAND DESCRIPTION Flash Put a current call on hold to place a second call After the second call is successful press the flash key again to have a three way conference call Put a current call on hold to answer an incoming call Flash 983t Transfer the call to another phone USA Call Hold allo
84. lost connection Echo Cancellation You device supports G 168 of at least 24 ms This an ITU T standard for eliminating the echo caused by the sound of your voice reverberating in the telephone receiver while you talk Time and Date Get the current time and date from an external server when you turn on your WiMAX Modem You can also set the time manually Logging Use the WiMAX Modem s logging feature to view connection history surveillance logs and error messages Codecs Enhanced Variable Rate Codec EVRC G 711 PCM p law and a law G 729a and G 723 1 Fax Support T 38 FAX relay FAX over UDP G 711 fax relay for fax calls and be able to renegotiate codec to G 711 if a fax call is detected Ring Tones Supports different distinctive ring tones on each line Call Prioritization Prioritize VoIP traffic originating from the RJ 11 ports over any other traffic User s Guide Chapter 23 Product Specifications Table 112 Standards Supported STANDARD DESCRIPTION RFC 768 User Datagram Protocol RFC 791 Internet Protocol v4 RFC 792 Internet Control Message Protocol RFC 792 Transmission Control Protocol RFC 826 Address Resolution Protocol RFC 854 Telnet Protocol RFC 1349 Type of Service Protocol RFC 1706 DNS NSAP Resource Records RFC 1889 Real time Transpor
85. mask on the WAN DHCP This field displays what DHCP services the WiMAX Modem is using in the WAN Choices are Client The WiMAX Modem is a DHCP client in the WAN Its IP address comes from a DHCP server on the WAN None The WiMAX Modem is not using any DHCP services in the WAN It has a static IP address LAN Information P Address This field displays the current IP address of the WiMAX Modem in the LAN IP Subnet Mask This field displays the current subnet mask in the LAN DHCP This field displays what DHCP services the WiMAX Modem is providing to the LAN You can change this in ADVANCED gt LAN Configuration gt DHCP Setup WiMAX Information Operator ID Every WiMAX service provider has a unique Operator ID number which is broadcast by each base station it owns You can only connect to the Internet through base stations belonging to your service provider s network BSID This field displays the identification number of the wireless base station to which the WiMAX Modem is connected Every base station transmits a unique BSID which identifies it across the network Frequency This field displays the radio frequency of the WiMAX Modem s wireless connection to a base station MAC address This field displays the Media Access Control address of the WiMAX Modem Every network device has a unique MAC address which identifies it across the network User s Guide Chapter 21 The S
86. media bar Enable Automatic Image Resizing Mozilla Firefox A 2 gt Restore Defaults Mozilla Firefox 2 0 screens are used here Screens for other versions may vary You can enable Java Javascripts and pop ups in one screen Click Tools then click Options in the screen that appears Figure 153 Mozilla Firefox TOOLS gt Options IEEE Help Web Search Ctrl K Downloads Add ons Ctrl Web Developer Error Console Adblock Plus Page Info Ctrl Shift 4 FireFTP Clear Private Data Session Manager Ctrl Shift Del Tab Mix Plus Options User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions Click Content to show the screen below Select the check boxes as shown in the following screen Figure 154 Mozilla Firefox Content Security x qa mm wa Privacy Security Advanced Block pop up windows Exceptions IV Load images automatically Exceptions IV Enable JavaScript Advanced IV Enable Java r Fonts amp Colors Default Font Times New Roman Size 16 v Advanced Colors r File Types Configure how Firefox handles certain types of Files Manage NN User s Guide 307 Appendix C Pop up Windows JavaScripts and Java Permissions User s Guide IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks IP addresses identify i
87. not one masquerading as it However because the certificates were not issued by one of the several organizations officially recognized by the most common web browsers you will need to import the ZyXEL created certificate into your web browser and flag that certificate as a trusted authority Note You can see if you are browsing on a secure website if the URL in your web browser s address bar begins with https or there is a sealed padlock icon amp somewhere in the main browser window not all browsers show the padlock in the same location In this appendix you can import a public key certificate for Internet Explorer on page 322 Firefox on page 332 Opera on page 338 Konqueror on page 346 User s Guide 321 Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional however they can also apply to Internet Explorer on Windows Vista 1 If your device s web configurator is set to use SSL certification then the first time you browse to it you are presented with a certification error Figure 161 Internet Explorer 7 Certification Error We Be Certificate Error Navigation Blocked 9 There is a problem with this website s security certificate The security certificate presented by this website was not issued by a trusted certificate authority The security certificate presented by this website was issued for a d
88. of plain text is encrypted Counter mode avoids the security weakness of repeated identical blocks of encrypted text that makes encrypted data vulnerable to pattern spotting Cipher Block Chaining Message Authentication also known as CBC MAC ensures message integrity by encrypting each block of plain text in such a way that its encryption is dependent on the block before it This series of chained blocks creates a message authentication code MAC or CMAC that ensures the encrypted data has not been tampered with User s Guide Appendix A WiMAX Security Authentication The WiMAX Modem supports EAP TTLS authentication EAP TTLS Tunneled Transport Layer Service 270 EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the server side authentications to establish a secure connection with EAP TLS digital certifications are needed by both the server and the wireless clients for mutual authentication Client authentication is then done by sending username and password through the secure connection thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 User s Guide Setting Up Your Computer s IP Address Note Your specific ZyXEL device may not support all of the operating systems described in this appendix See the product specifications for more information about w
89. saved settings User s Guide Chapter 16 The Firewall Screens 16 3 Services Click TOOLS gt Firewall gt Services to enable service blocking set up the date and time service blocking is effective and to maintain the list of services you want to block Figure 82 TOOLS gt Firewall gt Service Setting Service Setup Enable Services Blocking Custom Port Any TCP Any UDP IPSEC_TUNNEL ESP 0 MULTICAST IGMP 0 PING ICMP 0 PPTP TUNNEL GRE 0 BGP TCP 179 v Select Custom Port you can give new port range for blocking Schedule to Block Day to Block Everyday O sun O Mon O Tue O wed O Thu O fi O sat Time of Day to Block 24 Hour Format All day From Start o hour o min End o Available Services Blocked Services Type TCP w Port Number o hour 0 o min The following table describes the labels in this screen Table 67 TOOLS gt Firewall gt Service Setting LABEL DESCRIPTION Service Setup Enable Services Select this to activate service blocking The Schedule to Block section Number fields Blocking controls what days and what times service blocking is actually effective however Available This is a list of pre defined services destination ports you may prohibit Services your LAN computers from using Select the port you want to block and click Add to add the port to the Blocked Ser
90. scan TCP The firewall detected a TCP port scan attack teardrop TCP The firewall detected a TCP teardrop attack teardrop UDP The firewall detected an UDP teardrop attack teardrop ICMP type 3d The firewall detected an ICMP teardrop attack illegal command TCP The firewall detected a TCP illegal command attack NetBIOS TCP The firewall detected a TCP NetBIOS attack ip spoofing entry TCP ESP GRE no routing UDP IGMP OSPF The firewall classified a packet with no source routing entry as an IP spoofing attack ip spoofing no routing The firewall classified an ICMP packet with no source TGR entry ICMP type d routing entry as an IP spoofing attack code d vulnerability ICMP The firewall detected an ICMP vulnerability attack type d code d traceroute ICMP type d The firewall detected an ICMP traceroute attack code d ports scan UDP The firewall detected a UDP port scan attack Firewall sent TCP packet The firewall sent TCP packet in response to a DoS attack in response to DoS attack ICMP Source Quench ICMP The firewall detected an ICMP Source Quench attack ICMP Time Exceed ICMP The firewall detected an ICMP Time Exceed attack ICMP Destination Unreachable ICMP The firewall detected an ICMP Destination Unreachable attack ping of death ICMP The firewall detected an ICMP ping of death attack smurf
91. select an alternative action Unconditional The WiMAX Modem immediately forwards any calls from the Incoming Call Number to the Forward to Number Busy The WiMAX Modem forwards any calls from the Incoming Call Number to the Forward to Number when your SIP account already has a call connected No Answer The WiMAX Modem forwards any calls from the Incoming Call Number to the Forward to Number when the call is unanswered See No Answer Waiting Time Block The WiMAX Modem rejects calls from the Incoming Call Number orks The WiMAX Modem allows calls from the Incoming Call Number You might create a rule with this condition if you do not want incoming calls from someone to be forwarded by rules in the Forward to Number section Apply Click to save your changes Reset Click to restore your previously saved settings Note The WiMAX Modem checks the Advanced rules first before checking the Forward to Number rules All rules are checked in order from top to bottom User s Guide Chapter 14 The Phone Book Screens 14 3 Speed Dial Click VOICE gt Phone Book gt Speed Dial to add edit or remove speed dial entries You must create speed dial entries if you want to make peer to peer calls or call SIP numbers that use letters You can also create speed dial entries for frequently used SIP phone numbers Figure 69 VOICE gt Phone Book gt Speed Dial Speed Dial Setup
92. speed dial entry You do not need to configure a SIP account in order to make a peer to peer VoIP call User s Guide Chapter 14 The Phone Book Screens 14 2 Incoming Call Policy Click VOICE gt Phone Book gt Incoming Call Policy to maintain rules for handling incoming calls You can block redirect or accept them Figure 68 VOICE gt Phone Book gt Incoming Call Policy Table Number Table 1 Forward to Number Setup CI Unconditional Forward to Number C Busy Forward to Number C No Answer Forward to Number No Answer Waiting Time 5 Second Advanced Setup Incoming Call Number Forward to Number Condition 1 Unconditional v 2 Unconditional Unconditional v Unconditional v Unconditional v Unconditional v Unconditional v Unconditional Unconditional v 4 noone ooo 10 Unconditional v The following table describes the labels in this screen Table 54 VOICE gt Phone Book gt Incoming Call Policy LABEL DESCRIPTION Table Number Select the call forwarding table you want to see in this screen If you change this field the screen automatically refreshes Forward to Number Setup Unconditional Select this if you want the WiMAX Modem to forward all incoming calls Forward to to the specified phone number regardless of other rules in the Number Forward to Number section Specify the phone number in the field on the right Busy Forward Select this i
93. the SIP server based on the specified interval Keep Alive with SIP Proxy Select this if the SIP server is a SIP proxy server Keep Alive with Outbound Proxy Select this if the SIP server is an outbound proxy server You must enable Outbound Proxy to use this Keep Alive Interval Enter how often in seconds the WiMAX Modem should send SIP notify messages to the SIP server MWI Message Waiting Indication Enable Select this if you want to hear a waiting beeping dial tone on your phone when you have at least one voice message Your VoIP service User s Guide provider must support this feature Chapter 12 The Service Configuration Screens Table 44 VOICE gt Service Configuration gt SIP Settings gt Advanced continued LABEL DESCRIPTION Expiration Time Keep the default value unless your VolP service provider tells you to change it Enter the number of seconds the SIP server should provide the message waiting service each time the WiMAX Modem subscribes to the service Before this time passes the WiMAX Modem automatically subscribes again Fax Option G 711 Fax Select this if the WiMAX Modem should use G 711 to send fax Passthrough messages The peer devices must also use G 711 T 38 Fax Relay Select this if the WiMAX Modem should send fax messages as UDP or TCP IP packets through IP networks This provides better quality but it may have inter operabil
94. the labels in this screen Table 64 TOOLS gt Certificates gt Trusted CAs gt Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate You can use up to 31 alphanumeric and amp _ characters Property Select Default self signed certificate which signs the imported remote host certificates to use this certificate to sign the remote host certificates you upload in the TOOLS gt Certificates gt Trusted CAs screen User s Guide Chapter 15 The Certificates Screens Table 64 TOOLS gt Certificates gt Trusted CAs gt Edit continued LABEL DESCRIPTION Certification Path This field displays for a certificate not a certification request Click the Refresh button to have this read only text box display the hierarchy of certification authorities that validate the certificate and the certificate itself If the issuing certification authority is one that you have imported as a trusted certification authority it may be the only certification authority in the list along with the certificate itself If the certificate is a self signed certificate the certificate itself is the only one in the list The WiMAX Modem does not trust the certificate and displays Not trusted in this field if any certificate on the path has expired or been revoked Refresh Click Refresh to display the certification path Certification
95. the list and then click the Configure button Figure 140 openSUSE 10 3 Network Settings YaS12 linux h20z Network Card Network Settings Overview Obtain an overview of installed network cards Global Options Overview Hostname DNS Routing Additionally edit their nsnm z configuration Name IP Address AMD PCnet Fast 79C971 DHCP Adding a Network Card Press Add to configure a new network card manually Configuring or Deleting Choose a network card to change or remove Then press Configure or Delete as desired AMD PCnet Fast 79C971 MAC 08 00 27 96 ed 3d Device Name eth etho Started automatically at boot IP address assigned using DHCP User s Guide Appendix B Setting Up Your Computer s IP Address 5 When the Network Card Setup window opens click the Address tab Figure 141 openSUSE 10 3 Network Card Setup B YasT2Glinux h2oz Address Setup Select No Address Setup if you do not want any IP address for this device This is particularly useful for bonding ethernet devices Select Dynamic address if you do not have a static IP address assigned by the system administrator or your cable or DSL provider You can choose one of the dynamic address assignment method Select DHCP if you have a DHCP server running on your local network Network addresses are then obtained automatica
96. time you browse to it you are presented with a certification error 2 Select Accept this certificate permanently and click OK Figure 180 Firefox 2 Website Certified by an Unknown Authority Website Certified by an Unknown Authority Unable to verify the identity of 172 20 37 202 as a trusted site aA Possible reasons for this error Your browser does not recognize the Certificate Authority that issued the site s certificate The site s certificate is incomplete due to a server misconfiguration You are connected to a site pretending to be 172 20 37 202 possibly to obtain your confidential information Please notify the site s webmaster about this problem Before accepting this certificate you should examine this site s certificate carefully Are you willing to to accept this certificate for the purpose of identifying the Web site 172 20 37 202 Examine Certificate Accept this certificate permanently Wf this session Do not accept this certificate and do not connect to this Web site Ce User s Guide Appendix E Importing Certificates The certificate is stored and you can now connect securely to the web configurator A sealed padlock appears in the address bar which you can click to open the Page I nfo gt Security window to view the web page s security information Figure 181 Firefox 2 Page Info Page Info DER General Forms Links Media ity Web Site Identity Verified
97. unreachable 1 Host unreachable 2 Protocol unreachable 3 Port unreachable 4 A packet that needed fragmentation was dropped because it was set to Don t Fragment DF 5 Source route failed 4 Source Quench 0 A gateway may discard internet datagrams if it does not have the buffer space needed to queue the datagrams for output to the next network on the route to the destination network 5 Redirect 0 Redirect datagrams for the Network 1 Redirect datagrams for the Host 2 Redirect datagrams for the Type of Service and Network 3 Redirect datagrams for the Type of Service and Host 8 Echo 0 Echo message 11 Time Exceeded 0 Time to live exceeded in transit 1 Fragment reassembly time exceeded 12 Parameter Problem 0 Pointer indicates the error 13 Timestamp User s Guide Chapter 20 The Logs Screens Table 97 ICMP Notes continued TYPE CODE DESCRIPTION 0 Timestamp request message 14 Timestamp Reply 0 Timestamp reply message 15 Information Request 0 Information request message 16 Information Reply 0 Information reply message Table 98 SIP Logs LOG MESSAGE DESCRIPTION SIP Registration Success by SIP SIP Phone Number The listed SIP account was successfully registered with a SIP register server SIP Registration Fail by SIP SIP Phone Number An attempt to register the listed SIP account with a SIP register server was not successful SIP UnRegistration Succes
98. up to 127 ASCII Extended set characters User Name This is the user name for registering this SIP account with the SIP register server Type the user name exactly as it was given to you You can use up to 95 ASCII characters Password Type the password associated with the user name above You can use up to 95 ASCII Extended set characters Back Click to return to the previous screen User s Guide Chapter 4 VoIP Connection Wizard Table 8 VoIP Connection gt First Voice Account Settings continued LABEL DESCRIPTION Apply Click to complete the wizard setup and save your configuration Close Click to close the wizard without saving your settings After you enter your voice account settings and click Apply the WiMAX Modem attempts to register your SIP account with the SIP server Figure 13 VoIP Connection SIP Registration Test SIP Registration Test in Process Please wait a moment About 4 seconds This screen displays if SIP account registration fails Check your WiMAX connection using the WiMAX Link and Strength Indicator LEDs on the front of the WiMAX Modem then wait a few seconds and click Register Again If your User s Guide Chapter 4 VoIP Connection Wizard Internet connection was already working you can click Back and try re entering your SIP account settings Figure 14 VoIP Connection gt SIP Registration Fail VoIP Configuration Voic
99. used by the WiMAX Modem is known as Virtual Private LAN Service or VPLS Note Unlike some other types of VPN such as IPSec VPNs VPLS VPNs do not use authentication or encryption to secure the data they carry The following figure shows two users A and B connecting to the WiMAX Modem Z through a switch S Each user has his own connection over the WiMAX network to the service provider s router R Figure 33 VPN Transport Example Z WiMAX R Note The services available may vary depending upon the service provider 9 1 1 What You Can Do in This Chapter The General screen Section 9 2 on page 99 lets you turn VPN transport on or off and to set the VPN transport endpoint your service provider s router The Customer Interface screen Section 9 3 on page 100 lets you specify User s Guide which users can use which WiMAX network links Chapter 9 The VPN Transport Screens The Ethernet Pseudowire screen Section 9 4 on page 104 lets you configure the links over the WiMAX network between the WiMAX Modem and the service provider s router The Statistics screen Section 9 5 on page 107 lets you view performance information about the VPN transport connections 9 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter Identifying Users For the WiMAX Modem s VPN Transport feature to work it must be able to identify users on the LAN It does thi
100. 1 841875 MBytes 2 2 0 8 Packets 3621 3140 Errors 0 0 Dropped 0 0 KBytes s 0 0 0 0 User s Guide 297 Appendix B Setting Up Your Computer s IP Address User s Guide Pop up Windows JavaScripts and Java Permissions In order to use the web configurator you need to allow Web browser pop up windows from your device JavaScripts enabled by default Java permissions enabled by default Note Internet Explorer 6 screens are used here Screens for other Internet Explorer versions may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Disable Pop up Blockers 1 In Internet Explorer select Tools Pop up Blocker and then select Turn Off Pop up Blocker Figure 145 Pop up Blocker Mail and News Pop up Blocker Manage Add ons Synchronize Windows Update Windows Messenger Internet Options You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 1 In Internet Explorer select Tools Internet Options Privacy 2 Clear the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you ma
101. 1 Connecting Your Small Network to the Internet Once your network is configured and hooked up you will want to connect it to the Internet next To do this just run the Internet Connection Wizard Chapter 3 on page 41 which walks you through the process 5 2 2 Changing Service Providers This tutorial shows you how to import a new security certificate which allows your device to communicate with the company s network servers This is necessary if you ever change Internet Service Providers and your WiMAX Modemi is still compatible with the new network In some cases it may not be Goal Import a new security certificate into the WiMAX Modem See Also Chapter 15 on page 167 1 Inthe Web Configurator open the TOOLS gt Certificates gt My Certificates screen and click the Import button PKI Storage Space in Use ov NENNEN 100 My Certificates 1 Name Type Subject Issuer Valid From Valid To Action zl 2000 Jan 2030 Jan CN MAX 200M1 CN MAX 200M1 ist 1st 1 auto generated self signed cert SELF Factory Default Factory Default 00 00 EXE ug d Fiet 00 00 00 00 00 00 GMT GMT Create Refresh User s Guide 53 Chapter 5 Tutorials In the Import Certificate screen click Browse and locate the security certificate that was provided by your new ISP Import Pile Upload Please specify the location of the certificate file to Look in 3 Downloads e Binary X 509 isc e PEM Base 64 encoded
102. 114 lets you maintain trigger port forwarding rules for the WiMAX Modem The ALG screen Section 10 5 on page 116 lets you enable and disable SIP Vol P FTP file transfer and H 323 audio visual ALG in the WiMAX Modem 10 2 General Click ADVANCED gt NAT Configuration gt General to enable or disable NAT and to allocate memory for NAT and firewall rules Figure 44 ADVANCED gt NAT Configuration gt General C Enable Network Address Translation Max NAT Firewall Session Per User 2048 C User s Guide Chapter 10 The NAT Configuration Screens 10 3 The following table describes the labels in this screen Table 32 ADVANCED gt NAT Configuration gt General LABEL DESCRIPTION Enable Network Select this if you want to use port forwarding trigger ports or any Address Translation of the ALG Max NAT Firewall When computers use peer to peer applications such as file Session Per User sharing applications they may use a large number of NAT sessions If you do not limit the number of NAT sessions a single client can establish this can result in all of the available NAT sessions being used In this case no additional NAT sessions can be established and users may not be able to access the Internet Each NAT session establishes a corresponding firewall session Use this field to limit the number of NAT firewall sessions each client computer can establish through the WiMAX Modem If you
103. 204 374 User s Guide Index T tampering TCP IP configuration 74 TEK 269 TFTP restrictions 204 three way conference 155 157 TLS 44 89 267 transport encryption key see TEK transport layer security see TLS triangle route problem 195 solutions 196 trigger port forwarding process 115 TTLS 44 89 267 270 tunneled TLS see TTLS U unauthorized device 267 uniform resource identifier 132 USA type call service mode 156 use NAT 146 use NAT feature 132 user agent SIP 144 user authentication 267 user ID 48 user name 123 V VAD 149 verification 269 virtual local area network see VLAN VLAN 142 group 142 ID tags 142 tags 142 VLAN ID 142 voice activity detection 149 coding 135 mail 131 Voice over IP see VoIP VoIP 131 W waveform codec 136 WiMAX 85 86 security 269 WiMAX Forum 85 Wireless Interoperability for Microwave Access see WiMAX Wireless Metropolitan Area Network see MAN wireless network access 85 standard 85 wireless security 267 wizard setup 41 User s Guide 375 Index 376 User s Guide
104. 28 keywords Keyword List This field displays the keywords that are blocked when Enable URL Keyword Blocking is selected To delete a keyword select it click Delete and click Apply Delete Click Delete to remove the selected keyword in the Keyword List The keyword disappears after you click Apply Clear All Click this button to remove all of the keywords in the Keyword List Denied Access Enter the message that is displayed when the WiMAX Modem s content Message filter feature blocks access to a web site Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 17 Content Filter 17 3 Schedule Click TOOLS gt Content Filter gt Schedule to schedule content filtering Figure 86 TOOLS gt Content Filter gt Schedule Day to Block Everyday All day L sun O Mon O Tue O wed O Thu O Fi O sat Time of Day to Block 24 Hour Format From Start o hour o min End 0 hour 0 min C The following table describes the labels in this screen Table 69 TOOLS gt Content Filter gt Schedule LABEL DESCRIPTION Day to Block Select which days of the week you want content filtering to be effective Time of Day to Block Select what time each day you want content filtering to be effective Enter times in 24 hour format for example 3 00pm should be entered as 15 00 Apply Clic
105. 36 G 729 136 H hybrid waveform codec 136 I ANA 318 identity 87 267 idle timeout 204 IEEE 802 16 85 267 IEEE 802 16e 85 IEEE 802 1Q VLAN 142 372 User s Guide Index inner authentication 270 Internet access 87 Internet Assigned Numbers Authority see IANA 318 Internet Telephony Service Provider see ITSP interoperability 85 IP PBX 131 ITSP 131 ITU T 149 K key 44 89 267 request and reply 269 L listening port 139 MAC 269 MAN 85 Management Information Base MIB 208 manual site survey 93 94 Message Authentication Code see MAC message integrity 269 message waiting indication 136 Metropolitan Area Network see MAN microwave 85 86 mobile station see MS MS 86 multimedia 132 MWI 136 My Certificates 168 see also certificates N NAT 135 317 and remote management 204 routers 135 server sets 110 network activity 87 services 87 O OK response 143 outbound proxy 135 146 server 135 SIP 135 P pattern spotting 269 PBX services 131 PCM 136 peer to peer calls 159 per hop behavior 147 PHB per hop behavior 147 phone services 150 PKMv2 44 87 89 267 270 plain text encryption 269 Privacy Key Management see PKM private key 267 product registration 362 proxy server SIP 144 public certificate 269 public key 44 89 267 Public Key Infrastructure PKI 185 public private key pairs 167 184 pulse code modulation 136 Use
106. 5 255 255 248 29 8192 6 14 255 255 255 252 30 16384 2 15 255 255 255 254 31 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation If the ISP or your network administrator assigns you a block of registered IP addresses follow their instructions in selecting the IP addresses and the subnet mask If the ISP did not explicitly give you an IP network number then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255 0 The Internet Assigned Number Authority I ANA reserved this block of addresses specifically for private use please do not use any other number unless you are told otherwise You must also enable Network Address Translation NAT on the WiMAX Modem Once you have decided on the network number pick an IP address for your WiMAX Modem that is easy to remember for instance 192 168 1 1 but make sure that no other device on your network is using that IP address The subnet mask specifies the network number portion of an IP address Your WiMAX Modem will compute the subnet mask automatically based on the IP User s Guide 31 7 Appendix D IP Addresses and Subnetting address that you entered You don t need to change the subnet mask computed by the WiMAX Modem unless
107. 5 IP Address Network Number and Host ID Example essen 310 Bri More Sco er UT 311 Table TET Bip PIOSE TIGR ia pelli dene bri deat ied be Few ene S Ped tpe e bpPE ope E br ER ERE 311 Table 118 Alternative Subnet Mask NOW m 312 TEIG ED e a E EE E N E deb a S EET 315 Table TO SUNI sarn E E 315 TSb TI So S a A 315 TORE Ta SONG aa a a I ENG ue CES ERU dues a A 315 TADE T29 ENGI ADNET e 316 User s Guide List of Tables Table 124 24 bit Network Number Subnet Planning sesesesssseseseeeeeeennnee enne 316 Table 125 16 bit Network Number Subnet Planning eeesssesesessssseseeeee nennen nnne 317 Table 126 Commonly Used Services User s Guide ART Introduction and Getting Started 31 Introducing the Web Configurator 35 Internet Connection Wizard 41 VolP Connection Wizard 47 Getting Started 1 1 About Your WiMAX Modem The WiMAX Modem allows you to access the Internet by connecting to a WiMAX wireless network You can use a traditional analog telephone to make Internet calls using the WiMAX Modem s Voice over IP Vol P communication capabilities You can configure firewall and content filtering as well as a host of other features The web browser based Graphical User Interface GUI also Known as the web configurator provides easy management See Chapter 23 on page 257 for a complete
108. 51 2 525 2 6 and 2 625 1 Inthe DL Frequency 1 field enter 2510000 2510000 kilohertz kHz is equal to 2 51 gigahertz 2 Inthe DL Frequency 2 field enter 2525000 3 Inthe DL Frequency 3 field enter 2600000 User s Guide Chapter 8 The WAN Configuration Screens 4 Inthe DL Frequency 4 field enter 2625000 Leave the rest of the DL Frequency fields at zero The screen appears as follows Figure 31 Completing the WiMAX Frequency Screen DL Frequency 1 2510000 kHz DL Frequency 2 2525000 kHz DL Frequency 3 2600000 kHz DL Frequency 4 2625000 kHz 5 Click Apply The WiMAX Modem stores your settings When the WiMAX Modem searches for available frequencies it scans all frequencies from DL Frequency 1 to DL Frequency 4 When it finds an available connection the fields in this screen will be automatically set to use that frequency 8 4 Advanced Click ADVANCED gt WAN Configuration gt Advanced to configure your DNS server RIP Multicast and Windows Networking settings Figure 32 ADVANCED gt WAN Configuration gt Advanced DNS Servers First DNS Server Second DNS Server Third DNS Server RIP amp Multicast Setup RIP Direction RIP Version Multicast CI Allow Trigger Dial From ISP Windows Networking NetBIOS over TCP IP v 0 0 0 0 From ISP vi 0 0 0 0 FromISP v o 0 0 0 ee Bi RIP 1 j None x Allow between L
109. 711A v 6 729 v 6 7110 v RFC 2883 v 3478 1025 65535 5060 1025 65535 Outbound Proxy C Active Server Address 478 Server Port 1025 65535 NAT Keep Alive El Active O Keep Alive With SIP Proxy O Keep Alive With Outbound Proxy Keep Alive Interval 120 30 65535 sec MWI Message Waiting Indication C Enable Expiration Time 1800 1 65535 sec Fax Option G 711 Fax Passthrough 7 38 Fax Relay Call Forward Call Forward Table Tablei w Caller Ringing CI Enable Caller Ringing Tone Default v On Hold CI Enable On Hold Tone Default v The following table describes the labels in this screen Table 44 VOICE gt Service Configuration gt SIP Settings gt Advanced LABEL DESCRIPTION SIP Server Settings URL Type Select whether or not to include the SIP service domain name when the WiMAX Modem sends the SIP number e SIP include the SIP service domain name e TEL do not include the SIP service domain name User s Guide 137 Chapter 12 The Service Configuration Screens Table 44 VOICE gt Service Configuration gt SIP Settings gt Advanced continued LABEL DESCRIPTION Expiration Enter the number of seconds your SIP account is registered with the Duration SIP register server before it is deleted The WiMAX Modem automatically tries to re register your SIP account when one half of this time has passed
110. AN and WAN You also need to create a firewall rule User s Guide Chapter 8 The WAN Configuration Screens The following table describes the labels in this screen Table 23 ADVANCED gt WAN Configuration gt Advanced LABEL DESCRIPTION DNS Servers First Second and Third DNS Server Select Obtained from ISP if your ISP dynamically assigns DNS server information and the WiMAX Modem s WAN IP address Use the drop down list box to select a DNS server IP address that the ISP assigns in the field to the right Select UserDefined if you have the IP address of a DNS server Enter the DNS server s IP address in the field to the right If you chose UserDefined but leave the IP address set to 0 0 0 0 UserDefined changes to None after you click Apply If you set a second choice to UserDefined and enter the same IP address the second UserDefined changes to None after you click Apply Select None if you do not want to configure DNS servers You must have another DHCP server on your LAN or else the computers must have their DNS server addresses manually configured If you do not configure a DNS server you must know the IP address of a computer in order to access it RIP amp Multicast Setup RIP Direction Select the RIP direction from None Both I n Only and Out Only RIP Version Select the RIP version from RI P 1 RIP 2B and RI P 2M Multicast IGMP Internet Group Multicast Protocol is a net
111. Active checkbox on this screen Periodic Inform Interval Enter the time interval in seconds at which the WiMAX Modem connects to the auto configuration server Periodic Inform Time Enter a time interval that the WiMAX Modem will trigger a periodic inform interval This works in tandem with the Periodic I nform Interval and is not mutually exclusive of it The Periodic I nform Time must be in the following format yyyy mm ddThh mm ss where yyyy is a four digit year 2009 mm is a two digit month 01 12 dd is a two digit day 01 28 hh is a two digit hour in 24 hour format 01 24 mm is a two digit minutes value 01 60 and ss is a two digit seconds value 01 60 Note You must separate the day information from the hour information with a T This feature gives the WiMAX Modem a baseline from which to begin calculating when each periodic inform happens If the inform time is set for some point in the past the WiMAX Modem interpolates the inform interval forward to the current time and begins its periodic inform at the appropriate time based on this interpolation If the inform time is set for some point in the future then the WiMAX Modem interpolates backwards to the current time and actually begins at the appropriate time based on this interpolation Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide QoS 19 1
112. Browse 8 Inthe Select Certificate Store dialog box choose a location in which to save the certificate and then click OK Figure 168 Internet Explorer 7 Select Certificate Store Select Certificate Store Select the certificate store you want to use s w Trusted Root Certification Authorities H Enterprise Trust H Intermediate Certification Authorities J Active Directory User Object PA Triieted Di ihlichers lt Show physical stores User s Guide Appendix E Importing Certificates 9 Inthe Completing the Certificate mport Wizard screen click Finish Figure 169 Internet Explorer 7 Certificate Import Wizard Certificate Import Wizard Completing the Certificate Import Wizard You have successfully completed the Certificate Import wizard You have specified the following settings Certificate Store Selected Automatically determined by 1 Content Certificate 10 If you are presented with another Security Warning click Yes Figure 170 Internet Explorer 7 Security Warning Security Warning You are about to install a certificate from a certification authority CA daiming to represent nsa2401 Windows cannot validate that the certificate is actually from nsa2401 You should confirm its origin by contacting nsa2401 The following number will assist you in this process Thumbprint sha1 35D 1C9AC DBCOE654 FE327C71 464D154B 242E5B93 Warning If you install this root
113. CRIPTION Restart Click this button to have the device perform a software restart The Power LED blinks as it restarts and the shines steadily if the restart is successful Note Wait one minute before logging back into the WiMAX Modem after a restart User s Guide 1 27 Chapter 11 The System Configuration Screens 11 6 1 The Restart Process When you click Restart the the process usually takes about two minutes Once the restart is complete you can log in again User s Guide PART IV Voice Screens The Service Configuration Screens 131 The Phone Screens 149 The Phone Book Screens 159 12 1 The Service Configuration Screens Overview The VOICE gt Service Configuration screens allow you to set up your voice accounts and configure your QoS settings VolP Voice over IP is the sending of voice signals over the Internet Protocol This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit switched telephone network You can also use servers to run telephone service applications like PBX services and voice mail Internet Telephony Service Provider ITSP companies provide VoIP service A company could alternatively set up an IP PBX and provide it s own VoIP service Circuit switched telephone networks require 64 kilobits per second kbps in each direction to handle a telephone call Vol P can use advanced voice codin
114. Certificate intended purposes lt All gt 4 Inthe Certificates confirmation click Yes Figure 178 Internet Explorer 7 Certificates Certificates Deleting system root certificates might prevent some Windows components from working properly If Update Root Certificates is installed any deleted third party root certificates will be restored automatically but the system root certificates will not Do you want to delete the selected certificate s 5 Inthe Root Certificate Store dialog box click Yes Figure 179 Internet Explorer 7 Root Certificate Store Root Certificate Store A Do you want to DELETE the following certificate from the Root Store Subject 172 20 37 202 ZyXEL Issuer Self Issued Time Validity Wednesday May 21 2008 through Saturday May 21 2011 Serial Number 00846BC7 48BF7C2E CB Thumbprint sha 1 DC44635D 10FE2D0D E76A72ED 002B9AF7 677EBOE9 Thumbprint md5 65 5E948 F0BC9598 50803387 C6A 18384 User s Guide Appendix E Importing Certificates 6 The next time you go to the web site that issued the public key certificate you just removed a certification error appears User s Guide 331 Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional however the screens can also apply to Firefox 2 on all platforms 1 If your device s web configurator is set to use SSL certification then the first
115. Configuration Screens for example The following figure shows an MS equipped notebook computer MS1 moving from base station BS1 s coverage area and connecting to BS2 Figure 25 WiMax Mobile Station WiMAX technology uses radio signals around 2 to 10 GHz to connect subscriber stations and mobile stations to local base stations Numerous subscriber stations and mobile stations connect to the network through a single base station BS as in the following figure Figure 26 WiMAX Multiple Mobile Stations A base station s coverage area can extend over many hundreds of meters even under poor conditions A base station provides network access to subscriber stations and mobile stations and communicates with other base stations The radio frequency and bandwidth of the link between the WiMAX Modem and the base station are controlled by the base station The WiMAX Modem follows the base station s configuration User s Guide Chapter 8 The WAN Configuration Screens Authentication When authenticating a user the base station uses a third party RADIUS or Diameter server known as an AAA Authentication Authorization and Accounting server to authenticate the mobile or subscriber stations The following figure shows a base station using an AAA server to authenticate mobile station MS allowing it to access the Internet Figure 27 Using an AAA Server In this figure the dashed arrow shows the PKM Privacy Key Managem
116. D ROE TT T T TURN 109 TOT What You Gan Doim This CG BUS aassuniscsunie tipi dap et te dian redes bna abc aan 109 102 STON sirake ae Scertacocdpcavwetientaatenan erence tee adap ee ee Gaeta 109 TUS Fon POON aedibus abl erri qa sp eptvenehetvatts pra ec pp dU AE eR 110 103 1 Part Foresrdinp TUNE uieicecostntitevpisM p PRX aU toPeY peto Co aae Phe xi ta tue AREE SEI M DEN naan 111 10 3 2 Port Forwarding Rule UG occa iota acte ner trio a Oe E RE Dep ERE scans 113 E CHI PUG eee vc T 114 10 4 1 Tigger Port Forwarding EXample iuuosdeschprevedist bui qut Eni deat tonto dd otii quia id da nud ds 115 ry oce PE 116 Chapter 11 The System Configuration Screens eese eese esses eene enema nane tn nena nnna e 119 DES Yu Ae et E UE 119 TV Wat vou Can Do qn Ths Chapter uiae erint com aiaa cR REOR ass 119 TELL Viral You NEGO TO KNOW o2 satu centu caecntes asd op cud eu du t elutes dacs xau EN a xoa osi 119 puc 121 te Dy DDR c Hc H 122 UE TII cJ TT 124 T1 4 1 The Firmware Upload Process iucciescpeiceeiue tran conet irte ten brc mer a 125 DUE D TET I I uU trite 126 11 5 1 The Bestorg Coniiguration Process 1 arret sto diina aia 127 Eg c qe 127 Diol The Rostan PSS C m 128 Pari IV VOICE SOTO X 129 Chapter 12 The Service Configuration Screens seccccesseeeeseseeeeeeseneeeeeeeseeeeeesenee
117. DPCM waveform codec Differential or Delta PCM is similar to PCM but encodes the audio signal based on the difference between one sample and a prediction based on previous samples rather than encoding the sample s actual quantized value Many thousands of samples are taken each second and the differences between consecutive samples are usually quite small so this saves space and reduces the bandwidth necessary However DPCM produces a high quality signal high signal to noise ratio or SNR for high difference signals where the actual signal is very different from what was predicted but a poor quality signal low SNR for low difference signals where the actual signal is very similar to what was predicted This is because the level of quantization noise is the same at all signal levels Adaptive DPCM solves this problem by adapting the difference signal s level of quantization according to the audio signal s strength A low difference signal is given a higher quantization level increasing its signal to noise ratio This provides a similar sound quality at all signal levels G 723 provides high quality sound and requires 20 or 40 kbps G 729 is an Analysis by Synthesis AbS hybrid waveform codec It uses a filter based on information about how the human vocal tract produces sounds The codec analyzes the incoming voice signal and attempts to synthesize it using its list of voice elements It tests the synthesized signal against the
118. E DESCRIPTION Activity Off The WiMAX Modem is not ready Indicator Green The WiMAX Modem is connected to the network Blinking The WiMAX Modem system is booting up or the WiMAX Modem is seeking a viable signal 1 3 Good Habits for Managing the Device Do the following things regularly to make the WiMAX Modem more secure and to manage the WiMAX Modem more effectively Change the password Use a password that s not easy to guess and that consists of different types of characters such as numbers and letters Write down the password and put it in a safe place Back up the configuration and make sure you know how to restore it Restoring an earlier working configuration may be useful if the WiMAX Modem becomes unstable or even crashes If you forget your password you will have to reset the WiMAX Modem to its factory default settings If you backed up an earlier configuration file you would not have to totally re configure the WiMAX Modem You could simply restore your last configuration User s Guide Introducing the Web Configurator 2 1 Overview The web configurator is an HTML based management interface that allows easy device set up and management via any web browser that supports HTML 4 0 CSS 2 0 and JavaScript 1 5 and higher The recommended screen resolution for using the web configurator is 1024 by 768 pixels and 16 bit color or higher In order to use the web configurator you need to allow
119. E mail support zyxel com my Sales E mail sales zyxel com my Telephone 603 8076 9933 Fax 603 8076 9833 Web http www zyxel com my Regular Mail ZyXEL Malaysia Sdn Bhd 1 02 amp 1 03 Jalan Kenari 17F Bandar Puchong J aya 47100 Puchong Selangor Darul Ehsan Malaysia North America Support E mail support zyxel com Support Telephone 4 1 800 978 7222 Sales E mail sales zyxel com Sales Telephone 1 714 632 0882 Fax 1 714 632 0858 Web www zyxel com Regular Mail ZyXEL Communications Inc 1130 N Miller St Anaheim CA 92806 2001 U S A Norway Support E mail support zyxel no User s Guide Appendix Customer Support Sales E mail sales zyxel no Telephone 47 22 80 61 80 Fax 47 22 80 61 81 Web www zyxel no Regular Mail ZyXEL Communications A S Nils Hansens vei 13 0667 Oslo Norway Poland E mail info pl zyxel com Telephone 48 22 333 8250 Fax 48 22 333 8251 Web www pl zyxel com Regular Mail ZyXEL Communications ul Okrzei 1A 03 715 Warszawa Poland Russia Support http zyxel ru support Sales E mail sales zyxel ru Telephone 7 095 542 89 29 Fax 7 095 542 89 25 Web www zyxel ru Regular Mail ZyXEL Russia Ostrovityanova 37a Str Moscow 117279 Russia Singapore Support E mail support zyxel com sg Sales E mail sales zyxel com sg Telephone 65 6899 6678 Fax 65 6899 8887 e Web http www zyxel com sg Re
120. Figure 110 Windows XP Local Area Connection Properties ccceccceeeceeeeeeeeeaeeeeaeeeseceeeeeneeees 273 Figure 111 Windows XP Internet Protocol TCP IP Properties c ccccsseeeeseeeeeeeeeeeeeeeeseaeeeeeeeeess 274 ligure 112 Windows Vieta Start WI cicius oO king den ineaud diesen lia cea Na ET aa d EN 275 Figure 113 Windows Vista Conirol Panel 1o ocio snsexossntinpwaeanerbadsadesnv amar oeetecuscaneeneniadapeamunowsens 275 Figure 114 Windows Vista Network And Internet ennt nnn nnns 275 Figure 115 Windows Vista Network and Sharing Center c ccccsceceeeeeeseceeeeeeeeeseaaeeeeeeeeeseaeeeeeneeees 276 Figure 116 Windows Vista Network and Sharing Center c cccccceceeeeeeeeeeeeeeneeeeeaaeseeneeeeeaeeeeeneeee 276 Figure 117 Windows Vista Local Area Connection Properties esssssseeeeennee 277 Figure 118 Windows Vista Internet Protocol Version 4 TCP IPv4 Properties sssssse 278 Figure 119 Mat OS X INT Wh 1 c o M 279 Figure 120 Mae OS X 10 4 System Preferences 2a edam cetur ad madura ska bak x dl Rd tta auda 279 Figure 121 Mac OS X 10 4 Network Preferences sssssssssssssssss nennen nennen nennen rentre 280 Figure 122 Mac OS X 10 4 Network Preferences gt TCP IP Tab sssssessseseeeeeeneenne 280 Figure 123 Mac OS X 10 4 Network Preferences gt Ethernet sssesssssseee
121. Figure 73 TOOLS gt Certificates gt My Certificates gt Import sssessessssssseseneeeenn enne qz Figure 74 TOOLS Certificates Triste DAS 1er innia e rond dnb c d d Rs 178 Figure 75 TOOLS gt Garlificates Trusted CAS s Edit aussi hunter ritur vr do 180 Figure 76 TOOLS gt Certificates gt Trusted CAS x Import sisciscinscarssdeccasmscasiadsmnacceraivienaiainenracennaiinaniy 183 Foure 7 Remote Fost CBIUTI OIBE ssa veda cackesas caters ancalned cu bibe a 186 Figure 78 papbBioste Delale idet URP rote aia bec m dine X Uae alee bua edo ec uade be qu DRAN 187 Faure 79 Pirewall Pile Direc tone cocido d able scere dc Rebel LER astu rada ab en ELLEN E GPL pd 190 Figure S0 Ideal ho lbi ET 191 Foute 21 TOOLS MIU IEREtCthIIT MER 192 User s Guide List of Figures Figure 82 TOOLS Firewall gt Service Seting i m n tenes rho ri pk tg a goa ld 193 Figure mgri Route Pri RN TE o 0 196 Figure S4 IF ro C 197 Figure 85 TOOLS gt Content Fiter gt FIET 2 ordei ato p oS Neb ae irt ER Mn o REL ed dus 200 Figure 86 TOOLS Content Filter Sehedule 1 docs reete ders Fpe dta sea PP Y SB Ee tr nato pe AEN Ai 202 Figure 87 TOOLS gt Remote Management s WNW iiu eee rete peso anenee 205 Figure 88 TOOLS gt Remote Management gt Telnet soci ictescccrsteirsesaaeniesdsadansionntsoneenedaasansaenscencnian scons 206 Figure 89 TOOLS Remote Management ze FIP scisiinicsessiscaistoiessetaccisa
122. H Links Ctrl amp Alt4L Advanced gt Quick preferences F12 gt Appearance Shift F 12 Preferences k Ctrl AF 12 User s Guide Appendix E Importing Certificates 2 In Preferences click ADVANCED gt Security gt Manage certificates Figure 193 Opera 9 Preferences Preferences Choose a master password to protect personal certificates Browsing Notifications Set master password Content Fonts Downloads Programs Every time needed Ask for password History Security Enable Fraud Protection User s Guide 341 Appendix E Importing Certificates 3 In the Certificates Manager click Authorities gt mport Figure 194 Opera 9 Certificate manager Certificate manager AAA Certificate Serv Actalis Root CA AddTrust Class 1 CA Root AddTrust External CA Root AddTrust Public CA Root AddTrust Qualified CA Root Baltimore CyberTrust Code Signing Root Baltimore CyberTrust Mobile Root Baltimore CyberTrust Root Certum CA Certum CA Level I Certum CA Level II Certum CA Level III Certum CA Level IV Class 1 Public Primary Certification Authority Class 1 Public Primary Certification Authority G2 c 1998 VeriSig Class 2 Public Primary Certification Authority Class 2 Public Primary Certification Authority G2 c 1998 VeriSig v 4 Usethe Import certificate dialog box to locate the certificate and then click Open Figure 195 Opera 9 Import cert
123. H 323 Select this to make sure H 323 audio visual programs such as ALG NetMeeting works correctly with port forwarding and port triggering rules Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes User s Guide 117 Chapter 10 The NAT Configuration Screens User s Guide 11 1 11 1 1 11 1 2 The System Configuration Screens Overview Click ADVANCED gt System Configuration to set up general system settings change the system mode change the password configure the DDNS server settings and set the current date and time What You Can Do in This Chapter The General screen Section 11 2 on page 121 lets you change the WiMAX Modem s mode set up its system name domain name idle timeout and administrator password The Dynamic DNS screen Section 11 3 on page 122 lets you set up the WiMAX Modem as a dynamic DNS client The Firmware screen Section 11 4 on page 124 lets you upload new firmware to the WiMAX Modem The Configuration screen Section 11 5 on page 126 lets you back up or restore the configuration of the WiMAX Modem The Restart screen Section 11 6 on page 127 lets you restart your WiMAX Modem from within the web configurator What You Need to Know The following terms and concepts may help as you read through this chapter System Name The System Name is often used for identification purposes Because some ISPs check th
124. ICMP The firewall detected an I CMP smurf attack Table 96 Remote Management Logs LOG MESSAGE DESCRIPTION UPnP denied Remote Management FTP denied Attempted use of FTP service was blocked according to remote management settings Remote Management TELNET Attempted use of TELNET service was blocked denied according to remote management settings Remote Management HTTP or Attempted use of HTTP or UPnP service was blocked according to remote management settings User s Guide Chapter 20 The Logs Screens Table 96 Remote Management Logs LOG MESSAGE DESCRIPTION Remote Management WWW denied Attempted use of WWW service was blocked according to remote management settings Remote Management HTTPS Attempted use of HTTPS service was blocked denied according to remote management settings Remote Management SSH denied Attempted use of SSH service was blocked according to remote management settings Remote Management ICMP Ping Attempted use of ICMP service was blocked response denied according to remote management settings Remote Management DNS denied Attempted use of DNS service was blocked according to remote management settings Table 97 ICMP Notes TYPE CODE DESCRIPTION 0 Echo Reply 0 Echo reply message 3 Destination Unreachable 0 Net
125. ID 192 168 1 1 192 168 1 0 Broadcast Address Highest Host ID 192 168 1 62 192 168 1 63 Table 120 Subnet 2 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 64 IP Address Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address Lowest Host ID 192 168 1 65 192 168 1 64 Broadcast Address Highest Host ID 192 168 1 126 192 168 1 127 Table 121 Subnet 3 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address Lowest Host ID 192 168 1 129 192 168 1 128 Broadcast Address Highest Host ID 192 168 1 190 192 168 1 191 Table 122 Subnet 4 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 192 IP Address Binary 11000000 10101000 00000001 11000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 User s Guide Appendix D IP Addresses and Subnetting Table 122 Subnet 4 continued IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE Subnet Address Lowest Host ID 192 168 1 193 192 168 1 192 Broadcast Address Highest Host ID 192 168 1 254 192 168 1 255 Example Eight Subnets Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 The following table shows IP address last o
126. IDs 10 and 20 and using the customer interfaces assigns them to specific pseudowires PW1 and PW2 Figure 36 Pseudowire Mapping VLAN 10 PW1 VLAN 20 gt PW2 The WiMAX Modem has a default customer interface configured for frames that arrive at the WiMAX Modem without VLAN tags 9 3 1 Multi Protocol Label Switching The WiMAX Modem uses MPLS VPNs to create virtual private LANs MPLS stands for Multi Protocol Label Switching and is a packet switching technology that allows packets with different VLAN tags to be transported on different paths known as LSPs or Label Switched Paths Each packet is identified by its VLAN tag and sent to a specific LSP for transport over the WiMAX network Each LSP has a defined start point and end point Since MPLS creates mono directional paths traffic flows in only one direction each Ethernet pseudowire uses two LSPs so that traffic can flow both ways One LSP carries upstream traffic and the other carries downstream traffic User s Guide Chapter 9 The VPN Transport Screens 9 3 2 Generic Routing Encapsulation In order to transport the VPLS traffic over the WiMAX network the WiMAX Modem uses the Generic Routing Encapsulation GRE protocol Like MPLS GRE is a tunneling protocol that has specified endpoints The GRE tunnel is bi directional and transports both LSPs The GRE tunnel runs across the WiMAX network between the WiMAX Modem and your service provider
127. IGMP v1 The WiMAX Modem supports IGMP version 1 e IGMP v2 The WiMAX Modem supports IGMP version 2 Multicasting can improve overall network performance However it requires extra processing and generates more network traffic In addition other computers on the LAN have to support the same version of IGMP Apply Click to save your changes Reset Click to restore your previously saved settings 7 6 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter 7 6 1 IP Address and Subnet Mask Similar to the way houses on a street share a common street name computers on a LAN share one common network number Where you obtain your network number depends on your particular situation If the ISP or your network administrator assigns you a block of registered IP addresses follow their instructions in selecting the IP addresses and the subnet mask If the ISP did not explicitly give you an IP network number then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255 0 and you must enable the Network Address Translation NAT feature of the WiMAX Modem The Internet Assigned Number Authority IANA reserved this block of addresses specifically for private use pleas
128. It should never be the only mechanism or method employed For a firewall to guard effectively you must design and deploy it appropriately This requires integrating the firewall into a broad information security policy In addition specific policies must be implemented within the firewall itself What You Can Do in This Chapter The Firewall Setting screen Section 16 2 on page 190 lets you configure the basic settings for your firewall The Service Setting screen Section 16 3 on page 193 lets you enable service blocking set up the date and time service blocking is effective and to maintain the list of services you want to block What You Need to Know The following terms and concepts may help as you read through this chapter About the WiMAX Modem Firewall The WiMAX Modem firewall is a stateful inspection firewall and is designed to protect against Denial of Service attacks when activated The WiMAX Modem s purpose is to allow a private Local Area Network LAN to be securely connected to User s Guide Chapter 16 The Firewall Screens the Internet The WiMAX Modem can be used to prevent theft destruction and modification of data as well as log events which may be important to the security of your network The WiMAX Modem is installed between the LAN and a WiMAX base station connecting to the Internet This allows it to act as a secure gateway for all data passing between the Internet and the LAN The WiMAX Mod
129. Ju u c 9 Accounts Date amp Time Parental Software Speech Startup Disk Time Machine Universal Controls Update Access User s Guide Appendix B Setting Up Your Computer s IP Address 3 When the Network preferences pane opens select Ethernet from the list of available connection types Figure 127 Mac OS X 10 5 Network Preferences Ethernet eoo Network Location Automatic E 3 A e Internal Modem us Not Connected Status Not Connected The cable for Ethernet is connected but bim AD your computer does not have an IP address Not Connected Ethernet ZN Noc iera lt Configure Using DHCP B FireWire Not Connected e AirPort Off DNS Server Search Domains 802 1X WPA ZyXELO4 M id Click the lock to prevent further changes Apply 4 From the Configure list select Using DHCP for dynamically assigned settings 5 For statically assigned settings do the following From the Configure list select Manually In the IP Address field enter your IP address n the Subnet Mask field enter your subnet mask User s Guide Appendix B Setting Up Your Computer s IP Address n the Router field enter the IP address of your WiMAX Modem Figure 128 Mac OS X 10 5 Network Preferences gt Ethernet ec r Location Automatic E e Internal Modem QS Not Connected Status Not Connected The cable for Ethernet is connected but PPP
130. LAN Configuration gt DHCP Setup screen Figure 104 DHCP Table DHCP Table IP Address Host Name MAC Address 1 192 168 100 33 TWPC13435 XP 00 02 e3 56 16 9d Refresh Each field is described in the following table Table 106 DHCP Table LABEL DESCRIPTION The number of the item in this list IP Address This field displays the IP address the WiMAX Modem assigned to a computer in the network Host Name This field displays the system name of the computer to which the WiMAX Modem assigned the IP address MAC Address This field displays the MAC address of the computer to which the WiMAX Modem assigned the IP address Refresh Click this button to update the table data User s Guide Chapter 21 The Status Screen 21 2 4 VoIP Statistics Click Status gt DHCP Table to open this screen This read only screen shows SIP registration information status of calls and VoIP traffic statistics These settings can be configured in the VOICE gt Service Configuration gt SIP Setting screen Figure 105 VoIP Statistics SIP Status Last Message Last Incoming Last Outgonig Port Status Registration URE Protocol Waiting Number Number SIP1 ic cand N A changeme 127 0 0 1 UDP No N A N A Call Statistics Phone Hook Status Codec Peer Number Duration TxPkts RxPkts Tx B s Rx B s Phone 1 On N A N A N A 0 00 00 0 0 0 0 Poll Interval 5 sec Set Interval Each field is described i
131. LODE T T 227 Tabe 1 ICMP LOOS Se 228 TUSD PEF EO ea M 228 Table Sa i LOOS airi thi patetacyiedeateniad eden iesetandadesecunealeanee eumearieieaten Lm eecteetiad 228 Tabe M4 Conen Fiten LOGS emm 229 TOO OS AKC EOU EL 229 Table 96 Remote Management LOGS adx3scaoasskkte edat eerdissteterdtenae EpPrt uat ceprUTun Rt prd tend pF eue pere REPE UE 230 Jade Oe IGMP NOIES rinra eanna daro o peice ddr aac dt Eben mast Lagu adeo eee 231 Hcc Ee isaac TT 232 Table DE eR 232 Tabe 100 FSM Laie Gall BE Site 1o as ic REI Fe apa Li ee ER Pra e nie a oup ads v ad 233 Table 101 FSM Logs Wallet Side oicsprr ed EIE EPI RE REERFHA RRERRPPFA SR REPE E RERK PPAR REEF EFL QU RE PEL IRE E POL E RREKPI E 233 Table We LEME LOGS me ED 233 No EEE qc oll sash A N E E E o s 236 Tare TOA Faero SiE Re mI 240 BE 105 WIAA Sie UNE EN 241 TADE 100 DHCP TARIE rnia aa N a a ror nnn tole a t d reer 242 Tabe TOT VOP Stale S dieere re iE a 243 Table 103 The WIMAX Profle SCEN pirimi decre pecca rea A ta c a stds 245 Table 109 Environmental and Hardware Specifications c ccccecceeeseeececeeeeeeeeeeeeeeeeeeeeeeseeeeeeeeaeeeee 257 Table TIO Fado ca eie n n 257 s xit rnm ART S T T 258 De Sinai SIR o Eme 259 WSR TS OIC SSUES 261 Table 114 Start and Pound RP Code SUP DO seis ccseccssscdedescossparadeieradnnsisadeacinertaabinebieamonn needs 262 Table 11
132. MAX 306M1 Series Models MAX 306M1 2 5 GHz and MAX 316M1 3 5 GHz WiMAX MIMO Outdoor Simple CPE 9 LJ ZyXEL Default Login Details IP Address http 192 168 1 1 2 User Name admin Password 1234 Firmware Version 3 70 Edition 1 12 2009 www zyxel com Copyright 2009 ZyXEL Communications Corporation About This User s Guide About This User s Guide Intended Audience This manual is intended for people who want to configure the ZyXEL WiMAX Modem using the web configurator You should have at least a basic knowledge of TCP IP networking concepts and topology Note This book covers the following models MAX 306M1 and MAX 316M1 Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains information on setting up your network and configuring for Internet access Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information Support Disc Refer to the included CD for support documents ZyXEL Web Site Please refer to www zyxel com for additional support documentation and product certifications User s Guide Feedback Help us help you Send all User s Guide related comments questions or suggestions for improvement to the following address or use e mail instead Thank you The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road
133. MAX Modem Egress Enter the egress label number for this pseudowire This must be the ingress label of the peer device This should not be the egress label number of any other Ethernet pseudowire configured on the WiMAX Modem User s Guide Chapter 9 The VPN Transport Screens Table 30 ADVANCED gt VPN Transport gt Ethernet Pseudowire Setup continued LABEL DESCRIPTION Pseudowire Enter a brief up to 31 characters description for this Description pseudowire Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 9 5 Statistics Click ADVANCED gt VPN Transport gt Statistics to view details and performance information of each active customer interface and its associated Ethernet pseudowire Figure 43 ADVANCED gt VPN Transport gt Statistics Total Packets Total Bytes Active Interface Description Transmit pkts Receive pkts Transmit bytes Receive bytes 0 0 0 0 0 for Routing NAT 1 2 3 The following table describes the labels in this screen Table 31 ADVANCED gt VPN Transport gt Statistics LABEL DESCRIPTION The number of the item in this list Active This icon is green if the associated interface is enabled The icon is grey if the associated interface is disabled Enable or disable an interface by clicking its Edit icon Total Packets This displays the number of
134. Modem and the SIP register server the WiMAX Modem probably has a private IP address The WiMAX Modem lists its IP address in the SIP message that it sends to the SIP register server NAT does not translate this IP address in the SIP message The SIP register server gets the WiMAX Modem s IP address from inside the SIP message and maps it to your SIP identity If the WiMAX Modem has a private IP address listed in the SIP message the SIP server cannot map it to your SIP identity See Chapter 10 The NAT Configuration Screens for more information Use a SIP ALG Application Layer Gateway Use NAT STUN or outbound proxy to allow the WiMAX Modem to list its public IP address in the SIP messages DiffServ DiffServ is a class of service CoS model that marks packets so that they receive specific per hop treatment at DiffServ compliant network devices along the route based on the application types and traffic flow Packets are marked with DiffServ Code Points DSCPs indicating the level of service desired This allows the intermediary DiffServ compliant network devices to handle the packets differently depending on the code points without the need to negotiate paths or remember state information for every flow In addition applications do not have to request a particular service or give advanced notice of where the traffic is going User s Guide Chapter 12 The Service Configuration Screens 12 4 8 DSCP and Per Hop Behavior DiffServ def
135. NCED gt LAN Configuration gt Other Settings LABEL DESCRIPTION RIP amp Multicast Setup RIP Direction Use this field to control how much routing information the WiMAX Modem sends and receives on the subnet None The WiMAX Modem does not send or receive routing information on the subnet Both The WiMAX Modem sends and receives routing information on the subnet In Only The WiMAX Modem only receives routing information on the subnet e Out Only The WiMAX Modem only sends routing information on the subnet RIP Version Select which version of RIP the WiMAX Modem uses when it sends or receives information on the subnet e RIP 1 The WiMAX Modem uses RIPv1 to exchange routing information RIP 2B The WiMAX Modem broadcasts RIPv2 to exchange routing information e RIP 2M The WiMAX Modem multicasts RIPv2 to exchange routing information User s Guide Chapter 7 The LAN Configuration Screens Table 18 ADVANCED gt LAN Configuration gt Other Settings continued LABEL DESCRIPTION Multicast You do not have to enable multicasting to use RIP 2M See RIP Version Select which version of IGMP the WiMAX Modem uses to support multicasting on the LAN Multicasting sends packets to some computers on the LAN and is an alternative to unicasting sending packets to one computer and broadcasting sending packets to every computer None The WiMAX Modem does not support multicasting e
136. NET newsgroup service PING User Defined 1 Packet I Nternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable POP3 TCP 110 Post Office Protocol version 3 lets a client computer get e mail from a POP3 server through a temporary connection TCP IP or other User s Guide Appendix G Common Services Table 126 Commonly Used Services continued NAME PROTOCOL PORT S DESCRIPTION PPTP TCP 1723 Point to Point Tunneling Protocol enables secure transfer of data over public networks This is the control channel PPTP_TUNNEL User Defined 47 PPTP Point to Point Tunneling GRE Protocol enables secure transfer of data over public networks This is the data channel RCMD TCP 512 Remote Command Service REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web REXEC TCP 514 Remote Execution Daemon RLOGIN TCP 513 Remote Login RTELNET TCP 107 Remote Telnet RTSP TCP UDP 554 The Real Time Streaming media control Protocol RTSP is a remote control for multimedia on the Internet SFTP TCP 115 Simple File Transfer Protocol SMTP TCP 25 Simple Mail Transfer Protocol is the message exchange standard for the Internet SMTP enables you to move messages from one e mail server to another SNMP TCP UDP 161 Simple Network Management Program SNMP TRAPS TCP UD
137. Overview Quality of Service QoS refers to both a network s ability to deliver data with minimum delay and the networking methods used to control the use of bandwidth Without QoS all traffic data is equally likely to be dropped when the network is congested This can cause a reduction in network performance and make the network inadequate for time critical application such as video on demand 19 2 General Click TOOLS gt QoS to open the screen as shown next Use this screen to enable or disable QoS Figure 96 QoS gt General CI Active QoS The following table describes the labels in this screen Table 79 TOOLS gt QoS gt General LABEL DESCRIPTION Active QoS Select this to enable QoS for the WiMAX Modem Selecting this may improve network performance especially if you are using VoIP applications or are playing online video games Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide 215 Chapter 19 QoS 19 3 Class Setup Use this screen to add edit or delete QoS classifiers A classifier groups traffic into data flows according to specific criteria such as the source address destination address source port number destination port number or incoming interface For example you can configure a classifier to select traffic from the same protocol port such as Telnet to form a flow You can give different priorities to traffic t
138. P 162 Traps for use with the SNMP RFC 1215 SQL NET TCP 1521 Structured Query Language is an interface to access data on many different types of database systems including mainframes midrange systems UNIX systems and network servers SSH TCP UDP 22 Secure Shell Remote Login Program STRM WORKS UDP 1558 Stream Works Protocol SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server TACACS UDP 49 Login Host Protocol used for Terminal Access Controller Access Control System TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments It operates over TCP IP networks Its primary function is to allow users to log into remote host systems User s Guide 357 Appendix G Common Services Table 126 Commonly Used Services continued NAME PROTOCOL PORT S DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP but uses the UDP User Datagram Protocol rather than TCP Transmission Control Protocol VDOLIVE TCP 7000 Another videoconferencing solution User s Guide Legal Information Copyright Copyright 2008 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any
139. Phone Book gt Speed Dial iacu reticere Preces coo Poen aa eror eee 163 Table 57 TOOLS gt Certilicates gt My Conme S 1 erdasuser em pce SR ned n A ea cL ba pce 168 Table 58 TOOLS gt Certificates gt My GartillDSEIBS ides ritatei ensi as tones dto te Ee rk adds pix un do dke ceu ieia 168 Table 59 TOOLS gt Certificates gt My Certificates gt Create ssssesssssseseeeeeenree 171 Table 60 TOOLS gt Certificates gt My Certificates gt Edit 174 Table 61 TOOLS gt Certificates gt My Certificates gt Import 177 Table 62 TOOLS GCertilibales gt TUBE CAS iussis cimiude ta iov e Hac ree na iro en pde rua Gr ea 178 Table 63 TOOLS gt Certificates gt Tusted CAS uiiiiuescuue irure tegi tena an aa L rada d ak mca ron 178 Table 64 TOOLS Certificates Trusted CAS gt Ell iioii csetera tas cone ee coro e a 180 Table 65 TOOLS gt Certificates gt Trusted CAS Import eene 183 Table G6 TOOLS gt Firewall gt I M mE 192 Table Gf TOOLS gt Firewall Servite DID uuxsuseuencsxtee Peces e oS rae Susie ue E Ren p RARE eaa 193 Table 68 TOOLS Content Filter s IIl iussisse eaim ek ddack uen tek tak eara use oda riu 201 Table 68 TOOLS gt Content Filter gt Shee Lassus ep ti atte tI eae PE PE iena iiia 202 Tabie 70 Prete NISHSDBITIBRN asserpossxerbercasskrisiiast ubera ul para ga pansteeehl baa espe ga uaa deber dade Ra 203 Table 71 TOOLS Remote Management s WAVY uua iazaceier aam dadadrka prx da daba ax ede eina 205 T
140. Pool See the product specifications in the appendices Do not assign static IP addresses from the DHCP pool to your LAN computers These parameters should work for the majority of installations If your ISP gives you explicit DNS server address es see Section 7 3 on page 76 7 6 3 LAN TCP IP The WiMAX Modem has built in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability The LAN parameters of the WiMAX Modem are preset in the factory with the following values P address of 192 168 1 1 with subnet mask of 255 255 255 0 24 bits DHCP server enabled with 32 client IP addresses starting from 192 168 1 33 These parameters should work for the majority of installations If your ISP gives you explicit DNS server address es see Section 7 3 on page 76 User s Guide Chapter 7 The LAN Configuration Screens 7 6 4 DNS Server Address DNS Domain Name System is for mapping a domain name to its corresponding IP address and vice versa The DNS server is extremely important because without it you must know the IP address of a machine before you can access it The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask There are two ways that an ISP disseminates the DNS server addresses The first is for an ISP to tell a customer the DNS server addresses usually in the form of an informa
141. Preferences window click the Network icon Figure 120 Mac OS X 10 4 System Preferences eo System Preferences 4 Show All fal Personal E w m a o Q Appearance Dashboard amp Desktop amp Dock International Security Spotlight Expos Screen Saver Hardware i gt p a Q y w y D mM Bluetooth CDs amp DVDs Displays Energy Keyboard amp Print amp Fax Sound Saver Mouse Internet amp Ne Mac QuickTime Sharing System 1 za a Accounts Date amp Time Software Speech Startup Disk Universal Update Access User s Guide 279 Appendix B Setting Up Your Computer s IP Address 3 When the Network preferences pane opens select Built in Ethernet from the network connection type list and then click Configure Figure 121 Mac OS X 10 4 Network Preferences eo Network 4 Show All Q i Location Automatic HJ Show Network Status Hm Built in Ethernet is currently active and has the IP address Built in Ethernet 10 0 1 2 You are connected to the internet via Built in Ethernet 1 Internet Sharing is on and is using AirPort to share the 6 AirPort connection sconnect Configure 9 d lt S a Click the lock to prevent further changes Assist me Apply Now 4 For dynamically assigned settings select Using DHCP from the Configure IPv4 list in the TCP IP tab Figure 122 Mac OS X 10 4 Network Preferences gt TCP IP Tab
142. SE 10 3 installation Note Make sure you are logged in as the root administrator Follow the steps below to configure your computer IP address in the KDE Click K Menu gt Computer gt Administrator Settings YaST Figure 137 openSUSE 10 3 K Menu gt Computer Menu a Administrator Settings Install Software a System Information A Home Folder A Ls ZB My Documents rv Network Folders Eu Favorites Applications Computer History Leave User zyxel on linux h20z openSUSE User s Guide Appendix B Setting Up Your Computer s IP Address 2 When the Run as Root KDE su dialog opens enter the admin password and click OK Figure 138 openSUSE 10 3 K Menu gt Computer Menu Run as root KDE su lay Please enter the Administrator root y password to continue s W Command sbin yast2 Password Ignore 3 When the YaST Control Center window opens select Network Devices and then click the Network Card icon Figure 139 openSUSE 10 3 YaST Control Center YaST Control Center linux h20z File Edit Help D Software FE Hardware E System f d Network Devices ad fal Network Services Novell AppArmor Security and Users Miscellaneous S earch User s Guide Appendix B Setting Up Your Computer s IP Address 4 When the Network Settings window opens click the Overview tab select the appropriate connection Name from
143. SHER 1 0 CN 7R CA 1 PN NAME CN 8R CA 1 PN O Regulierungsbeh rde f CN 8R CA 1 PN O Re 01 CN 9R CA 1 PN O Regulierungsbeh rde f CN 9R CA 1 PN O Re 02 CN CA Cert Signing Authority EMAlL supp CN CA Cert Signing A 00 CN D TRUST Qualified Root CA 1 2006 PN CN D TRUST Qualifie OOB9SF CN D TRUST Qualified Root CA 2 2006 PN CN D TRUST Qualifie 00B9 CN S TRUST Qualified Root CA 2006 001 P CN S TRUST Qualifie OODF User s Guide Appendix E Importing Certificates 3 The next time you visit the web site click the padlock in the address bar to open the KDE SSL Information window to view the web page s security details User s Guide Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3 5 1 Open Konqueror and click Settings gt Configure Konqueror Figure 207 Konqueror 3 5 Settings Menu ri Hide Menubar Ctrl M Toolbars 1 Full Screen Mode Ctrl Shift F Load View Profile Save View Profile Web Browsing Configure View Profiles Configure Extensions E Configure Spell Checking amp amp Configure Shortcuts Configure Toolbars 2 Configure Konqueror 2 Inthe Configure dialog box select Crypto 3 On the Peer SSL Certificates tab select the certificate you want to delete and then click Remove Figure 208 Kon
144. Server A SIP proxy server receives requests from clients and forwards them to another server In the following example you want to use client device A to call someone who is using client device C The client device A in the figure sends a call invitation to the SIP proxy server B User s Guide Chapter 12 The Service Configuration Screens 2 The SIP proxy server forwards the call invitation to C Figure 61 SIP Proxy Server 12 4 5 SIP Redirect Server A SIP redirect server accepts SIP requests translates the destination address to an IP address and sends the translated P address back to the device that sent the request Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server Redirect servers do not initiate SIP requests In the following example you want to use client device A to call someone who is using client device C 1 Client device A sends a call invitation for C to the SIP redirect server B 2 The SIP redirect server sends the invitation back to A with C s IP address or domain name User s Guide Chapter 12 The Service Configuration Screens 3 Client device A then sends the call invitation to client device C Figure 62 SIP Redirect Server 12 4 6 NAT and SIP 12 4 7 The WiMAX Modem must register its public IP address with a SIP register server If there is a NAT router between the WiMAX
145. Set master password Content Fonts Downloads Programs History aes Enable Fraud Protection Manage certificates Toolbars Shortcuts Voice User s Guide Appendix E Importing Certificates 3 In the Certificates manager select the Authorities tab select the certificate that you want to remove and then click Delete Figure 200 Opera 9 Certificate manager Certificate manager Certificate authorities 172 20 37 202 AAA Certificate Services Actalis Root CA AddTrust Class 1 CA Root AddTrust External CA Root AddTrust Public CA Root AddTrust Qualified CA Root Baltimore CyberTrust Code Signing Root Baltimore CyberTrust Mobile Root Baltimore CyberTrust Root Certum CA Certum CA Level I Certum CA Level II Certum CA Level III Certum CA Level IV Class 1 Public Primary Certification Authority Class 1 Public Primary Certification Authority G2 c 1998 VeriSig Class 2 Public Primary Certification Authority 4 The next time you go to the web site that issued the public key certificate you just removed a certification error appears Note There is no confirmation when you delete a certificate authority so be absolutely certain that you want to go through with it before clicking the button User s Guide 345 Appendix E Importing Certificates Konqueror The following example uses Konqueror 3 5 on openSUSE 10 3 however the screens apply to Konqueror 3 5 on all Li
146. T E 223 204 Log Massage DescrDUOlls brorsa 225 Chapter 21 Bee TE Bd cee er 235 BN TB TEE o USERS mmm 235 212 AUS ICY BON a a E 235 A PU SUN sara A A E arsine E E cheer Sassi d mos Lago Ribas d 239 2122 WIMAX Sike Iomneblsiii scarii n ces treet terre orta Re os Ap deae 241 DABURIE EINE Me M TTD 242 Z2 d Velp SASS iiec eodd pP Ote pred da eyi Pra te tak hubd c ovp desk b d es hood Reg ppE Pd SERE IDEE 243 ie PIN ES 245 Part VI Troubleshooting and Specifications 247 Chapter 22 Bil ipee ci tie RRCmRRRR 249 22 1 Power Hardware Connections and LEDS 4 55 om bv rev n eher a oa Y a EI Ya ER eR ean 249 22 2 WIAA Modem Access and LOGIN 2 2 eiat vadat tota cata ted vasa root v RR byte qaa o GbLY UR RAN GHE 250 eed MOREL ACR pe 252 220 PN el Sea WP ss uscsssivxexcnnivasex idu dude euaisG veces sucka ulus bai acne ER RR da 253 22 5 Reset the WiMAX Modem to Its Factory Defaults 00 eee cceecesscceeeeeeeeeeeeeeenseeeeeeteneenees 254 22 5 1 Pop up Windows JavaScripts and Java Permissions ssesssssss 255 Chapter 23 Product c c eri a ee cng dats Seagate cance sept ce scence Sette 257 Part VII Appendices and Index eeeeeeeeee 265 Appendix A WIMAX SOC suusisbnibbeblbini MEM ip ide DA Par a EEE OEO TSE 267 User s Guide Tabl
147. TCP RST The router sent a TCP reset packet when a dynamic firewall session timed out The default timeout values are as follows ICMP idle timeout 3 minutes UDP idle timeout 3 minutes TCP connection three way handshaking timeout 270 seconds TCP FIN wait timeout 2 MSL Maximum Segment Lifetime set in the TCP header TCP idle established timeout s 150 minutes TCP reset timeout 10 seconds Exceed MAX incomplete sent TCP RST The router sent a TCP reset packet when the number of incomplete connections TCP and UDP exceeded the user configured threshold Incomplete count is for all TCP and UDP connections through the firewall Note When the number of incomplete connections TCP UDP gt Maximum Incomplete High the router sends TCP RST packets for TCP connections and destroys TOS firewall dynamic sessions until incomplete connections lt Maximum Incomplete Low Access block sent TCP RST The router sends a TCP RST packet and generates this log if you turn on the firewall TCP reset mechanism via Cl command sys firewall tcprst Table 90 Packet Filter Logs LOG MESSAGE DESCRIPTION TCP UDP ICMP IGMP Generic packet filter matched set d rule d Attempted access matched a configured filter rule denoted by its set and rule number and was blocked or forwarded according to the rule User s Guide 227 Chapter 20 The Logs
148. TION The number of the item in this list Active This icon is green if the associated interface is enabled The icon is grey if the associated interface is disabled Enable or disable an interface by clicking its Edit icon and selecting or deselecting Active and clicking Apply in the screen that displays Interface Type This displays either Tagged or Untagged A tagged interface controls traffic with a specific IEEE 802 1Q VLAN tag whereas an untagged interface controls traffic that does not have a VLAN tag There can be only one untagged interface VLAN ID For a tagged interface this displays the IEEE 802 1Q VLAN ID number For the untagged interface 1 displays Mode This displays either B bridging or R routing Only the default interface interface 0 can be a routing interface User s Guide Chapter 9 The VPN Transport Screens Table 26 ADVANCED gt VPN Transport gt Customer Interface continued LABEL DESCRIPTION Associated This displays the number of the Ethernet pseudowire that this interface Ethernet uses as well as the ingress and egress MPLS Multi Protocol Label Pseudowire Switching VC Virtual Circuit label numbers Ingress Egress DSCP This displays the DiffServ Control Point value you previously entered in binary This determines the pseudowire s priority on the network The DSCP value is displayed in binary notation
149. TON NUIT 152 Fdo RO oosccoledttergenibet cec R QU M D MO epeuP uda M MINES 153 pellice 154 Todd mo Fan AY Tr E 154 13 5 2 Europe Type Supplementary Phone Services cccccceceeeeeceeeeeeeeeeeeeeeeeeeeaeeeeee 154 13 5 3 USA Type Supplementary Services esesssesesssseseeeene eee 156 Chapter 14 The Phone Book 159 T TONON onna tr trPrret tr PPPerr tener Terri t rrrrer tt Ppree tetrrrrr nT rrr Pree rte Terre ttrrrrr tT err 159 T4 1 1 What You Can Do in The Chapter cctccccaccsnces onielasscantens scectiacetcsacenionatonaneeeadwnnaetacty 159 14 1 2 What You Negd TO KNOW acuoacesbobaisesexi das Fed cdaae n ec da ace cea ruap E euin das Ga Ru duae id maid d 159 14 ncamhg Cal FOICE ette TU 160 D por CARI mre eee ree aA A T 162 Part V Tools amp Status Screens eeeeeeeeee 165 Chapter 15 liit 1 1 167 p ue 1 POM ES N rdc c e ann 167 15 1 1 What You Gan Do in This Chapter peonio aaa 167 15 52 Vat You Need Te KION icsbxni RR va REF eD x ERR DI E CER YEA Reb au Ida aS REN 167 EN PEE eI RT DIT 168 15a My IAS SOAR EET D aaRS 170 158 28 Ny eT Ae BOE opaca petia bia unb acta adt ool FD eU aae ee 174 preflqduge nuege 177 Toa TSE CAS acs Em 178 Deol TTEA EY a a UU I T UU TTE 180 Iaoa MRSJ OA IMPO aariaa TET 183 124 JeChnIGAl a e E ONAE EA EA A A p c T 183 User
150. TP Click TOOLS Remote Management FTP to control FTP access to your WiMAX Modem Figure 89 TOOLS gt Remote Management gt FTP Server Port 21 Server Access LAN amp WAN Secured Client IP Address 9 Al Selected 0 0 0 0 User s Guide Chapter 18 The Remote Management Screens The following table describes the labels in this screen Table 73 TOOLS gt Remote Management gt FTP LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem The computer must use the same port number Server Access Select the interface s through which a computer may access the WiMAX Modem using this service Secured Client Select All to allow any computer to access the WiMAX Modem using this P Address service Select Selected to only allow the computer with the IP address that you specify to access the WiMAX Modem using this service Apply Click to save your changes Reset Click to restore your previously saved settings 18 5 SNMP An SNMP managed network consists of two main types of component agents and a manager Figure 90 SNMP Management Model MANAGER Managed Device Managed Device Managed Device An agent is a management software module that resides in a managed device the WiMAX Modem An agent translates the local management information from the managed device into a form compatible with SNMP The m
151. VITE 2 Ringing 3 OK 4 ACK 5 Dialogue voice traffic 6 BYE 7 OK 1 A sends a SIP INVITE request to B This message is an invitation for B to participate in a SIP telephone call 2 B sends a response indicating that the telephone is ringing 3 B sends an OK response after the call is answered 4 Athen sends an ACK message to acknowledge that B has answered the call 5 Now A and B exchange voice media talk User s Guide Chapter 12 The Service Configuration Screens 12 4 2 12 4 3 12 4 4 1 After talking A hangs up and sends a BYE request B replies with an OK response confirming receipt of the BYE request and the call is terminated SIP Client Server SIP is a client server protocol A SIP client is an application program or device that sends SIP requests A SIP server responds to the SIP requests When you use SIP to make a VoIP call it originates at a client and terminates at a server A SIP client could be a computer or a SIP phone One device can act as both a SIP client and a SIP server SIP User Agent A SIP user agent can make and receive VoIP telephone calls This means that SIP can be used for peer to peer communications even though it is a client server protocol In the following figure either A or B can act as a SIP user agent client to initiate a call A and B can also both act as a SIP user agent to receive the call Figure 60 SIP User Agent SIP Proxy
152. a specific VLAN ID or untagged controlling traffic without a specific VLAN ID There can be only one untagged interface VLAN ID Enter the Virtual Local Area Network Identifier number 1 4094 for this interface This VLAN ID must not be used by any other customer interface For the untagged interface 1 displays Mode This displays Bridging or Routing A tagged interface can operate in bridging mode only Associated Select the Ethernet pseudowire this interface should use for Ethernet communications over the WiMAX network You should configure the Pseudowire pseudowire in the ADVANCED gt VPN Transport gt Ethernet Pseudowire screen before you select it DSCP If you wish to prioritize an interface enter a DiffServ Code Point value of six bits in binary notation The higher the value the higher the interface s priority on the WiMAX Modem s WiMAX link Interface Enter a brief up to 31 characters name or description for this Description interface Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 9 4 Ethernet Pseudowire Because VPLS mimics a simple wired Ethernet connection to your service provider s router the connection between the WiMAX Modem and the peer device is known as an Ethernet pseudowire or PW The Ethernet pseudowires use MPLS MultiProtocol Label Switching virtual circuit labels to define the connection In an
153. able 72 TOOLS gt Remote Management gt Telnet ouest eemtu pie rene eon e Ebbene tere eL Re rra ee EucEs 206 Table 73 TOOLS gt Remote Management FUP esu ende tert tnrba a Rie nik pt a bmi tien 207 HE CN EI e emm 208 Table 75 TOOLS Remote Management SNMP iier cce peterem erbe tn koh aine n ranae eek siantetes 209 Table 76 TOOLS Remote Management s DNS auae caedit dnte dad en arde d aaa 210 Table 77 TOOLS gt Remote Management gt Security entente 211 Table 78 TOOLS gt Remote Management gt TROBO 1er enr aai 213 TRDIG ZU TAULO QD r GENEI rooien oa tea asc Cka ii DCE Eos dU da a R i 215 TAS BO CS CIES GOUD serinin ined cates decadence a O EEE 216 User s Guide List of Tables BE XL GS Gass GED MP ed 217 TAG BH UA EE a E E dat i Don aapcdmnu ud teebas Ud aD Lec sain Sten eae dar atu Resta 220 Table 83 RFC 2408 ISAKMP Payload Typos uuiescaseect urere sitter eurer rane ben pce R Re race so Ea aia 220 Table 84 TOOLS v Dons gt VIEW BONS asse bupa ke tons lide dh be n e dna M OGNI PR Ma eee 221 The SS TOOLS gt Logs r Log ne sc csc acerrcncxs ewonn paserecau i gx esac sau vaaweeneavaxencaptasdcaets aamncanneiee 224 TAS BG System Eno LOOS arisini oina anaa Scaaanueeddisced inte haga teaeaccadanseneddeasceedieacuenessas 225 Table 87 System Maintenance LONG aise icainsasisddensnicndomiietn dia david adu aA SNE dd SR Fre DUE 225 Table Ge Accs otra Logs err TUE 226 BE CM cma T UU i UI 227 TOO Se Packet Fifer
154. address domain name or e mail address Type the IP address in dotted decimal notation domain name or e mail address in the field provided The domain name or e mail address is for identification purposes only and can be any string A domain name can be up to 255 characters You can use alphanumeric characters the hyphen and periods An e mail address can be up to 63 characters You can use alphanumeric characters the hyphen the symbol periods and the underscore Organizational Unit Identify the organizational unit or department to which the certificate owner belongs You can use up to 63 characters You can use alphanumeric characters the hyphen and the underscore Organization Identify the company or group to which the certificate owner belongs You can use up to 63 characters You can use alphanumeric characters the hyphen and the underscore Country Identify the state in which the certificate owner is located You can use up to 31 characters You can use alphanumeric characters the hyphen and the underscore Key Length Select a number from the drop down list box to determine how many bits the key should use 512 to 2048 The longer the key the more secure it is A longer key also uses more PKI storage space Enrollment Options These radio buttons deal with how and when the certificate is to be generated Create a self signed certificate Select Create a self signed certificate to have the
155. an 730 Deactivate Call Forwarding No Answer 740 Plus the forward to phone number to activate Call Forwarding Busy no VM service plan 911 911 Emergency phone number same as dialing 911 411 411 Wireless Information Services To take full advantage of the supplementary phone services available through the WiMAX Modem s phone port you may need to subscribe to the services from your voice account service provider Not all features are supported by all service providers Consult your service provider for more information User s Guide Chapter 23 Product Specifications User s Guide ART Index WiMAX Security 267 Setting Up Your Computer s IP Address 271 Pop up Windows JavaScripts and Java Permissions 299 IP Addresses and Subnetting 309 Importing Certificates 321 SIP Passthrough 353 Common Services 355 Legal Information 359 Customer Support 363 WiMAX Security Wireless security is vital to protect your wireless communications Without it information transmitted over the wireless network would be accessible to any networking device within range User Authentication and Data Encryption PKMv2 The WiMAX IEEE 802 16 standard employs user authentication and encryption to ensure secured communication at all times User authentication is the process of confirming a user s identity and level of authorization Data encrypti
156. anager is the console through which network administrators perform network management functions It executes applications that control and monitor managed devices User s Guide 207 Chapter 18 The Remote Management Screens The managed devices contain object variables managed objects that define each piece of information to be collected about a device Examples of variables include such as number of packets received node port status etc A Management Information Base MIB is a collection of managed objects SNMP allows a manager and agents to communicate for the purpose of accessing these objects The WiMAX Modem supports MIB II that is defined in RFC 1213 and RFC 1215 The focus of the MIBs is to let administrators collect statistical data and monitor status and performance SNMP itself is a simple request response protocol based on the manager agent model The manager issues a request and the agent returns responses using the following protocol operations Get Allows the manager to retrieve an object variable from the agent GetNext Allows the manager to retrieve the next object variable from a table or list within an agent In SNMPv1 when a manager wants to retrieve all elements of a table from an agent it initiates a Get operation followed by a series of GetNext operations Set Allows the manager to set values for object variables within an agent Trap Used by the agent to inform the manager of some events
157. and has six bits Interface This displays the information you previously entered describing the Description interface For the default interface interface 0 the description reads for routing NAT Action Click the Edit icon to set up a new interface or alter the configuration of an existing interface Click the Delete icon to remove an existing interface 9 3 4 Customer Interface Setup Click the Edit icon in the ADVANCED gt VPN Transport gt Customer I nterface screen to open the Customer Interface Setup Customer interfaces map traffic onto specific Ethernet pseudowires for transport over the WiMAX network There is also a default customer interface for routing traffic that does not possess a VLAN tag Figure 39 ADVANCED gt VPN Transport gt Customer Interface Setup Customer Interface Setup O Active Interface Type Tagged VLAN ID 1 1744034 for tagged 1 for Untagged Mode Bridging Associated Ethernet Pseudowire DSCP 1000000 6 bits Interface Description Ifor Routing NAT User s Guide Chapter 9 The VPN Transport Screens The following table describes the labels in this screen Table 27 ADVANCED gt VPN Transport gt Customer Interface Setup LABEL DESCRIPTION Active Select to make this customer interface active Deselect it to make the customer interface inactive Customer Interface Type A customer interface can be tagged controlling traffic that has
158. andwidth 10MHz CINR Mean dB CINR Deviation dB RSSI dBm UL Data Rate DL Data Rate Tx Power Refresh Interval None v System Status System Uptime 70 29 22 Current Date Time 2009 03 05 22 29 19 System Resource pem 39 IVR Usage I 1 of 128Sec Memory Usage Interface Status Interface Status Rate WAN Down N A LAN Up 100M Full Summary WiMAX Profile DHCP Table VoIP Status Account Registration URI Voice 1 Failed changeme 127 0 0 1 User s Guide Chapter 21 The Status Screen The following tables describe the labels in this screen Table 103 Status LABEL DESCRIPTION Refresh Interval Select how often you want the WiMAX Modem to update this screen Refresh Now Click this to update this screen immediately Device Information System Name This field displays the WiMAX Modem system name It is used for identification You can change this in the ADVANCED gt System Configuration gt General screen s System Name field Firmware This field displays the current version of the firmware inside the device Version It also shows the date the firmware version was created You can change the firmware version by uploading new firmware in ADVANCED gt System Configuration gt Firmware WAN Information P Address This field displays the current IP address of the WiMAX Modem in the WAN IP Subnet Mask This field displays the current subnet
159. appen on data that is coming from inside the WiMAX Modem and going to the outside 2 If an application needs a continuous data stream that port range will be tied up so that another computer on the LAN can t trigger it 10 5 ALG Some applications such as SIP cannot operate through NAT are NAT un friendly because they embed IP addresses and port numbers in their packets data payload Some NAT routers may include a SIP Application Layer Gateway ALG An Application Layer Gateway ALG manages a specific protocol such as SIP H 323 or FTP at the application layer A SIP ALG allows SIP calls to pass through NAT by examining and translating IP addresses embedded in the data stream User s Guide Chapter 10 The NAT Configuration Screens Click ADVANCED gt NAT Configuration gt ALG to enable and disable SIP VoIP FTP file transfer and H 323 audio visual ALG in the WiMAX Modem Figure 50 ADVANCED gt NAT Configuration gt ALG Enable SIP ALG Enable FTP ALG Enable H 323 ALG ih The following table describes the labels in this screen Table 37 ADVANCED gt NAT Configuration gt ALG LABEL DESCRIPTION Enable SIP ALG Select this to make sure SIP VoIP works correctly with port forwarding and port triggering rules Enable FTP ALG Select this to make sure FTP file transfer works correctly with port forwarding and port triggering rules Enable
160. ases some or all of this information may not be available Note This field displays additional information about the log entry 222 User s Guide Chapter 20 The Logs Screens 20 3 Log Settings Click TOOLS gt Logs gt Log Settings to configure where the WiMAX Modem sends logs and alerts the schedule for sending logs and which logs and alerts are sent or recorded Figure 100 TOOLS gt Logs gt Log Settings E mail Log Settings Mail Server Mail Subject Send Log to Send Alerts to Log Schedule Day for Sending Loa Time for Sending Log C Clear log after sending mail Syslog Logging O Active Syslog Server IP Address Log Facility Active Log and Alert Log System Maintenance System Errors C Access Control Cl TCP Reset C Packet Filter O icmp C Remote Management CDR PPP CI Forward Web Sites CI Blocked Web Sites C Blocked Java etc C Attacks O PKI O SSL TLS SIP Outgoing SMTP Server NAME or IP Address E Mail Address E Mail Address When Log is Full v Monday v hour fo minute _ Server NAME or IP Address Local 1 v Send immediate alert C System Errors CI Access Control C Blocked Web Sites C Blocked Java etc C Attacks O PKI Cancel User s Guide Chapter 20 The Logs Screens The following table describes the labels in this screen Table 85 TOOLS gt Logs gt Log Set
161. at http www zyxel com web support_warranty_ info php Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com User s Guide Customer Support In the event of problems that cannot be solved by using this manual you should contact your vendor If you cannot contact your vendor then contact a ZyXEL office for the region in which you bought the device Regional offices are listed below see also http www zyxel com web contact_us php Please have the following information ready when you contact an office Required Information Product model and serial number Warranty Information Date that you received your device Brief description of the problem and the steps you took to solve it is the prefix number you dial to make an international telephone call Corporate Headquarters Worldwide Support E mail support zyxel com tw Sales E mail sales zyxel com tw Telephone 886 3 578 3942 Fax 886 3 578 2439 Web www zyxel com e Regular Mail ZyXEL Communications Corp 6 Innovation Road II Science Park Hsinchu 300 Taiwan China ZyXEL Communications Beijing Corp Support E mail cso zycn zyxel cn Sales E mail sales zyxel cn Telephone 86 010 82800646 Fax 86 010 82800587 Address 902 Unit B Horizon Building No 6 Zhichun Str Haidian District Beijing Web http www zyxel cn User s
162. ble describes the labels in this screen Table 46 VOICE gt Service Configuration gt QoS LABEL DESCRIPTION TDS SIP TOS Priority Enter the priority for SIP voice transmissions The WiMAX Modem Setting creates Type of Service priority tags with this priority to voice traffic that it transmits RTP TOS Enter the priority for RTP voice transmissions The WiMAX Modem Priority Setting creates Type of Service priority tags with this priority to RTP traffic that it transmits VLAN Tagging User s Guide Chapter 12 The Service Configuration Screens Table 46 VOICE gt Service Configuration gt QoS LABEL DESCRIPTION Voice VLAN ID Select this if the WiMAX Modem has to be a member of a VLAN to communicate with the SIP server Ask your network administrator if you are not sure Enter the VLAN ID provided by your network administrator in the field on the right Your LAN and gateway must be configured to use VLAN tags Otherwise clear this field Apply Click to save your changes Reset Click to restore your previously saved settings 12 4 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter 12 4 1 SIP Call Progression The following figure displays the basic steps in the setup and tear down of a SIP call A calls B Table 47 SIP Call Progression A B 1 IN
163. ble hosts in a network as follows Table 117 Maximum Host Numbers SUBNET MASK HOST ID SIZE PSI DUM EC EROR 8 bits 255 0 0 0 24 bits 9 T 09 16777214 16 bits 255 255 0 0 16 bits 216 _ 2 65534 24 bits 255 255 255 0 8 bits 28 2 254 29 bits 255 255 255 2 3 bits 23 2 6 48 User s Guide 311 Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet This is usually specified by writing a followed by the number of bits in the mask after the address For example 192 1 1 0 25 is equivalent to saying 192 1 1 0 with subnet mask 255 255 255 128 The following table shows some possible subnet masks using both notations Table 118 Alternative Subnet Mask Notation 2 SUBNET ALTERNATIVE LAST OCTET LAST OCTET MASK NOTATION BINARY DECIMAL 255 255 255 0 24 0000 0000 0 255 255 255 12 25 1000 0000 128 8 255 255 255 19 26 1100 0000 192 2 255 255 255 22 27 1110 0000 224 4 255 255 255 24 28 1111 0000 240 0 255 255 255 24 29 1111 1000 248 8 255 255 255 25 30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub networks In the following
164. cated Figure 67 VOICE gt Phone gt Region Region Settings United States v Call Service Mode USAType The following table describes the labels in this screen Table 51 VOICE gt Phone gt Region LABEL DESCRIPTION Region Settings Select the place in which the WiMAX Modem is located Do not select Default Call Service Select the mode for supplementary phone services call hold call Mode waiting call transfer and three way conference calls that your VoIP service provider supports Europe Type use supplementary phone services in European mode USA Type use supplementary phone services American mode You might have to subscribe to these services to use them Contact your VoIP service provider Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide 153 Chapter 13 The Phone Screens 13 5 Technical Reference The following section contains additional technical information about the WiMAX Modem features described in this chapter 13 5 1 The Flash Key Flashing means to press the hook for a short period of time a few hundred milliseconds before releasing it On newer telephones there should be a flash key button that generates the signal electronically If the flash key is not available you can tap press and immediately release the hook by hand to achieve the same effect However using the flash
165. ce Choose Selected to just allow the computer with the IP address that you specify to access the WiMAX Modem using this service Apply Click to save your changes Reset Click to restore your previously saved settings 18 6 DNS Click TOOLS gt Remote Management gt DNS to access this screen Use this screen to control DNS access to your WiMAX Modem Figure 92 TOOLS gt Remote Management gt DNS Server Port 53 Server Access LAN amp WAN v Secured Client IP Address 9 Al Selected 0 0 0 0 The following table describes the labels in this screen Table 76 TOOLS Remote Management DNS LABEL DESCRIPTION Server Port This field is read only This field displays the port number this service uses to access the WiMAX Modem The computer must use the same port number Server Access Select the interface s through which a computer may access the WiMAX Modem using this service Secured Client Select All to allow any computer to access the WiMAX Modem using this IP Address service Select Selected to only allow the computer with the IP address that you specify to access the WiMAX Modem using this service Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 18 The Remote Management Screens 18 7 Security Click TOOLS gt Remote Management gt Security to access this scr
166. cess this screen Use this screen to generate and export self signed certificates or certification requests and import the WiMAX Modem s CA signed certificates Figure 70 TOOLS gt Certificates gt My Certificates PKI Storage Space in Use My Certificates Name o NENNEN 100 18 Type Subject Issuer Valid From Valid To Action CN MAX 200M1 cN MAx 200Mi 2000Jan 2030 Jan 1st 1st 1 auto generated self signed cert SELF Factory Default Factory Default 00 00 00 00 00 00 EXE Certificate Certificate GMT GMT LT The following table describes the icons in this screen Table 57 TOOLS gt Certificates gt My Certificates ICON DESCRIPTION EP Edit Click to edit this item ga Export Click to export an item dur Delete Click to delete this item The following table describes the labels in this screen Table 58 TOOLS gt Certificates gt My Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the WiMAX Modem s PKI storage space that is currently in use When the storage space is almost full you should consider deleting expired or unnecessary certificates before adding more certificates The number of the item in this list User s Guide Chapter 15 The Certificates Screens Table 58 TOOLS gt Certificates gt My Certificates continued LABEL DESCRIPTION Name
167. chable packet for a port probe on unused UDP ports and with a TCP Reset packet for a port probe on unused TCP ports Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 18 The Remote Management Screens 18 8 TRO 69 TR 069 is an abbreviation of Technical Reference 069 a protocol designed to facilitate the remote management of Customer Premise Equipement CPE such as the WiMAX Modem It can be managed over a WAN by means of an Auto Configuration Server ACS TR 069 is based on sending Remote Procedure Calls RPCs between the ACS and the client device RPCs are sent in Extensible Markup Language XML format over HTTP or HTTPS An administrator can use an ACS to remotely set up the WiMAX Modem modify its settings perform firmware upgrades and monitor and diagnose it In order to do so you must enable the TR 069 feature on your WiMAX Modem and then configure it appropriately The ACS server which it will use must also be configured by its administrator Figure 94 TR 069 Example In this example the WiMAX Modem receives data from at least 3 sources A SIP server for handling voice calls an HTTP server for handling web services and an ACS for configuring the WiMAX Modem remotely All three servers are owned and operated by the client s Internet Service Provider However without the configuration settings from the ACS the WiMAX Modem cannot access the othe
168. check box is selected to have the firewall protect your LAN from Denial of Service DoS attacks Max NAT Firewall Session Per User 2048 Log No Log N No Log v The following table describes the labels in this screen Table 66 TOOLS gt Firewall gt General LABEL DESCRIPTION Enable Firewall Select this to activate the firewall The WiMAX Modem controls access and protects against Denial of Service DoS attacks when the firewall is activated Bypass Triangle Route Select this if you want to let some traffic from the WAN go directly to a computer in the LAN without passing through the WiMAX Modem Max NAT Firewall Session Per User Select the maximum number of NAT rules and firewall rules the WiMAX Modem enforces at one time The WiMAX Modem automatically allocates memory for the maximum number of rules regardless of whether or not there is a rule to enforce This is the same number you enter in ADVANCED gt NAT Configuration gt General Packet Direction Log Select the situations in which you want to create log entries for firewall events No Log do not create any log entries Log Blocked LAN to WAN only create log entries when packets are blocked Log Forwarded WAN to LAN only create log entries when packets are forwarded Log All create log entries for every packet Apply Click to save your changes Reset Click to restore your previously
169. ck Section 1 2 1 on page 33 If the WiMAX Modem is sending or receiving a lot of information try closing some programs that use the Internet especially peer to peer applications 4 Disconnect and re connect the power adapter to the WiMAX Modem 5 If the problem continues contact the network administrator or vendor or try one of the advanced suggestions The Internet connection disconnects 1 Check your WiMAX link and signal strength using the WiMAX Link and Strength I ndicator LEDs on the device 2 Contact your ISP if the problem persists User s Guide 253 Chapter 22 Troubleshooting 22 4 Phone Calls and VoIP The telephone port won t work or the telephone lacks a dial tone 1 Check the telephone connections and telephone wire 2 Make sure you have the VOICE gt Service Configuration gt SIP Settings screen properly configured Chapter 12 on page 131 can access the Internet but cannot make VolP calls 1 Make sure you have the VOICE gt Service Configuration gt SIP Settings screen properly configured Chapter 12 on page 131 2 The VolP LED should come on Make sure that your telephone is connected to the Vol P port see the Quick Start Guide for information on connecting telephone cables to the these ports 3 You can also check the VoIP status in the Status screen 4 Ifthe VoIP settings are correct use speed dial to make peer to peer calls If you cannot make a call using sp
170. configure the DHCP server in the WiMAX Modem Figure 20 ADVANCED gt LAN Configuration gt DHCP Setup DHCP Setup Enable DHCP Server IP Pool Starting Address 192 168 100 33 Pool Size 32 DNS Server DNS Servers Assigned by DHCP Server First DNS Server From ISP v Second DNS Server From ISP v Third DNS Server FromIP v Apply User s Guide Chapter 7 The LAN Configuration Screens The following table describes the labels in this screen Table 13 ADVANCED gt LAN Configuration gt DHCP Setup LABEL DESCRIPTION DHCP Setup Enable DHCP Select this if you want the WiMAX Modem to be the DHCP server on the Server LAN As a DHCP server the WiMAX Modem assigns IP addresses to DHCP clients on the LAN and provides the subnet mask and DNS server information P Pool Starting Address Enter the IP address from which the WiMAX Modem begins allocating IP addresses if you have not specified an IP address for this computer in ADVANCED gt LAN Configuration gt Static DHCP Pool Size Enter the number of IP addresses to allocate This number must be at least one and is limited by a subnet mask of 255 255 255 0 regardless of the subnet the WiMAX Modem is in For example if the IP Pool Start Address is 10 10 10 10 the WiMAX Modem can allocate up to 10 10 10 254 or 245 IP addresses DNS Server First Second and Third DNS Server Specify the IP addresses of a maximum of thr
171. connects to the ACS and which is used for authentication You can enter up to 31 alphanumeric characters a z A Z 0 9 and underscores but spaces are not allowed Password Enter the password sent when the WiMAX Modem connects to an ACS and which is used for authentication You can enter up to 31 alphanumeric characters a z A Z 0 9 and underscores but spaces are not allowed Connection Enter the connection request user name that the ACS must send to the Request WiMAX Modem when it requests a connection User Name You can enter up to 31 alphanumeric characters a z A Z 0 9 and underscores but spaces are not allowed Note This must be provided by the ACS administrator Connection Enter the connection request password that the ACS must send to the Request WiMAX Modem when it requests a connection Password You can enter up to 31 alphanumeric characters a z A Z 0 9 and underscores but spaces are not allowed Note This must be provided by the ACS administrator User s Guide 213 Chapter 18 The Remote Management Screens Table 78 TOOLS gt Remote Management gt TRO69 LABEL DESCRIPTION Periodic Inform Enable Select this to allow the WiMAX Modem to periodically connect to the ACS and check for configuration updates If you do not enable this feature then the WiMAX Modem can only be updated automatically when the ACS initiates contact with it and if you selected the
172. ct this to use dynamic DNS Service Select the name of your Dynamic DNS service provider Provider Dynamic DNS Select the type of service that you are registered for from your Dynamic Type DNS service provider Host Name Enter the host name You can specify up to two host names separated by a comma User Name Enter your user name Password Enter the password assigned to you Enable Wildcard Option Select this to enable the DynDNS Wildcard feature User s Guide Chapter 11 The System Configuration Screens Table 39 ADVANCED gt System Configuration gt Dynamic DNS continued LABEL DESCRIPTION Enable offline option This field is available when CustomDNS is selected in the DDNS Type field Select this if your Dynamic DNS service provider redirects traffic to a URL that you can specify while you are off line Check with your Dynamic DNS service provider P Address Update Policy Use WAN IP Select this if you want the WiMAX Modem to update the domain name Address with the WAN port s IP address Dynamic DNS Select this if you want the DDNS server to update the IP address of the server auto host name s automatically Select this option when there are one or detect IP more NAT routers between the WiMAX Modem and the DDNS server address Note The DDNS server may not be able to detect the proper IP address if there is an HTTP proxy server between the WiMAX Mod
173. ctet values for each subnet Table 123 Eight Subnets SUBNET SUBNET FIRST ADDRESS ST ADDRESS 7 1 30 31 zm 33 62 63 3 64 65 iih 2 2 T 97 126 127 5 128 129 Pu SUE 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24 bit network number Table 124 24 bit Network Number Subnet Planning NO PORROWED SUBNET MASK NO SUBNETS NO HOSTS PER 1 255 255 255 128 25 126 2 255 255 255 192 26 4 62 3 255 255 255 224 27 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 6 255 255 255 252 30 64 2 7 255 255 255 254 31 128 1 User s Guide Appendix D IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16 bit network number Table 125 16 bit Network Number Subnet Planning HOST BITS SUBNET MASK SUBNETS SUBNET 1 255 255 128 0 17 2 32766 2 255 255 192 0 18 4 16382 3 255 255 224 0 19 8 8190 4 255 255 240 0 20 16 4094 5 255 255 248 0 21 32 2046 6 255 255 252 0 22 64 1022 7 255 255 254 0 23 128 510 8 255 255 255 0 24 256 254 9 255 255 255 128 25 512 126 10 255 255 255 192 26 1024 62 11 255 255 255 224 27 2048 30 12 255 255 255 240 28 4096 14 13 25
174. ction amp CJ chris gt Details 4 Inthe Network Settings window select the connection that you want to configure then click Properties Figure 133 Ubuntu 8 Network Settings Connections ir Network Settings E Point to point connec This network interface is not c 288 User s Guide Appendix B Setting Up Your Computer s IP Address 5 The Properties dialog box opens Figure 134 Ubuntu 8 Network Settings Properties t eO Propernes Ea Connection Settings Configuration lt IP address Subnet mask Gateway address cancel In the Configuration list select Automatic Configuration DHCP if you have a dynamic IP address n the Configuration list select Static IP address if you have a static IP address Fill in the IP address Subnet mask and Gateway address fields 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen User s Guide Appendix B Setting Up Your Computer s IP Address 7 Ifyou know your DNS server IP address es click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided Figure 135 Ubuntu 8 Network Settings gt DNS Ej Network Settings Be Location d Connections General DNS Hosts DNS Servers Search Domains
175. d dial number Name This is the name of the party associated with this speed dial number Type This indicates whether this speed dial number uses a proxy or not when placing a call to the phone number associated with it Destination This indicates if the speed dial entry uses one of your SIP accounts or uses the IP address or domain name of the SIP server Action Click the Delete icon to erase this speed dial entry Apply Click to save your changes Clear Click to clear all fields on the screen and begin anew User s Guide Chapter 14 The Phone Book Screens User s Guide Status screens The Certificates Screens 167 The Firewall Screens 189 Content Filter 199 The Remote Management Screens 203 QoS 215 The Logs Screens 219 The Status Screen 235 The Certificates Screens 15 1 Overview 15 1 1 15 1 2 Use the TOOLS gt Certificates screens to manage public key certificates on the WiMAX Modem The WiMAX Modem can use public key certificates also sometimes called digital IDs to authenticate users Certificates are based on public private key pairs A certificate contains the certificate owner s identity and public key Certificates provide a way to exchange public keys for use in authentication Public key certificates are used by web browsers to ensure that a secure web site is legitimate When a certificate authority such as VeriSign Comodo or Network Solutions to name a few rece
176. dem does not restart automatically disconnect and reconnect the WiMAX Modem s power Then follow the directions above again 22 5 1 Pop up Windows JavaScripts and Java Permissions Please see Appendix C on page 299 User s Guide 255 Chapter 22 Troubleshooting User s Guide Product Specifications This chapter gives details about your WiMAX Modem s hardware and firmware features Table 109 Environmental and Hardware Specifications FEATURE DESCRIPTION Operating Temperature 40 C to 60 C ODU 5 C to 55 C IDU Storage Temperature 40 C to 65 C ODU 25 C to 60 C IDU Operating Humidity 10 90 non condensing Storage Humidity 10 to 95 non condensing Power Supply Input 90V 270V 50 60Hz Output 48 0V 0 38A Power Consumption MAX 306M1 US maximum 9 61W EU maximum 7 77W MAX 306M1 US maximum 10 46W EU maximum 9 00W Ethernet Interface One auto negotiating auto MDI MDI X NWay 10 100 Mbps RJ 45 Ethernet port Telephony Interface One analog ATA interfaces for standard telephones through RJ 11 FXS Foreign Exchange Subscriber analog connector Power over Ethernet Interface PoE One RJ 45 type PoE port providing 48V DC to the MAX 306M1 ODU from the MAX 306M1 IDU Antennas One 15dBi 0 5dBi Cross Polarization antenna ODU Weight 400g Dimensions ODU 372 L mm x 232 W mm x 54 8 H mm IDU
177. e 1 Registered Fail SIP Registration Failed Please make sure the ethernet cable is connected You can press Register Again button to do SIP Registration again or press Close button to exit this wizard 4 2 2 Setup Complete Click Close to complete and save the VoIP Connection settings Figure 15 VoIP Connection gt Finish Setup Complete You have completed configuring your Internet connection Click the Close button to close the ZyXEL Setup Wizard and go to the main web configurator screen Laose This screen displays if your SIP account registration was successful User s Guide Tutorials 5 1 Overview This chapter shows you how to configure some of the WiMAX Modem s features Note Be sure to read Introducing the Web Configurator on page 35 before working through the tutorials presented here For field descriptions of individual screens see the related technical reference in this User s Guide 5 2 Setting Up a Small Network This tutorial shows you how to set up a small network in your office or home Goal Connect three computers to your WiMAX Modem to form a small network 192 168 100 33 192 168 100 34 User s Guide st Chapter 5 Tutorials 1 Required The following table provides a summary of the information you will need to complete the tasks in this tutorial INFORMATION VALUE SEE ALSO LAN IP Address 192 168 100 1 Chapter 6 on page
178. e STUN server s listening port if your VolP service provider gave you one Otherwise keep the default value Use NAT Active Select this if you want the WiMAX Modem to send SIP traffic to a specific NAT router You must also configure the NAT router to forward traffic with the specified port to the WiMAX Modem This eliminates the need for STUN or a SIP ALG Server Address Enter the public IP address or domain name of the NAT router Server Port Enter the port number that your SIP sessions use with the public IP address of the NAT router Outbound Proxy Active Select this if your VoIP service provider has a SIP outbound server to handle voice calls This allows the WiMAX Modem to work with any type of NAT router and eliminates the need for STUN or a SIP ALG Turn off any SIP ALG on a NAT router in front of the WiMAX Modem to keep it from re translating the IP address since this is already handled by the outbound proxy server Server Address Enter the IP address or domain name of the SIP outbound proxy server Server Port Enter the SIP outbound proxy server s listening port if your VoIP service provider gave you one Otherwise keep the default value NAT Keep Alive Active Select this to stop NAT routers between the WiMAX Modem and SIP server a SIP proxy server or outbound proxy server from dropping the SIP session The WiMAX Modem does this by sending SIP notify messages to
179. e do not use any other number unless you are told otherwise Let s say you select 192 168 1 0 as the network number which covers 254 individual addresses from 192 168 1 1 to 192 168 1 254 zero and 255 are reserved In other words the first three numbers specify the network number while the last number identifies an individual computer on that network User s Guide Chapter 7 The LAN Configuration Screens Once you have decided on the network number pick an IP address that is easy to remember for instance 192 168 1 1 for your WiMAX Modem but make sure that no other device on your network is using that IP address The subnet mask specifies the network number portion of an IP address Your WiMAX Modem will compute the subnet mask automatically based on the IP address that you entered You don t need to change the subnet mask computed by the WiMAX Modem unless you are instructed to do otherwise 7 6 2 DHCP Setup DHCP Dynamic Host Configuration Protocol RFC 2131 and RFC 2132 allows individual clients to obtain TCP IP configuration at start up from a server You can configure the WiMAX Modem as a DHCP server or disable it When configured as a server the WiMAX Modem provides the TCP IP configuration for the clients If DHCP service is disabled you must have another DHCP server on your LAN or else each computer must be manually configured The WiMAX Modem is pre configured with a pool of IP addresses for the DHCP clients DHCP
180. e ee erence er ernest re crs err 41 3 1 1 Welcome to the ZyXEL Setup Wizard sissano annati aaa i 41 CEPI CI MN DUNT OL SEDES 42 2 1 9 AuBerdo ador SENGE siruina borea gc AA aot a tpa n Pob 43 CREME ror o TTE TE 45 TLO SeU COMPIE ME 46 User s Guide EN Table of Contents Chapter 4 po TT ob oj O MH 47 Loa E cli EET TCU PROTEINS DURUM ene PUN 47 4 2 Welcome To the ZyXEL Setup WIZG srera ciasto a a N NS 47 Z8 NE VOICE ACCOUN SOUS aroari aaa AE bad Penn E d 48 Lee emanat UT ET 50 Chapter 5 ee nn 51 oh CE UD onscreen iene es 51 5s sung Upa Small NITE sidere vigacek acusagscdcabibiedeattaladgeracussanedvanibigdlebazwecabaouaadgneenions 51 5 2 1 Connecting Your Small Network to the Internet esses 53 52 2 Changing Service Providera ciae tor ax id aa Ru a a Kan tta s 53 5 2 3 Blocking Web Access During Specific Hours essen 55 5 2 4 Blocking Web Sites by IGEXWOPGE simis idoti adt o RD DUREE agb dU cta meas 57 Da CONTOURING Your terher PHONG asnoisan aet di edv bur Ed a NEN 59 5 3 1 Placing an mernet Phone Call srira 61 5 4 Remotely Managing Your WIMAX Madam 1 sie torret tra en trad an eo rrr aet h ni is 62 Fart Il Basit Screg 63 Chapter 6 HE gei 1 ur EAE E 65 MES E E PN TA T AAE NIERA 65 61 4 What You Gan Do in This Chapter cixsctuteesiiuetesete t
181. e gt devID lt mac address gt cat lt category gt This message is sent by the system RAS displays as the system name if you haven t configured one when the router generates a syslog The facility is defined in the Log Settings screen The severity is the log s syslog class The definition of messages and notes are defined in the various log charts throughout this appendix The devi D is the MAC address of the router s LAN port The cat is the same as the category in the router s logs Traffic Log Facility 8 Severity Mon dd hr mm ss hostname src lt srcIP srcPort gt dst lt dstIP dstPort gt msg Traffic Log note Traffic Log devID lt mac address gt cat Traffic Log duration seconds sent sent Bytes rcvd receiveBytes dir from to protoID IPProtocolID proto serviceName trans IPSec Normal This message is sent by the device when the connection session is closed The facility is defined in the Log Settings screen The severity is the traffic log type The message and note always display Traffic Log The proto field lists the service name The dir field lists the incoming and outgoing interfaces LAN LAN LAN WAN LAN DEV for example The following table shows RFC 2408 ISAKMP payload types that the log displays Please refer to the RFC for detailed information on each type Table 88 RFC 2408 ISAKMP Payload Types
182. e of Contents Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix B Setting Up Your Computer s IP Address rane 271 C Pop up Windows JavaScripts and Java Permissions ssssss 299 D IP Addresses and Subnetting uice uerunt ten rait tun pri temen nie orn rna rRdS 309 E de ahorro EU EI 321 F SIP Passthrougi uas tut n n E E E 353 G LN SERIE oiii EIN DINI tec d MENO ME uM dM eu QU 355 E LU Ty poet yn ke nepal ee IE ey ede DE E M 359 I Customer PLURI en ey eee er ee dba tue PEE eer ptt pais 363 371 User s Guide List of Figures List of Figures Figure T Mobile Station and Base Slaton i rese re e bird aa ba ate N EE ARa 31 Figure 2 WiMAX Modem s VoIP Features Peer to Peer Calls sse 32 Figure 3 WiMAX Modem s VoIP Features Calls via VoIP Service Provider ssesssss 32 Figure d The WIMAX Modem S LEDS oai ba iat Et peprad YE FR od ERE REX EE Rp a RR bra E Rab d Co ga ia 33 Foe 5 Nom Ore sain S 38 Figure B Select a ModE aiet aE a dene a aae 41 Figure 7 Internet Connection Wizard gt System Information esssssseeeeennne 42 Figure 8 Internet Connection Wizard gt Authentication Settings Screen essssssssss 43 Figure 9 Internet Connection Wizard gt IP Address sssssssssssssseseeeee eene nnne nnn 45 Figure 10 Inte
183. e pound key to tell the WiMAX Modem to make the phone call immediately regardless of this setting VAD Support Select this if the WiMAX Modem should stop transmitting when you are not speaking This reduces the bandwidth the WiMAX Modem uses Back Click this to return to the Analog Phone screen without saving your changes Apply Click to save your changes Reset Click to restore your previously saved settings 13 3 Common Click VOICE gt Phone gt Common to activate and deactivate immediate dialing Figure 66 VOICE gt Phone gt Common Active Immediate Dial 152 User s Guide Chapter 13 The Phone Screens The following table describes the labels in this screen Table 50 VOICE gt Phone gt Common LABEL DESCRIPTION Active Select this if you want to use the pound key to tell the WiMAX Immediate Dial Modem to make the phone call immediately instead of waiting the number of seconds you selected in the Dialing I nterval Select in VOICE gt Phone gt Analog Phone If you select this dial the phone number and then press the pound key if you do not want to wait The WiMAX Modem makes the call immediately Apply Click to save your changes Reset Click to restore your previously saved settings 13 4 Region Click VOICE gt Phone gt Region to maintain settings that often depend on the region of the world in which the WiMAX Modem is lo
184. e rate is the average number of bytes transmitted per second Rx B s This field displays how quickly the WiMAX Modem has received packets in the current call The rate is the average number of bytes transmitted per second Poll Interval s Enter how often you want the WiMAX Modem to update this screen and click Set I nterval Set Interval Click this to make the WiMAX Modem update the screen based on the amount of time you specified in Poll I nterval Stop Click this to make the WiMAX Modem stop updating the screen User s Guide Chapter 21 The Status Screen 21 2 5 WiMAX Profile Click Status gt WiMAX Profile to open this screen This read only screen displays information about the security settings you are using To configure these settings go to the ADVANCED gt WAN Configuration gt Internet Connection screen Note Not all WiMAX Modem models have all the fields shown here Figure 106 WiMAX Profile WiMAX Profile User Name Password Anonymous Identity PKM Authentication TTLS Inner EAP Certificate The following table describes the labels in this screen Table 108 The WiMAX Profile Screen LABEL DESCRIPTION User Name This is the username for your Internet access account Password This is the password for your Internet access account The password displays as a row of asterisks for security purposes Anonymous Identity This is the anonymous identi
185. e that a safety level is selected User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 5 Click OK to close the window Figure 151 Security Settings Java Security Settings Settings Q Disable 9 Enable 3 Font download Disable 9 Enable p Prompt 3 Microsoft VM 3 Java permissions custom Qora Jav 9 High safety Q Low safety m Reset custom settings j Reset to Medium Reset TN JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 3 Click OK to close the window Figure 152 Java Sun General Security Privacy Content Connections Programs Advanced Settings O Use inline AutoComplete O Use Passive FTP for firewall and DSL modem compatibility i Use smooth scrolling HTTP 1 1 settings v Use HTTP 1 1 O Use HTTP 1 1 through proxy connections 2 Java E d Use Java 2 141 07 fr copo equites eii 2 v1 4 1 07 for d Use Java 2 141 07 fr copo equites eii requires restart 5 Microso se Java m enabled requires restart O Java logging enabled JIT compiler for virtual machine enabled requires restart Multimedia O Always show Internet Explorer 5 0 or later Radio toolbar O Don t display online media content in the
186. e time periods and days during which the WiMAX Modem performs content filtering What You Can Do in This Chapter The Filter screen Section 17 2 on page 200 lets you set up a trusted IP address which web features are restricted and which keywords are blocked when content filtering is effective The Schedule screen Section 17 3 on page 202 lets you schedule content filtering User s Guide Chapter 17 Content Filter 17 2 Filter Click TOOLS gt Content Filter gt Filter to set up a trusted IP address which web features are restricted and which keywords are blocked when content filtering is effective Figure 85 TOOLS gt Content Filter gt Filter Trusted IP Setup A trusted computer has full access to all blocked resources 0 0 0 0 means there is no trusted computer Trusted Computer IP Address 0 0 0 0 Restrict Web Features CI Activex Java Cookies 7 Web Proxy Keyword Blocking Enable URL Keyword Blocking Keyword Keyword List spam wankle 20rotary 20engine Cara Message to display when a site is blocked Denied Access Message 200 User s Guide Chapter 17 Content Filter The following table describes the labels in this screen Table 68 TOOLS gt Content Filter gt Filter LABEL DESCRIPTION Trusted IP Setup Trusted You can allow a specific computer to access all Internet resources Computer IP without the restric
187. eb configurator at least one time and changed your password from the default as described in the Quick Start Guide 6 2 Set IP Address Click the SETUP icon in the navigation bar to set up the WiMAX Modem s IP address and subnet mask This screen displays this screen by default If you are in any other sub screen you can simply choose Set I P Address from the navigation menu on the left to open it again Figure 17 SETUP gt Set IP Address IP Address 1192 168 100 1 IP Subnet Mask 255 255 255 0 User s Guide Chapter 6 The Setup Screens The following table describes the labels in this screen Table 9 SETUP gt Set IP Address LABEL DESCRIPTION IP Address Enter the IP address of the WiMAX Modem on the LAN Note This field is the IP address you use to access the WiMAX Modem on the LAN If the web configurator is running on a computer on the LAN you lose access to it as soon as you change this field and click Apply You can access the web configurator again by typing the new IP address in the browser IP Subnet Mask Enter the subnet mask of the LAN Apply Click to save your changes Clear Click to restore your previously saved settings 6 3 DHCP Client Click the SETUP gt DHCP Client to view connection information for all clients that have been configured by the WiMAX Modem s internal DHCP server Figure 18 SETUP gt DHCP Client DHCP Client IP Address Host Name MAC Add
188. ecceeeseesee esses seeeeeeeeseeeeeeeeeseeesseeeeeeeneaeens 325 Figure 169 Internet Explorer 7 Certificate Import Wizard sesssssssssssseeeneeenneenn 326 Figure 170 Internet Explorer 7 Security Warming isaccuecucc cien errorae psiaka iaa aaia naaa 326 Figure 171 Internet Explorer 7 Certificate Import Wizard sesssseseseeneeeennen n 327 Figure 172 Internet Explorer 7 Website Identification 2 0 2 cccceeeecceeeeeeeeceeeeeneeceeeeeenseceeeeeneneeeeneeneees 327 Figure 173 Internet Explorer 7 Public Key Certificate File seeseeseseeneeeeenen 328 Figure 174 Internet Explorer 7 Open File Security Warning ssssseeeneeeenn 328 Figure 175 Intemet Explorer 7 Tools Menu 2i oo edente uds cat Eetd bud qub Eme QU gon e id qun Sub EU d den et Uii ds 329 Figure 176 Internet Explorer 7 Intemalt ODUODS saccadic iceland aaa eee b Fu o 329 Figure 177 internet Explorer 7 Cerne ates siio ino EP EE LUDREE SEP ds Eoo e xx Ups uoxr Hao eue Fours cia EX 330 Figure 178 Internet Explorar 7 CertifiGBlp sssrinin ireren EL DEI eraai n riaa 330 Figure 179 Internet Explorer 7 Root Certificate Store eesesseeeeeseeeeeeeeeeennen nene 330 Figure 180 Firefox 2 Website Certified by an Unknown Authority essen 332 aon 191 Pigot Z Fago A gem 333 Figur TOS Fro A POR MOI iaa a a nce a 334 Fome 183 PIE 2 Opens auni a N N A DERE N 334 Figure 184 Fi
189. ection DoS detection and prevention real time alerts reports and logs Content Filtering The WiMAX Modem can block access to web sites containing specified keywords You can define time periods and days during which content filtering is enabled and include or exclude a range of users on the LAN from content filtering Network Address Translation NAT Network Address Translation NAT allows the translation of an Internet protocol address used within one network for example a private IP address used in a local network to a different IP address known within another network for example a public IP address used on the Internet Universal Plug and Play UPnP Your device and other UPnP enabled devices can use the standard TCP IP protocol to dynamically join a network obtain an IP address and convey their capabilities to each other Dynamic DNS Support With Dynamic DNS support you can have a static hostname alias for a dynamic IP address allowing the host to be more easily accessible from various locations on the Internet You must register for this service with a Dynamic DNS service provider User s Guide Chapter 23 Product Specifications Table 111 Firmware Specifications continued FEATURE DESCRIPTION DHCP DHCP Dynamic Host Configuration Protocol allows the individual clients computers to obtain the TCP IP configuration at start up from a centralized DHCP server Y
190. ections over the same Ethernet interface Your WiMAX Modem supports up to three logical LAN interfaces with the WiMAX Modem being the gateway for each logical network It s like having multiple LAN networks that actually use the same physical cables and ports By putting your LAN and Gateway A in different subnets all returning network traffic must pass through the WiMAX Modem to your LAN The following steps describe such a scenario 1 A computer on the LAN initiates a connection by sending a SYN packet to a receiving server on the WAN 2 The WiMAX Modem reroutes the packet to Gateway A which is in Subnet 2 3 The reply from the WAN goes to the WiMAX Modem User s Guide Chapter 16 The Firewall Screens 4 The WiMAX Modem then sends it to the computer on the LAN in Subnet 1 Figure 84 IP Alias LAN Subnet 1 WAN Subnet 2 3 A User s Guide 1 97 Chapter 16 The Firewall Screens User s Guide Content Filter 17 1 Overview 17 1 1 Use the TOOLS gt Content Filter screens to create and enforce policies that restrict access to the Internet based on content Internet content filtering allows you to create and enforce Internet access policies tailored to their needs Content filtering is the ability to block certain web features or specific URL keywords The WiMAX Modem can block web features such as ActiveX controls Java applets cookies and disable web proxies The WiMAX Modem also allows you to defin
191. ed 171 serial number 175 181 storage space 168 thumbprint algorithms 187 thumbprints 187 used for authentication 184 verification 269 verifying fingerprints 186 certification authority see CA notices 361 requests 167 171 172 viewing 361 chaining 269 chaining message authentication see CCMP circuit switched telephone networks 131 C Class of Service CoS 146 CA 167 184 client server and certificates 185 protocol 144 call SIP 144 User s Guide 371 Index CMAC see MAC codec 135 comfort noise 149 contact information 363 copyright 359 CoS 146 counter mode see CCMP coverage area 85 cryptography 267 customer support 363 D data 267 269 decryption 267 encryption 267 flow 269 DHCP 74 120 122 client 120 server 74 diameter 87 Differentiated Services see DiffServ DiffServ 146 DiffServ Code Point DSCP 146 marking rule 147 digital ID 267 DL frequency 93 94 domain name 120 download frequency see DL frequency DS field 147 DSCP see DiffServ dynamic DNS 122 Dynamic Host Configuration Protocol see DHCP EAP 87 echo cancellation 149 encryption 267 269 traffic 269 Ethernet encapsulation 110 Europe type call service mode 154 Extensible Authorization Protocol see EAP F FCC interference statement 360 firewall 189 194 195 flash key 154 flashing 154 frequency band 94 ranges 93 94 scanning 94 FTP 122 204 restrictions 204 G G 168 149 G 711 1
192. ee DNS servers that the network can use The WiMAX Modem provides these IP addresses to DHCP clients You can specify these IP addresses two ways From ISP provide the DNS servers provided by the ISP on the WAN port User Defined enter a static IP address DNS Relay this setting will relay DNS information from the DNS server obtained by the WiMAX Modem None no DNS service will be provided by the WiMAX Modem Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 7 The LAN Configuration Screens 7 3 Static DHCP Click ADVANCED gt LAN Configuration gt Static DHCP to assign specific IP addresses to specific computers on the LAN Note This screen has no effect if the DHCP server is not enabled You can enable it in ADVANCED gt LAN Configuration gt DHCP Setup Figure 21 ADVANCED gt LAN Configuration gt Static DHCP on an an WN amp MAC Address IP Address 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 The following table describes the labels in this screen Table 14 ADVANCED gt LAN Configuration gt Static DHCP LABEL DESCRIPTION The number of the item in this list MAC Address Enter the MAC address of the computer to which you want the WiMAX Modem to assign the same IP address IP Address Enter the IP address you want the WiMAX Modem to assi
193. eed dial there may be something wrong with the SIP server Contact your VoIP service provider Problems With Multiple SIP Accounts You can set up two SIP accounts on your WiMAX Modem By default your WiMAX Modem uses SIP account 1 for outgoing calls and it uses SIP accounts 1 and 2 for incoming calls With this setting you always use SIP account 1 for your outgoing calls and you cannot distinguish which SIP account the calls are coming in through If you want to control the use of different dialing plans for accounting purposes or other reasons you need to configure your phone port in order to control which SIP account you are using when placing or receiving calls User s Guide Chapter 22 Troubleshooting 22 5 Reset the WiMAX Modem to Its Factory Defaults If you reset the WiMAX Modem you lose all of the changes you have made The WiMAX Modem re loads its default settings and the password resets to 1234 You have to make all of your changes again You will lose all of your changes when you push the Reset button To reset the WiMAX Modem 1 Make sure the Power LED is on and not blinking 2 Press and hold the Reset button for five to ten seconds Release the Reset button when the Power LED begins to blink The default settings have been restored If the WiMAX Modem restarts automatically wait for the WiMAX Modem to finish restarting and log in to the web configurator The password is 1234 If the WiMAX Mo
194. eed fo Kg iuis cores c rope p eec r A 85 Bo EGE GORDOCIOD atouts S cebce Pg E eri da ebd dn LE a RUM PIRE 88 To NINAN DBBIDUESUD dcos taa Cc estt Or u ent heh tap Ad an Fore la abt RUE Cte aste RER eeu DuUER DRM 90 Bd FREQUGICY Ranges e 92 9 2 2 Cahtigurmea Ereguency SENGE siriasi uain an aa bo i card pad 92 8 5 5 Using the WIMAX Frequency SOBB I c ieevicdoe tetti ii or tree tuac os boc VI dit bat rad de orca epu de rne T Uds 93 GE IN er Tue O iie aaa R A EN 94 Chapter 9 The YPN Bir if 0 M M 97 CNEREL LUI E m UU TT 97 9 What You Gan Do in This Chaptal cte itt te eene ED e sende m Re Erda d BR Repcu ed 97 S L2 WWE Yeu eod TO AD octets umaid ber carte br E cca Eve d dde Een LaUbE Eo FUR xL BER d LUE 98 micare ToU BU quscntcontdenteunene aded vu oq teed depe iEimevn HIDE EHE EPI MTS 99 VAE C MMT M 99 cmese nu saure EU T 100 9 3 1 M ulti Protocol Label DWITGIURG ccce Eois baee one reto pae ae a 100 93 2 Generic Rouling EnCSBSUIMIOI 1iicerc e rb da ba esse enn epa PR t EUR Rx 101 cce C stomer Interlace OpHONS Met P 102 CES Luster imenice GED ec M 103 Aaru MUIR E A E iere cidpi ducadd idm did d aan demde Ga Po dag id pid Rd ENS M Pad 104 84 1 Ethereal PssUODWNII SeU suci uds Eee eub aai 106 OS SSCS UU PTTTTUETTL ID OTT TTD 107 Chapter 10 The hime 109 User s Guide 18 Table of Contents H
195. eeesseneesesseneneeenees 131 EP Vu EU SEE 131 12 1 1 What You Can Do tit This Chapter 22 teret e picco epe casniatedctatanencianaiieieleneaneeseis 131 12 1 2 What You NG RENO ais senecesvteraite cadxcu ie e ssieusorecas ceases us drkx up ae cmn d eub exei tav see agua dua 131 Ieho Sis VU E eee sandneueniaddiacoee blatant xeiudetaceeinddlnceenindsieede 133 We csl P SURE cicuta duda pati ed Pecan a ite ate Lb Und tn i 133 TAZA Advanced SIF SOUS uicina tacit nu OU sudan a susie ac Ca GR 135 leg A 142 Te Techimcal HaIBEBIOR caused ens a daas cr OR iE 143 151 1 SIP Oal PElOFSSBIDII veiii Ea b Feet Kou ERE E 143 pter d jg e 144 prr cic np RI TT Guat 144 IAA SP Foy o gut C 144 T22L5 SIP Redio SI VEI riani rcc ago f plaga Erba bcd Lad on RR pera 145 User s Guide Table of Contents ZAG NAAN SIR er aah naan 146 JZOLIE iT GES uana bodas OIE SON AEE AOA A EAE N N A EE OE 146 12 4 8 DSCP and Per Hop BOlIBUIGE iecit aoc sin uet eee tre i araa a aa coru Bae aa O 147 Chapter 13 llc 149 jue 7 o MR M RM M TONER NRI IRR NPRMER TA 149 18 1 1 What You Can Do in This Chapter cccsiaiccineseosesanistenncerde et vYen RUF ee IG ga ia 149 Tech vt You Ned D ROON Lebens tpa RE prb De ERU I RR a ERR ID n RR da a RA 149 jS m cis GIG T E ES 150 19 2 1 Advanced Analog Phone Setup acces ee corre te tacc o ties eeaeee 151 TE CON
196. een Use this screen to control how your WiMAX Modem responds to other types of requests Figure 93 TOOLS gt Remote Management gt Security Respond to Ping on LAN amp WAN C Do not respond to requests for unauthorized services The following table describes the labels in this screen Table 77 TOOLS gt Remote Management gt Security LABEL DESCRIPTION Respond to Ping Select the interface s on which the WiMAX Modem should respond to on incoming ping requests Disable the WiMAX Modem does not respond to any ping requests LAN the WiMAX Modem only responds to ping requests received from the LAN WAN the WiMAX Modem only responds to ping requests received from the WAN LAN amp WAN the WiMAX Modem responds to ping requests received from the LAN or the WAN Do not respond to requests for unauthorized Select this to prevent outsiders from discovering your WiMAX Modem by sending requests to unsupported port numbers If an outside user attempts to probe an unsupported port on your WiMAX Modem an services ICMP response packet is automatically returned This allows the outside user to know the WiMAX Modem exists Your WiMAX Modem supports anti probing which prevents the I CMP response packet from being sent This keeps outsiders from discovering your WiMAX Modem when unsupported ports are probed If you clear this your WiMAX Modem replies with an ICMP Port Unrea
197. eld controls the sending and receiving of RIP packets When set to Both the WiMAX Modem will broadcast its routing table periodically and incorporate the RIP information that it receives n Only the WiMAX Modem will not send any RIP packets but will accept all RIP packets received Out Only the WiMAX Modem will send out RIP packets but will not accept any RIP packets received User s Guide Chapter 7 The LAN Configuration Screens None the WiMAX Modem will not send any RIP packets and will ignore any RIP packets received The Version field controls the format and the broadcasting method of the RIP packets that the WiMAX Modem sends it recognizes both formats when receiving RIP 1 is universally supported but RIP 2 carries more information RIP 1 is probably adequate for most networks unless you have an unusual network topology Both RIP 2B and RIP 2M sends the routing data in RIP 2 format the difference being that RIP 2B uses subnet broadcasting while RIP 2M uses multicasting 7 6 6 Multicast Traditionally IP packets are transmitted in one of either two ways Unicast 1 sender 1 recipient or Broadcast 1 sender everybody on the network Multicast delivers IP packets to a group of hosts on the network not everybody and not just 1 IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a Multicast group it is not used to carry user data IGMP vers
198. elect one port number enter the port number in the Start Port and End Port fields To select a range of ports enter the port number at the beginning of the range in the Start Port field enter the port number at the end of the range in the End Port field If you want to delete this rule enter zero in the Start Port and End Port fields Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 10 4 1 Trigger Port Forwarding Example The following is an example of trigger port forwarding In this example J is Jane s computer and S is the Real Audio server Figure 49 Trigger Port Forwarding Example User s Guide Chapter 10 The NAT Configuration Screens 1 Jane requests a file from the Real Audio server port 7070 2 Port 7070 is a trigger port and causes the WiMAX Modem to record Jane s computer IP address The WiMAX Modem associates Jane s computer IP address with the incoming port range of 6970 7170 3 The Real Audio server responds using a port number ranging between 6970 7170 4 The WiMAX Modem forwards the traffic to Jane s computer IP address 5 Only Jane can connect to the Real Audio server until the connection is closed or times out The WiMAX Modem times out in three minutes with UDP User Datagram Protocol or two hours with TCP IP Transfer Control Protocol I nternet Protocol Two points to remember about trigger ports 1 Trigger events only h
199. elete this item The following table describes the labels in this screen Table 34 ADVANCED gt NAT Configuration gt Port Forwarding LABEL DESCRIPTION Default Server Setup Default Server Enter the IP address of the server to which the WiMAX Modem should forward packets for ports that are not specified in the Port Forwarding section below or in the TOOLS Remote MGMT screens Enter 0 0 0 0 if you want the WiMAX Modem to discard these packets instead Port Forwarding The number of the item in this list Active Select this to enable this rule Clear this to disable this rule Name This field displays the name of the rule It does not have to be unique Start Port This field displays the beginning of the range of port numbers forwarded by this rule End Port This field displays the end of the range of port numbers forwarded by this rule If it is the same as the Start Port only one port number is forwarded Server IP This field displays the IP address of the server to which packet for the Address selected port s are forwarded Action Click the Edit icon to set up a port forwarding rule or alter the configuration of an existing port forwarding rule Click the Delete icon to remove an existing port forwarding rule Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 10 The NAT Configuration Screens
200. elp Control Panel Home Network and Sharing Center nnect to a network System and Maintenance View network computers and devices Add a device to the network Set up file sharing Security Network and Internet lt 7 Internet Options Hardware and Sound Connecttotheinternet Changeycurhomepage Manage browser add ons Programs Delete browsing history and cookies User s Guide 275 Appendix B Setting Up Your Computer s IP Address 4 Click Manage network connections Figure 115 Windows Vista Network and Sharing Center QU E Network and Internet p Network and Sharing Center v File Edit View Tools Help Tasks 1 Network and Sharing Center View computers and devices Connect to a network Set un a ranna tian or network A t i 3 T Manage network connections TWPC99111 Internet Diagnose ana repair This computer Not connected 5 Right click Local Area Connection and then select Properties Figure 116 Windows Vista Network and Sharing Center LAN or High Sesed Internet TT w emm Collapse group Left Arrow Conne X er Expand all groups ud nue Collapse all groups Disable Status Diagnose Bridge Connections Create Shortcut Delete Rename Note During this procedure click Continue whenever Windows displays a screen saying that it needs your permission to continue 276 User s Guide Appendix B Setting
201. em and the DDNS server Use specified IP address Select this if you want to use the specified IP address with the host name s Then specify the IP address Use this option if you have a static IP address Apply Click to save your changes Reset Click to restore your previously saved settings 11 4 Firmware Click ADVANCED gt System Configuration gt Firmware to upload new firmware to the WiMAX Modem Firmware files usually use the system model name with a bin extension such as WiMAX Modem bin The upload process uses HTTP Hypertext Transfer Protocol and may take up to two minutes After a successful upload the system will reboot Contact your service provider for information on available firmware upgrades Note Only use firmware for your WiMAX Modem s specific model Figure 53 ADVANCED gt System Configuration gt Firmware File Path To upgrade the internal device s firmware browse to the location of the binary BIN upgrade file and click Upload Upgrade files can be downloaded from website If the upgrade file is compressed ZIP file you must first extract the binary BIN file In some cases you may need to reconfigure User s Guide Chapter 11 The System Configuration Screens The following table describes the labels in this screen Table 40 ADVANCED gt System Configuration gt Firmware LABEL DESCRIPTION File Path Enter the locati
202. em has one Ethernet LAN port The LAN Local Area Network port attaches to a network of computers which needs security from the outside world These computers will have access to Internet services such as e mail FTP and the World Wide Web However inbound access is not allowed by default unless the remote host is authorized to use a specific service 16 2 Firewall Setting 16 2 1 This section describes firewalls and the built in WiMAX Modem s firewall features Firewall Rule Directions Figure 79 Firewall Rule Directions LAN to WAN rules are local network to Internet firewall rules The default is to forward all traffic from your local network to the Internet You can block certain LAN to WAN traffic in the Services screen click the Services tab All services displayed in the Blocked Services list box are LAN to WAN firewall rules that block those services originating from the LAN Blocked LAN to WAN packets are considered alerts Alerts are higher priority logs that include system errors attacks and attempted access to blocked web sites Alerts appear in red in the View Log screen You may choose to have alerts e mailed immediately in the Log Settings screen User s Guide Chapter 16 The Firewall Screens LAN to LAN WiMAX Modem means the LAN to the WiMAX Modem LAN interface This is always allowed as this is how you manage the WiMAX Modem from your local computer WAN to LAN rules are Internet
203. ems support TLS authentication Check with your service provider for details TTLS Inner EAP This field displays the type of secondary authentication method Once a secure EAP TTLS connection is established the inner EAP is the protocol used to exchange security information between the mobile station the base station and the AAA server to authenticate the mobile station See the WiMAX security appendix for more details This field is available only when TTLS is selected in the Authentication field The WiMAX Modem supports the following inner authentication types CHAP Challenge Handshake Authentication Protocol MSCHAP Microsoft CHAP e MSCHAPV2 Microsoft CHAP version 2 PAP Password Authentication Protocol Auth Mode Select the authentication mode from the drop down list box This field is not available in all WiMAX Modems Check with your service provider for details The WiMAX Modem supports the following authentication modes User Only Device Only with Cert e Certs and User Authentication Certificate This is the security certificate the WiMAX Modem uses to authenticate the AAA server Use the TOOLS gt gt Trusted CAs screen to import certificates to the WiMAX Modem WAN IP Address Assignment User s Guide Chapter 8 The WAN Configuration Screens Table 19 ADVANCED gt WAN Configuration gt Internet Connection gt ISP Parameters for Internet Access continued
204. ene 281 Figuic 124 Mat OS X TO A Network Utility acce rt eoe tpe annaa 282 User s Guide 2 List of Figures Figure 125 Mae OS X TO Apple Men accedat certc a c pda oc b Hat a eon br addo Res 283 Figure 126 Mae OS X 10 5 Systeme Preferentes iussa ssemeesan iade x ix ekad ux cd anaandaa 283 Figure 127 Mac OS X 10 5 Network Preferences gt Ethernet esssssssseseeeerenn 284 Figure 128 Mac OS X 10 5 Network Preferences gt Ethernet sessssssseeeeeeennen 285 Figure 129 Mac OS X 10 5 Nebwork WY usus senno tecitest e beer aedde tebeY daos eerta ade Peer te Eh Pu i ia 286 Figure 120 Ubuntu 8 System gt Administration MGI sessirnir 287 Figure 131 Ubuntu 8 Network Settings gt Connections sssssssessssessseeerennen entren 287 Figure 132 Ubuntu 8 Administrator Account Authentication eseseee 288 Figure 133 Ubuntu 8 Network Settings gt Connections essssssesssseseseeerenne nennen 288 Figure 134 Ubuntu 8 Network Settings gt Properties sessssssssessesesseseeeeerennn ennt 289 Figure 195 Ubuntu 8 Network Getungs DNG icut en tetto rete pR erect aaeain inini 290 Figure 196 Vountu S Mebwork IGOlS 1ussssiesese ranae dai asc raa et docs act soured ax 291 Figure 137 openSUSE 10 3 K Menu gt Computer Menu essessiseeesesesen nennen nnne 292 Figure 138 openSUSE 10 3 K Menu gt Computer Menu iecit er
205. enennnnen 102 Table 26 ADVANCED gt VPN Transport gt Customer Interface seeessssesseeneeee 102 Table 27 ADVANCED gt VPN Transport gt Customer Interface Setup sssssssses 104 Table 28 Advanced VPN Transport gt Ethernet Psuedowire esee 105 Table 29 ADVANCED gt VPN Transport gt Ethernet Pseudowire ssssseeeenee 105 Table 30 ADVANCED gt VPN Transport gt Ethernet Pseudowire Setup ssssssesess 106 Table 31 ADVANCED gt VPN Transport SESUBBIOS coucou eee ecco aaaea riai 107 Table 32 ADVANCED gt NAT Configuration gt General nennen 110 Table 33 Advanced NAT Configuration gt Port Forwarding sssssssseseeeeenen nne 112 Table 34 ADVANCED gt NAT Configuration gt Port Forwarding sssssseeenennnee 112 Table 35 ADVANCED gt NAT Configuration gt Port Forwarding gt Rule Setup susssss 113 Table 36 ADVANCED gt NAT Configuration gt Trigger Port sccsscciccssccseseceecsssacteccdecesseccesuaccetensenssteteevens 114 Table 37 ADVANCED NAT Configuration gt ALG 2s emere rnnt kr lE Lan Rl pct eee 117 User s Guide 25 List of Tables Table 38 ADVANCED gt System Configuration gt General 121 Table 39 ADVANCED gt System Configuration gt Dynamic DNS sse 123 Table 40 ADVANCED gt System Configuration gt Firmware sse
206. eneral Setup Cl Transport L2 L3 VPN traffic through WIMAX network by using Ethernet pseudowire Remote GRE Tunnel End 0 0 0 0 IP Address The following table describes the labels in this screen Table 24 ADVANCED gt VPN Transport gt General LABEL DESCRIPTION L2 L3 VPN Transport General Setup Transport L2 L3 Select this to turn the VPN transport feature on Deselect it to turn the VPN VPN transport feature off Remote GRE Enter the domain name or IP address of your service provider s router Tunnel End Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 9 The VPN Transport Screens 9 3 Customer Interface Customer interfaces connect data coming from your computers to Ethernet pseudowires according to the data s VLAN Virtual Local Area Network information One customer interface is for traffic that has no tag this is the default interface rule 0 which cannot be deleted in the GUI All other customer interfaces are identified by their VLAN ID Once the WiMAX Modem has examined a frame s VLAN tag it is able to assign the frame to a specified path This is done using a customer interface The customer interface is simply a set of information that takes frames from a VLAN and put them on an Ethernet pseudowire and vice versa In this example the WiMAX Modem takes frames tagged with two different VLAN
207. ent secured connection between the mobile station and the base station and the solid arrow shows the EAP secured connection between the mobile station the base station and the AAA server See the WiMAX security appendix for more details User s Guide Chapter 8 The WAN Configuration Screens 8 2 Internet Connection Click ADVANCED gt WAN Configuration to set up your WiMAX Modem s Internet settings Note Not all WiMAX Modem models have all the fields shown here Figure 28 ADVANCED gt WAN Configuration gt Internet Connection ISP Parameters for Internet Access User Name myuser asb com Password eeccccece Anonymous Identity anonymous asb com PKM PKMV2 v Authentication TTS v TTLS Inner EAP CHAP v Certificate auto generated self signed cert v WAN IP Address Assignment 9 Get automatically from ISP Default O Use Fixed IP Address IP Address 0 0 0 0 IP Subnet Mask 0 0 0 0 Gateway IP Address 0 0 0 0 The following table describes the labels in this screen Table 19 ADVANCED gt WAN Configuration gt Internet Connection gt ISP Parameters for Internet Access LABEL DESCRIPTION ISP Parameters for Internet Access User Name Use this field to enter the username associated with your Internet access account You can enter up to 61 printable ASCII characters Password Use this field to enter the password associated with your Internet access account You can enter up to 47 prin
208. enter 255 255 255 255 Gateway IP Address Enter the IP address of the gateway to which the WiMAX Modem should send packets for the specified Destination The gateway is a router or a switch on the same network segment as the device s LAN or WAN port The gateway helps forward packets to their destinations Metric Usually you should keep the default value This field is related to RIP The metric represents the cost of transmission A router determines the best route for transmission by choosing a path with the lowest cost The smaller the metric the lower the cost RIP uses hop count as the measurement of cost where 1 is for a directly connected network The metric must be 1 15 if you use a value higher than 15 the routers assume the link is down User s Guide Chapter 7 The LAN Configuration Screens Table 17 Advanced LAN Configuration gt IP Static Route gt Edit continued LABEL DESCRIPTION Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 7 5 Other Sett Click ADVANCE ings D gt LAN Configuration gt Other Settings to set the RIP and Multicast options Figure 24 ADVANCED gt LAN Configuration gt Other Settings RIP Direction RIP Version Multicast RIP amp Multicast Setup Both v RIP 1 None wv The following table describes the labels in this screen Table 18 ADVA
209. er untitled Paint 2 Inthe Control Panel click the Network Connections icon Figure 108 Windows XP Control Panel E Control Panel File Edit View Favorites Tools Help Address Control Panel Q M P Search E Folders fz A V Control Panel A Network G Switch to Category View Connections See Also A Windows Update z Hid Hardware we Game Controllers 272 User s Guide Appendix B Setting Up Your Computer s IP Address 3 Right click Local Area Connection and then select Properties Figure 109 Windows XP Control Panel gt Network Connections gt Properties ocal Area Connection Standard PCI Fast Ethernet Adapte Disable Status Repair Bridge Connections Create Shortcut Rename 4 On the General tab select Internet Protocol TCP IP and then click Properties Figure 110 Windows XP Local Area Connection Properties Area Connection Properties General Authentication Advanced Connect using BE Accton EN1207D TX PCI Fast Ethernet Adapter This connection uses the following items M E Client for Microsoft Networks v 5 File and Printer Sharing for Microsoft Networks Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when
210. er addresses Advanced cancel 8 Select Obtain an I P address automatically if your network administrator or ISP assigns your IP address dynamically Select Use the following I P Address and fill in the IP address Subnet mask and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advanced 9 Click OK to close the Internet Protocol TCP IP Properties window Click OK to close the Local Area Connection Properties window Verifying Settings 1 Click Start gt All Programs gt Accessories gt Command Prompt 2 Inthe Command Prompt window type ipconfig and then press ENTER You can also go to Start gt Control Panel gt Network Connections right click a network connection click Status and then click the Support tab to view your IP address and connection information 278 User s Guide Appendix B Setting Up Your Computer s IP Address Mac OS X 10 3 and 10 4 The screens in this section are from Mac OS X 10 4 but can also apply to 10 3 1 Click Apple gt System Preferences Figure 119 Mac OS X 10 4 Apple Menu W Finder File Edit Vie About This Mac Software Update Mac OS X Software System Preferences Dock Location Recent Items Force Quit Sleep Restart Shut Down 2 Inthe System
211. ersion Serial Number Subject Issuer Signature Algorithm Valid From Valid To Key Algorithm Subject Alternative Name Key Usage Basic Constraint MD5 Fingerprint SHA1 Fingerprint BEGIN CERTIFICATE Name auto generated self signed cert v Default self signed certificate which signs the imported remote host certificates CN MAX 206M2 0019CB00000 1 Certificate in PEM Base 64 Encoded Format QVgtMjAZTTIgMDAxOUNCMDAWMDAxMB4XDTAWMDEwMTAwMDAWMFoXDTMwMDEWMTAw MDAWMFowITEfMBOGA 1UEAXMWTUFYLTIWNkO yIDAWMTIDQJAWMDAWMTCEnzANBakq hkiGSWOBAQEFAAOBjQAwgYkCgYEArtszQj7aCO82h2b 4py 3GMgROkeGF J95zYhld gMLShIYgLk8qQB7 uk JMemaDBeR 4edYWTGwPvCSETin60CjWxDkQmB3M4YYBY8k 2Mzhz4el fp 4 UUMWosPKP 4y9mbNCwUjH TIXXKDvkkZVXbmNuujUfJwZpQPlbhX M RSSjUCAWEAAaNNMEswDgYDVROPAQEABAQDAgKKMCUGA 1UdEQQeMByBGjAWMTID QjAwMDAwMUEhdXRvL mdlbi5j2X30MBIGA 1UdEwEBAAQIMAYBAf8CAQEwDQY JKoZI T i MIICCDCCAXGgAWwIBAgIEOG2sXjANBgkghkiG9wOBAQUFADAHMR8wHQYDVQQDExZN Self signed X 509 Certificate v3 946711646 CN MAX 206M2 0019CB000001 CN MAX 206M2 0019CB000001 rsa pkcsi shai 2000 Jan 1st 00 00 00 GMT 2030 Jan 1st 00 00 00 GMT rsaEncryption 1024 bits EMAIL 0019CB000001 Gauto gen cert DigitalSignature KeyEncipherment KeyCertSign Subject Type CA Path Length Constraint 1 e1 35 6d 3d 8a b8 de 04 d2 37 98 c5 45 bd 14 a1 d1 bb e2 fd 9c 99 7b 59 ed 33 0c 96 1b c7 a4 47 ce 38 1b 7c The following table describes
212. ersion Release Date For example V3 70 BCC 0 c4 07 08 2009 indicates that the firmware is 3 70 build BCC 0 candidate 4 released on July 08 2009 Version Date This field indicates the exact date and time the current firmware was compiled System Uptime This field indicates how long the WiMAX Modem has been on This resets every time you shut the device down or restart it WiMAX Uptime This field indicates how long the WiMAX Modem has been connected to the WiMAX network This resets every time you disconnect from the WiMAX network shut the device down or restart it Voice This field indicates the number and receiver status of a voice account configured on this device User s Guide Internet Connection Wizard 3 1 Overview This chapter provides information on the ZyXEL Setup Wizard screens The wizard guides you through several steps where you can configure your Internet and VolP settings 3 1 1 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard You can choose to either configure your Internet connection or your VoIP connection The Internet Connection Wizard screens are described in detail in the following sections Figure 6 Select a Mode ZyXEL Welcome to the ZyXEL Wizard Setup Internet Connection Wizard This wizard helps you configure the settings necessary for connecting to the Internet VoIP Connection Wizard This w
213. ertificates Screens 15 4 1 Certificate Authorities When using public key cryptology for authentication each host has two keys One key is public and can be made openly available The other key is private and must be kept secure These keys work like a handwritten signature in fact certificates are often referred to as digital signatures Only you can write your signature exactly as it ought to look When people know what your signature ought to look like they can verify whether something was signed by you or by someone else In the same way your private key writes your digital signature and your public key allows people to verify whether data was signed by you or by someone else This process works as follows Tim wants to send a message to Jenny He needs her to be sure that it comes from him and that the message content has not been altered by anyone else along the way Tim generates a public key pair one public key and one private key Tim keeps the private key and makes the public key openly available This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not Tim uses his private key to sign the message and sends it to Jenny Jenny receives the message and uses Tim s public key to verify it Jenny knows that the message is from Tim and she knows that although other people may have been able to read the message no one can have altered it
214. es to specific computers on the LAN The IP Static Route screen Section 7 4 on page 77 lets you examine the static routes configured in the WiMAX Modem The Other Settings screen Section 7 5 on page 79 lets you control the routing information that is sent and received by each subnet assign specific IP addresses to specific computers on the LAN 7 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter IP Address IP addresses identify individual devices on a network Every networking device including computers servers routers printers etc needs an IP address to communicate across the network These networking devices are also known as hosts User s Guide Chapter 7 The LAN Configuration Screens Subnet Masks Subnet masks determine the maximum number of possible hosts on a network You can also use subnet masks to divide one network into multiple sub networks DNS DNS Domain Name System is for mapping a domain name to its corresponding IP address and vice versa The DNS server is extremely important because without it you must know the IP address of a networking device before you can access it DHCP A DHCP Dynamic Host Configuration Protocol server can assign your WiMAX Modem an IP address subnet mask DNS and other routing information when it s turned on 7 2 DHCP Setup Click ADVANCED gt LAN Configuration gt DHCP Setup to enable disable and
215. essage TCP TCP UDP IGMP ESP GRE pass through OSPF Packet without a NAT table entry The router blocked a packet that didn t have a blocked TCP UDP IGMP corresponding NAT table entry ESP GRE OSPF Router sent blocked web site The router sent a message to notify a user that the router blocked access to a web site that the user requested Exceed maximum sessions per host sd The device blocked a session because the host s connections exceeded the maximum sessions per host Firewall allowed a packet that matched a NAT session TCP UDP A packet from the WAN TCP or UDP matched a cone NAT session and the device forwarded it to the LAN User s Guide Chapter 20 The Logs Screens Table 89 TCP Reset Logs LOG MESSAGE DESCRIPTION Under SYN flood attack sent TCP RST The router sent a TCP reset packet when a host was under a SYN flood attack the TCP incomplete count is per destination host Exceed TCP MAX incomplete sent TCP RST The router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold the TCP incomplete count is per destination host Peer TCP state out of order sent TCP RST The router sent a TCP reset packet when a TCP connection state was out of order Note The firewall refers to RFC793 Figure 6 to check the TCP state Firewall session time out sent
216. et ER te ceo acce cte RR patus 293 Figure 139 openSUSE 10 3 YaST Control Center 1 usate ecce neutre dandus Forni aai 293 Figure 140 openSUSE 10 3 Network Sete Lacer ordini terrada ar tope tpe tert da RE Rb re dua he erni Sek cen RUN REUS 294 Figure 141 openSUSE TO 3 Network Gard SAUD 2 rait xr reti ta cR e Rai e aa P a S ER 295 Figure 142 openSUSE 10 3 Network Settings Luiessuuus secu eren arnica rrx ub xard accu 296 Figure 143 openSUSE 10 3 KNetwork Manage iuucsisecee eese sente ecce iet beet Y nunnana niaii RIS 297 Figure 144 openSUSE Connection Status KNetwork Manager 297 Foe To Fora EOK d c scence cata dae ehaa deans uassdaodan tend saaen tea aneatetmasadar wemieseetnss 299 idus 146 memet Options PVG icien enaar a aaa E Ea N 300 Figure t r ihtemet Options PAE iisccdscentrsssciste Neuss easels aa kaiaa aiaa a deed add 301 Figure 148 Pop up Blocker S StS axescss sccoccushveesuanastisiedagecbeaneutequabeseWdeeheaniaieamnaruudasiaialadneeencemeceuns 302 Moure 149 Interne CpHIODS Seb siteccsshs gees aniria Naa eoa rro e bep lk bd RR FPE aM NN shiv 303 Figure 150 Security Settings Java BOMBING iustus sectas inoaii Etras ck Ka ex cub 304 Pigura 151 Secum SOME JAVA doinnion a e So De Ear oka RES EEEN EE 305 Pours 152 davada ori E RAE abra a Ea 306 Figure 153 Mozilla Firefox TOOLS CORB ca ds te erini di ebd dis ii ea 306 Figure 154 Mozilla Firefox Content OOV 2 uuciuicc see tocco thu lecce tet b rent Fe Mee Reset Ru Put dedo
217. example 23 00 equals 11 00 pm to send the logs Clear log after sending mail Select this to clear all logs and alert messages after logs are sent by e mail Syslog Logging Active Select this to enable syslog logging Syslog Server P Address Enter the server name or IP address of the syslog server that logs the selected categories of logs Log Facility Select a location The log facility allows you to log the messages in different files in the syslog server See the documentation of your syslog for more details Active Log and Alert Log Select the categories of logs that you want to record Send immediate alert Select the categories of alerts that you want the WiMAX Modem to send immediately User s Guide Chapter 20 The Logs Screens Table 85 TOOLS gt Logs gt Log Settings LABEL DESCRIPTION Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes 20 4 Log Message Descriptions The following tables provide descriptions of example log messages Table 86 System Error Logs LOG MESSAGE DESCRIPTION WAN connection is down The WAN connection is down You cannot access the network through this interface s exceeds the max number of session per host This attempt to create a NAT session exceeds the maximum number of NAT session table entries allowed to
218. example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons In this example the company network address is 192 168 1 0 The first three octets of the address 192 168 1 are the network number and the remaining octet is the host ID allowing a maximum of 28 2 or 254 possible hosts User s Guide Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting Figure 156 Subnetting Example Before Subnetting Gm Em Em Em EN EN END HEHEHE HEE OE d i I i i I i i Internet I I l H i I 1 i E I I y 192 168 1 0 24 4 4 eee eee ee um umm m m m m um You can borrow one of the host ID bits to divide the network 192 168 1 0 into two separate sub networks The subnet mask is now 25 bits 255 255 255 128 or 25 The borrowed host ID bit can have a value of either O or 1 allowing two subnets 192 168 1 0 25 and 192 168 1 128 25 User s Guide 313 Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting There are now two sub networks A and B Figure 157 Subnetting Example After Subnetting B if h hb2 s e D 2 D et 1192 168 1 0 25 4 192 168 1 128 251 eee eee um um um PP eom um um um um um umo In a 25 bit subnet the host ID has 7 bits
219. f the certificate is a self signed certificate the certificate itself is the only one in the list The WiMAX Modem does not trust the certificate and displays Not trusted in this field if any certificate on the path has expired or been revoked Refresh Click to display the certification path Certification Information Type This field displays general information about the certificate CA signed means that a Certification Authority signed the certificate Self signed means that the certificate s owner signed the certificate not a certification authority X 509 means that this certificate was created and signed according to the ITU T X 509 recommendation that defines the formats for public key certificates Version u This field displays the X 509 version number Serial Number This field displays the certificate s identification number given by the certification authority or generated by the WiMAX Modem Subject This field displays information that identifies the owner of the certificate such as Common Name CN Organizational Unit OU Organization O and Country C Issuer This field displays identifying information about the certificate s issuing certification authority such as Common Name Organizational Unit Organization and Country With self signed certificates this is the same as the Subject Name field none displays for a certification request Signature Alg
220. f you want the WiMAX Modem to forward incoming calls to to Number the specified phone number if the phone port is busy Specify the phone number in the field on the right If you have call waiting the incoming call is forwarded to the specified phone number if you reject or ignore the second incoming call User s Guide Chapter 14 The Phone Book Screens Table 54 VOICE gt Phone Book gt Incoming Call Policy LABEL DESCRIPTION No Answer Select this if you want the WiMAX Modem to forward incoming calls to Forward to the specified phone number if the call is unanswered See No Answer Number Waiting Time Specify the phone number in the field on the right No Answer This field is used by the No Answer Forward to Number feature and Waiting Time No Answer conditions below Enter the number of seconds the WiMAX Modem should wait for you to answer an incoming call before it considers the call is unanswered Advanced Setup The number of the item in this list Activate Select this to enable this rule Clear this to disable this rule Incoming Call Enter the phone number to which this rule applies Number Forward to Enter the phone number to which you want to forward incoming calls Number from the Incoming Call Number You may leave this field blank depending on the Condition Condition Select the situations in which you want to forward incoming calls from the Incoming Call Number or
221. form or by any means electronic mechanical magnetic optical chemical photocopying manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Your use of the WiMAX Modem is subject to the terms and conditions of any related service providers Do not use the WiMAX Modem for illegal purposes Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL bears NO responsibility or liability for your use of the download service feature Trademarks Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners User s Guide Appendix H Legal Information Certifications Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the
222. g techniques with compression to reduce the required bandwidth 12 1 1 What You Can Do in This Chapter The SIP Settings screen Section 12 2 on page 133 lets you setup and maintain your SIP account s in the WiMAX Modem The Advanced SIP Settings screen Section 12 2 1 on page 135 lets you set up and maintain advanced settings for each SIP account The QoS screen Section 12 3 on page 142 lets you set up and maintain ToS and VLAN settings for the WiMAX Modem 12 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter SIP The Session Initiation Protocol SIP is an application layer control signaling protocol that handles the setting up altering and tearing down of voice and User s Guide E Chapter 12 The Service Configuration Screens multimedia sessions over the Internet SIP signaling is separate from the media for which it handles sessions The media that is exchanged during the session can use a different path from that of the signaling SIP handles telephone calls and can interface with traditional circuit switched telephone networks SIP Identities A SIP account uses an identity sometimes referred to as a SIP address A complete SIP identity is called a SIP URI Uniform Resource Identifier A SIP account s URI identifies the SIP account in a way similar to the way an e mail address identifies an e mail account The format of a SIP identity is SIP Number SIP Service Do
223. ges User s Guide Chapter 15 The Certificates Screens 15 2 3 My Certificate Import Click TOOLS gt Certificates gt My Certificates gt Import to access this screen Use this screen to import a certificate that matches a corresponding certification request that was generated by the WiMAX Modem You must remove any spaces from the certificate s filename before you can import it Figure 73 TOOLS gt Certificates gt My Certificates gt Import Import Please specify the location of the certificate file to be imported The certificate file must be in one of the following formats Binary X 509 PEM Base 64 encoded X 509 Binary PKCS 7 PEM Base 64 encoded PKCS 7 Binary PKCS 12 PEM Base 64 encoded PKCS 12 For my certificate importation to be successful a certification request corresponding to the imported certificate must already exist on WiMAX CPE After the importation the certification request will automatically be deleted File Path Browse Apply Cancel The following table describes the labels in this screen Table 61 TOOLS gt Certificates gt My Certificates gt Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it You cannot import a certificate with the same name as a certificate that is already in the WiMAX Modem Browse Click to find the certificate file you want to upload
224. giggaredel SCIBBIS ice epic bd b AAAS 119 VOICE 1 Y A A 129 The Service Configuration SEFBEIIS aiuasosnsaburazacca tabo aN bebe axis eapite 131 The Phono Se M E ELO ESUTEUMT 149 The Phetie Bo5k SOIOBDS ce Dean ris ce Ead tate a Un saec RUE 159 Tools amp 4 4 nn 165 TUNES peg e A TL AAE E N 167 Hii E TL I ENIM 189 Cort FIIO Liuscodesette ni SERM Adde R Ee Q Rd I ERE QOEM d BERN QUPd ORE DRUpd bo EEUU od LEBEN QU du RA QUEE M dd eds ME Cdbar dide 199 The Remote Maragemei SOISBlts 22 2 iis cuba ker ER per cip E arias E rU RU MG KD Sap CEN dies 203 QU ouod pud xta insule desatote e te sa tbe da UND e tee Dub d DU cM roS CHR EE 215 The Logs GOCENS c n 219 The SESS POPE aus aacra a p ER aee UO GERE a E P A d can bx a 235 Troubleshooting and Specifications eeeeeeeeeeeeeeeeeee esee nennen nennen nnn nnn 247 Mice ply cT 249 mus dEerrl wp CAINS Me TF eT 257 Appe ndices and WAGON e 0UO 8 265 User s Guide 9 Contents Overview User s Guide Table of Contents Table of Contents About This Users t 3 pice 7 Y 4 c lik i e
225. gn to the computer Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 7 The LAN Configuration Screens 7 4 IP Static Route Click ADVANCED gt LAN Configuration gt IP Static Route to look at the static routes configured in the WiMAX Modem Note The first static route is the default route and cannot be modified or deleted Figure 22 Advanced LAN Configuration gt IP Static Route Name Active Destination Gateway Action 1 dut D B 2 bard re EP gu 3 aa s Bg uj 4 E tu 5 gu 6 Sw The following table describes the icons in this screen Table 15 Advanced gt LAN Configuration gt IP Static Route ICON DESCRIPTION E Edit Click to edit this item i Delete Click to delete this item The following table describes the labels in this screen Table 16 Advanced LAN Configuration gt IP Static Route LABEL DESCRIPTION The number of the item in this list Name This field displays the name that describes the static route Active This field shows whether this static route is active Yes or not No Destination This field displays the destination IP address es that this static route affects Gateway This field displays the IP address of the gateway to which the WiMAX Modem should send packets for the specified Destination The gateway is a router or a s
226. gular Mail ZyXEL Singapore Pte Ltd No 2 International Business Park The Strategy 03 28 Singapore 609930 Spain Support E mail support zyxel es Sales E mail sales zyxel es Telephone 34 902 195 420 Fax 34 913 005 345 Web www zyxel es Regular Mail ZyXEL Communications Arte 21 52 planta 28033 Madrid Spain User s Guide 367 Appendix Customer Support Sweden Support E mail support zyxel se Sales E mail sales zyxel se Telephone 46 31 744 7700 Fax 46 31 744 7701 Web www zyxel se Regular Mail ZyXEL Communications A S Sj porten 4 41764 Goteborg Sweden Taiwan Support E mail support zyxel com tw Sales E mail sales zyxel com tw Telephone 886 2 27399889 Fax 886 2 27353220 Web http www zyxel com tw Address Room B 21F No 333 Sec 2 Dunhua S Rd Da an District Taipei Thailand Support E mail support zyxel co th Sales E mail sales zyxel co th Telephone 662 831 5315 Fax 662 831 5395 Web http www zyxel co th Regular Mail ZyXEL Thailand Co Ltd 1 1 Moo 2 Ratchaphruk Road Bangrak Noi Muang Nonthaburi 11000 Thailand Turkey Support E mail cso zyxel com tr Telephone 90 212 222 55 22 Fax 90 212 220 2526 Web http www zyxel com tr Address Kaptanpasa Mahallesi Piyalepasa Bulvari Ortadogu Plaza N 14 13 K 6 Okmeydani Sisli stanbul Turkey Ukraine Support E mail support ua zyxel com Sales E mail sales ua zyxel com Telephone
227. hat the WiMAX Modem forwards out through the WAN interface Give high priority to voice and video to make them run more smoothly Similarly give low priority to many large file downloads so that they do not reduce the quality of other applications Click TOOLS gt QoS gt Class Setup to open the following screen Figure 97 QoS gt Class Setup Create New Class Name Interface Class Index Default Class From LAN 99 Default Class From WAN 99 The following table describes the labels in this screen Table 80 QoS Class Setup LABEL DESCRIPTION Create New Class Click this button to create a new class This field displays the index number of the class Active This field indicates whether the QoS class is enabled or not Name This field indicates the name of the class Interface This field indicates the Ethernet port on which traffic is being monitored and prioritized DSCP This field indicates the Differentiated Services Code Point DSCP value for the associated class Class Index This field indicates the index for this QoS class Classes are implemented based on index number from lowest to highest Action Click the Edit icon to go to the screen where you can edit the rule Click the Delete icon to delete an existing rule Note that subsequent rules move up by one when you take this action Apply Click this button to save your changes back to the WiMAX Modem Cancel Click this butt
228. he Region screen Section 13 4 on page 153 lets you maintain settings that often depend on the region of the world in which the WiMAX Modem is located 13 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter Voice Activity Detection Silence Suppression Comfort Noise Voice Activity Detection VAD detects whether or not speech is present This lets the WiMAX Modem reduce the bandwidth that a call uses by not transmitting silent packets when you are not speaking When using VAD the WiMAX Modem generates comfort noise when the other party is not speaking The comfort noise lets you know that the line is still connected as total silence could easily be mistaken for a lost connection Echo Cancellation G 168 is an ITU T standard for eliminating the echo caused by the sound of your voice reverberating in the telephone receiver while you talk User s Guide Chapter 13 The Phone Screens Supplementary Phone Services Overview Supplementary services such as call hold call waiting call transfer etc are generally available from your VoIP service provider The WiMAX Modem supports t he following services Call Hold Call Waiting Making a Second Call Call Transfer Call Forwarding Three Way Conference Internal Calls Caller ID CLIP Calling Line Identification Presentation CLIR Calling Line Identification Restriction Note To take full advantage of the supp
229. he Status Screen Table 103 Status continued LABEL DESCRIPTION Memory Usage This field displays what percentage of the WiMAX Modem s memory is currently used The higher the memory usage the more likely the WiMAX Modem is to slow down Some memory is required just to start the WiMAX Modem and to run the web configurator You can reduce the memory usage by disabling some services see CPU Usage by reducing the amount of memory allocated to NAT and firewall rules you may have to reduce the number of NAT rules or firewall rules to do so or by deleting rules in functions such as incoming call policies speed dial entries and static routes IVR Usage This field displays what percentage of the WiMAX Modem s IVR memory is currently used IVR Interactive Voice Response refers to the customizable ring tone and on hold music you set Interface Status Interface This column displays each interface of the WiMAX Modem Status This field indicates whether or not the WiMAX Modem is using the interface For the WAN interface this field displays Up when the WiMAX Modem is connected to a WiMAX network and Down when the WiMAX Modem is not connected to a WiMAX network For the LAN interface this field displays Up when the WiMAX Modem is using the interface and Down when the WiMAX Modem is not using the interface Rate For the LAN ports this displays the port speed and duplex setting For the WAN
230. hich operating systems are supported This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network Windows Vista XP 2000 Mac OS 9 OS X and all versions of UNIX LINUX include the software components you need to use TCP IP on your computer If you manually assign IP information instead of using a dynamic IP make sure that your network s computers have IP addresses that place them in the same subnet In this appendix you can set up an IP address for Windows XP NT 2000 on page 272 Windows Vista on page 275 Mac OS X 10 3 and 10 4 on page 279 Mac OS X 10 5 on page 283 Linux Ubuntu 8 GNOME on page 286 Linux openSUSE 10 3 KDE on page 292 User s Guide 271 Appendix B Setting Up Your Computer s IP Address Windows XP NT 2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT 1 Click Start gt Control Panel Figure 107 Windows XP Start Menu e Internet Explorer 7 My Documents 3 Outlook Express V Paint 2 My Recent Documents gt My Pictures Files and Settings Transfer W c Bj x BY Command Prompt c My Music El Acrobat Reader 4 0 My Computer Tour Windows xP Windows Movie Maker tg Printers and Faxes Q9 Help and Support po Search All Programs gt Run B Log Off Io Turn Off Comput
231. iMAX Modem s log and alert settings For a list of log messages see Section 20 4 on page 225 What You Can Do in This Chapter The View Logs screen Section 20 2 on page 221 lets you look at log entries and alerts The Log Settings screen Section 20 3 on page 223 lets you configure where the WiMAX Modem sends logs and alerts the schedule for sending logs and which logs and alerts are sent or recorded What You Need to Know The following terms and concepts may help as you read through this chapter Alerts An alert is a type of log that warrants more serious attention Some categories such as System Errors consist of both logs and alerts Syslog Logs There are two types of syslog event logs and traffic logs The device generates an event log when a system event occurs for example when a user logs in or the device is under attack The device generates a traffic log when a session is terminated A traffic log summarizes the session s type when it started and stopped the amount of traffic that was sent and received and so on An external log analyzer User s Guide Chapter 20 The Logs Screens can reconstruct and analyze the traffic flowing through the device after collecting the traffic logs Table 82 Syslog Logs LOG MESSAGE DESCRIPTION Event Log lt Facility 8 Severity gt Mon dd hr mm ss hostname src lt srcIP srcPort gt dst lt dstIP dstPort gt msg lt msg gt note lt not
232. ide and Section 1 2 1 on page 33 3 Make sure your Internet browser does not block pop up windows and has JavaScript and Java enabled See Appendix C on page 299 4 Ifthere is a DHCP server on your network make sure your computer is using a dynamic IP address Your WiMAX Modem is a DHCP server by default If there is no DHCP server on your network make sure your computer s IP address is in the same subnet as the WiMAX Modem See Appendix D on page 309 5 Reset the WiMAX Modem to its factory defaults and try to access the WiMAX Modem with the default IP address See Section 11 6 on page 127 6 If the problem continues contact the network administrator or vendor or try one of the advanced suggestions Advanced Suggestions Try to access the WiMAX Modem using another service such as Telnet If you can access the WiMAX Modem check the remote management settings and firewall rules to find out why the WiMAX Modem does not respond to HTTP f your computer is connected wirelessly use a computer that is connected to a LAN ETHERNET port can see the Login screen but cannot log in to the WiMAX Modem 1 Make sure you have entered the user name and password correctly The default user name is user and the default password is 1234 These fields are case sensitive so make sure Caps Lock is not on 2 You cannot log in to the web configurator while someone is using Telnet to access the WiMAX Modem Log out of the WiMAX M
233. ient device a SIP phone or IP phone for example behind the WiMAX Modem use the ip alg disable ALG_SIP command to turn off the SIP ALG Signaling Session Timeout Most SIP clients have an expire mechanism indicating the lifetime of signaling sessions The SIP UA sends registration packets to the SIP server periodically and keeps the session alive in the WiMAX Modem If the SIP client does not have this mechanism and makes no call during the WiMAX Modem SIP timeout default 60 minutes the WiMAX Modem SIP ALG drops any incoming calls after the timeout period You can use the ip alg siptimeout command to change the timeout value Audio Session Timeout If no voice packets go through the SIP ALG before the timeout period default 5 minutes expires the SIP ALG does not drop the call but blocks all voice traffic and deletes the audio session You cannot hear anything and you will need to make a new call to continue your conversation User s Guide 353 Appendix F SIP Passthrough User s Guide Common Services The following table lists some commonly used services and their associated protocols and port numbers For a comprehensive list of port numbers ICMP type code numbers and services visit the IANA Internet Assigned Number Authority web site Name This is a short descriptive name for the service You can use this one or create a different one if you like Protocol This is the type of IP protoc
234. ifferent website s address Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server We recommend that you close this webpage and do not continue to this website Click here to close this webpage 8 Continue to this website not recommended More information 2 Click Continue to this website not recommended Figure 162 Internet Explorer 7 Certification Error Q Continue to this website not recommended User s Guide Appendix E Importing Certificates 3 In the Address Bar click Certificate Error gt View certificates Figure 163 Internet Explorer 7 Certificate Error vd Certificate Error Q Certificate Invalid The security certificate presented by this website has errors This problem may indicate an attempt to fool you or intercept any data you send to the server We recommend that you close this webpage About certificate errors View certificates 4 Inthe Certificate dialog box click I nstall Certificate Figure 164 Internet Explorer 7 Certificate Certificate I General Details Certification Path Certificate Information This CA Root certificate is not trusted To enable trust install this certificate in the Trusted Root Certification Authorities store Issued to nsa2401 Issued by nsa2401 Valid from 5 20 2008 to 5 20 2011 User s Guide Appendix E Importi
235. ificate Import certificate Desktop X My Computer B My Documents amp My Network Places User s Guide Appendix E Importing Certificates 5 Inthe Install authority certificate dialog box click Install Figure 196 Opera 9 Install authority certificate Install authority certificate Install this certificate authority s certificate chain in the database 1 172 20 37 202 vew 6 Next click OK Figure 197 Opera 9 Install authority certificate Install authority certificate i Are you sure you want to trust this issuer 7 The next time you visit the web site click the padlock in the address bar to open the Security information window to view the web page s security details User s Guide Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9 1 Open Opera and click TOOLS gt Preferences Figure 198 Opera 9 Tools Menu Mail and chat accounts Delete private data Notes Ctrl Alt4E Transfers Ctrl Alt T Ctrl Alt H Links Ctrl Alt L Advanced gt Quick preferences F12 gt Appearance Shift F 12 Preferences Ctrl F12 X 2 In Preferences ADVANCED gt Security gt Manage certificates Figure 199 Opera 9 Preferences Preferences Tabs Choose a master password to protect personal certificates Browsing Notifications
236. incoming certificates issued by this CA against a CRL check box in the certificate s details screen to have the WiMAX Modem check the CRL before trusting any certificates issued by the certification authority Otherwise the field displays No Action Click the Edit icon to open a screen with an in depth list of information about the certificate Use the Export icon to save the certificate to a computer Click the icon and then Save in the File Download screen The Save As screen opens browse to the location that you want to use and click Save Click the Delete icon to remove the certificate A window displays asking you to confirm that you want to delete the certificate Note that subsequent certificates move up by one when you take this action Import Click Import to open a screen where you can save the certificate of a certification authority that you trust from your computer to the WiMAX Modem Refresh Click this button to display the current validity status of the certificates User s Guide 1 79 Chapter 15 The Certificates Screens 15 3 1 Trusted CA Edit Click TOOLS gt Certificates gt Trusted CAs and then click the Edit icon to open the Trusted CAs screen Use this screen to view in depth certificate information and change the certificate s name Figure 75 TOOLS gt Certificates gt Trusted CAs gt Edit Property Certification Path Certification information Type V
237. ines a new DS Differentiated Services field to replace the Type of Service TOS field in the IP header The DS field contains a 2 bit unused field and a 6 bit DSCP field which can define up to 64 service levels The following figure illustrates the DS field Figure 63 DiffServ Differentiated Service Field DSCP Unused 6 bit 2 bit DSCP is backward compatible with the three precedence bits in the ToS octet so that non DiffServ compliant ToS enabled network device will not conflict with the DSCP mapping The DSCP value determines the forwarding behavior the PHB Per Hop Behavior that each packet gets across the DiffServ network Based on the marking rule different kinds of traffic can be marked for different priorities of forwarding Resources can then be allocated according to the DSCP values and the configured policies User s Guide 147 Chapter 12 The Service Configuration Screens User s Guide The Phone Screens 13 1 Overview Use the VOICE gt Phone screens to configure the volume echo cancellation VAD settings and custom tones for the phone port on the WiMAX Modem You can also select which SIP account to use for making outgoing calls 13 1 1 What You Can Do in This Chapter The Analog Phone screen Section 13 2 on page 150 lets you control which SIP accounts each phone uses The Common screen Section 13 3 on page 152 lets you activate and deactivate immediate dialing T
238. ing rules for the WiMAX Modem Figure 48 ADVANCED gt NAT Configuration gt Trigger Port Incoming Trigger Name Start Port End Port Start Port End Port 1 D D 0 0 2 0 0 0 0 3 0 0 0 0 Apply Cancel The following table describes the labels in this screen Table 36 ADVANCED gt NAT Configuration gt Trigger Port LABEL DESCRIPTION The number of the item in this list Name Enter a name to identify this rule You can use 1 15 printable ASCII characters or you can leave this field blank It does not have to be a unique name Incoming User s Guide Chapter 10 The NAT Configuration Screens Table 36 ADVANCED gt NAT Configuration gt Trigger Port continued LABEL DESCRIPTION Start Port Enter the incoming port number or range of port numbers you want to End Port forward to the IP address the WiMAX Modem records To forward one port number enter the port number in the Start Port and End Port fields To forward a range of ports enter the port number at the beginning of the range in the Start Port field enter the port number at the end of the range in the End Port field If you want to delete this rule enter zero in the Start Port and End Port fields Trigger Start Port Enter the outgoing port number or range of port numbers that makes End Port the WiMAX Modem record the source IP address and assign it to the selected incoming port number s To s
239. ings when you connect an analog phone to place Internet phone calls Goals Connect an analog phone to the WiMAX Modem then configure your Internet phone settings Figure 16 Phone Call Example In this example your analog phone A connects to the WiMAX Modem B When you dial a SIP number the WiMAX Modem first connects to your account s SIP server C and presents your SIP account login credentials The SIP server then connects to the other party D using the SIP number you just dialed if he or she accepts the phone conversation begins Required The following table provides a summary of the information you will need to complete the tasks in this tutorial INFORMATION VALUE SEE ALSO Number 12345678 Chapter 12 on page 131 SIP Server Address voip example com REGISTER Server Address register example com SIP Service Domain service example com User Name tutorial Password abcdefg Incoming Outgoing Calls SIP1 Chapter 13 on page 149 User s Guide Chapter 5 Tutorials Connect an analog phone to your WiMAX Modem as described in the included Quick Start Guide Open the VOICE gt Service Configuration gt SIP Setting screen then enter the required information as presented above SIP Account SIP1 v SIP Settings Active SIP Account Number SIP Local Port SIP Server Address SIP Server Port REGISTER Server Address REGISTER Server Port SIP Service Domain
240. interface it displays the downstream and upstream transmission rate or N A if the WiMAX Modem is not connected to a base station For the WLAN interface it displays the transmission rate when WLAN is enabled or N A when WLAN is disabled Summary Packet Click this link to view port status and packet specific statistics Statistics WiMAX Site Click this link to view details of the radio frequencies used by the Information WiMAX Modem to connect to a base station DHCP Table Click this link to see details of computers to which the WiMAX Modem has given an IP address VoIP Statistics Click this link to view statistics about your VoIP usage WiMAX Profile Click this link to view details of the current wireless security settings VoIP Status Account This column displays each SIP account in the WiMAX Modem User s Guide Chapter 21 The Status Screen Table 103 Status continued LABEL DESCRIPTION Registration This field displays the current registration status of the SIP account You have to register SIP accounts with a SIP server to use VoIP If the SIP account is already registered with the SIP server Click Unregister to delete the SIP account s registration in the SIP server This does not cancel your SIP account but it deletes the mapping between your SIP identity and your IP address or domain name The second field displays Registered If the SIP account is not registered
241. ion 2 RFC 2236 is an improvement over version 1 RFC 1112 but IGMP version 1 is still in wide use If you would like to read more detailed information about interoperability between IGMP version 2 and version 1 please see sections 4 and 5 of RFC 2236 The class D IP address is used to identify host groups and can be in the range 224 0 0 0 to 239 255 255 255 The address 224 0 0 0 is not assigned to any group and is used by IP multicast computers The address 224 0 0 1 is used for query messages and is assigned to the permanent group of all IP hosts including gateways All hosts must join the 224 0 0 1 group in order to participate in IGMP The address 224 0 0 2 is assigned to the multicast routers group The WiMAX Modem supports both IGMP version 1 I GMP v1 and IGMP version 2 I GMP v2 At start up the WiMAX Modem queries all directly connected networks to gather group membership After that the WiMAX Modem periodically updates this information IP multicasting can be enabled disabled on the WiMAX Modem LAN and or WAN interfaces in the web configurator LAN WAN Select None to disable IP multicasting on these interfaces User s Guide Chapter 7 The LAN Configuration Screens User s Guide The WAN Configuration Screens 8 1 Overview Use the ADVANCED gt WAN Configuration screens to set up your WiMAX Modem s Wide Area Network WAN or Internet features A Wide Area Network or WAN links geographically dispersed l
242. is name you should enter your computer s Computer Name In Windows 2000 Click Start gt Settings gt Control Panel and then double click the System icon Select the Network Identification tab and then click the Properties button Note the entry for the Computer Name field and enter User s Guide it as the System Name Chapter 11 The System Configuration Screens In Windows XP Click Start gt My Computer gt View system information and then click the Computer Name tab Note the entry in the Full computer name field and enter it as the WiMAX Modem System Name Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN If you leave this blank the domain name obtained by DHCP from the ISP is used While you must enter the host name System Name on each individual computer the domain name can be assigned from the WiMAX Modem via DHCP DNS Server Address Assignment Use DNS Domain Name System to map a domain name to its corresponding IP address and vice versa for instance the IP address of www zyxel com is 204 217 0 2 The DNS server is extremely important because without it you must know the IP address of a computer before you can access it The WiMAX Modem can get the DNS server addresses in the following ways The ISP tells you the DNS server addresses usually in the form of an information sheet when you sign up If your ISP gives you DNS server addresses enter them in the DNS Se
243. is service Secured Client Select All to allow any computer to access the WiMAX Modem using this IP Address service Select Selected to only allow the computer with the IP address that you specify to access the WiMAX Modem using this service Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 18 The Remote Management Screens 18 3 Telnet Click TOOLS gt Remote Management gt Telnet to control Telnet access to your WiMAX Modem Figure 88 TOOLS gt Remote Management gt Telnet Server Port Server Access Secured Client IP Address G All Selected 0 0 0 0 23 LAN amp WAN v The following table describes the labels in this screen Table 72 TOOLS gt Remote Management gt Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem The computer must use the same port number Server Access Select the interface s through which a computer may access the WiMAX Modem using this service Secured Client IP Address Select All to allow any computer to access the WiMAX Modem using this service Select Selected to only allow the computer with the IP address that you specify to access the WiMAX Modem using this service Apply Click to save your changes Reset Click to restore your previously saved settings 18 4 F
244. is similar to Time RFC 868 Time Server Address Enter the IP address or URL of your time server Check with your ISP or network administrator if you are unsure of this information Time Zone Setup Time Zone Select the time zone at your location Daylight Savings Select this if your location uses daylight savings time Daylight savings is a period from late spring to early fall when many places set their clocks ahead of normal local time by one hour to give more daytime light in the evening Start Date Enter which hour on which day of which week of which month daylight savings time starts End Date Enter which hour on the which day of which week of which month daylight savings time ends Apply Click to save your changes Reset Click to restore your previously saved settings 6 4 1 Pre Defined NTP Time Servers List The WiMAX Modem uses a pre defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified It can use this list regardless of the time protocol you select When the WiMAX Modem uses the list it randomly selects one server and tries to synchronize with it If the synchronization fails then it goes through the rest of User s Guide Chapter 6 The Setup Screens the list in order until either it is successful or all the pre defined NTP time servers have been tried Table 12 Pre defined NTP Time Servers
245. is the host ID Figure 155 Network Number and Host ID 192 168 1 16 i i p af mmmh i L I L I L a a ap EB Eee eee m m m m m 9 How much of the IP address is the network number and how much is the host ID varies according to the subnet mask Subnet Masks A subnet mask is used to determine which bits are part of the network number and which bits are part of the host ID using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is part of the host ID The following example shows a subnet mask identifying the network number in bold text and host ID of an IP address 192 168 1 2 in decimal Table 115 IP Address Network Number and Host ID Example 1ST 2ND 3RD 4TH OCTET OCTET OCTET OCTET 192 168 1 2 IP Address Binary 11000000 10101000 00000001 00000010 Subnet Mask Binary 11111111 11111111 11111111 00000000 Network Number 11000000 10101000 00000001 Host ID 00000010 User s Guide Appendix D IP Addresses and Subnetting By convention subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask followed by a continu
246. it if Account you do not want the WiMAX Modem to use this account Number Enter your SIP number In the full SIP URI this is the part before the symbol You can use up to 127 printable ASCII characters SIP Local Enter the WiMAX Modem s listening port number if your VoIP service Port provider gave you one Otherwise keep the default value SIP Server Enter the IP address or domain name of the SIP server provided by Address your VolP service provider You can use up to 95 printable ASCII characters It does not matter whether the SIP server is a proxy redirect or register server SIP Server Enter the SIP server s listening port number if your VoIP service Port provider gave you one Otherwise keep the default value REGISTER Enter the IP address or domain name of the SIP register server if your Server VoIP service provider gave you one Otherwise enter the same address Address you entered in the SIP Server Address field You can use up to 95 printable ASCII characters REGISTER Enter the SIP register server s listening port number if your VoIP Server Port service provider gave you one Otherwise enter the same port number you entered in the SIP Server Port field SIP Service Domain Enter the SIP service domain name In the full SIP URI this is the part after the symbol You can use up to 127 printable ASCII Extended set characters Send Caller ID Select this if you want to send identification when you make Vol P ph
247. ity problems The peer devices must also use T 38 Call Forward Call Forward Select which call forwarding table you want the WiMAX Modem to use Table for incoming calls You set up these tables in VOICE gt Phone Book gt Incoming Call Policy Caller Ringing Enable Check this box if you want people to hear a customized recording when they call you Caller Ringing Select the tone you want people to hear when they call you See Tone Custom Tones IVR on page 140 for information on how to record these tones On Hold Enable Check this box if you want people to hear a customized recording when you put them on hold On Hold Tone Select the tone you want people to hear when you put them on hold See Custom Tones IVR on page 140 for information on how to record these tones Back Click this to return to the SIP Settings screen without saving your changes Apply Click to save your changes Reset Click to restore your previously saved settings 12 2 1 6 Custom Tones IVR IVR Interactive Voice Response is a feature that allows you to use your telephone to interact with the WiMAX Modem The WiMAX Modem allows you to record custom tones for the Caller Ringing Tone and On Hold Tone functions The same recordings apply to both the caller ringing and on hold tones Table 45 Custom Tones Details LABEL DESCRIPTION Total Time for All Tones 128 seconds for all custom tones combi
248. ives a certificate request from a website operator they confirm that the web domain and contact information in the request match those on public record with a domain name registrar If they match then the certificate is issued to the website operator who then places it on his site to be issued to all visiting web browsers to let them know that the site is legitimate What You Can Do in This Chapter The My Certificates screen Section 15 2 on page 168 lets you generate and export self signed certificates or certification requests and import the WiMAX Modem s CA signed certificates The Trusted CAs screen Section 15 3 on page 178 lets you display a summary list of certificates of the certification authorities that you have set the WiMAX Modem to accept as trusted What You Need to Know The following terms and concepts may help as you read through this chapter Certificate Authorities A Certification Authority CA issues certificates and guarantees the identity of each certificate owner There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities You can use the User s Guide 1 67 Chapter 15 The Certificates Screens WiMAX Modem to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority 15 2 My Certificates Click TOOLS gt Certificates gt My Certificates to ac
249. izard helps you configure your Voice over Internet Protocol VoIP settings so that you can use a IP phone with this ZyXEL device User s Guide Chapter 3 Internet Connection Wizard 3 1 2 System Information This Internet Connection Wizard screen allows you to configure your WiMAX Modem s system information The settings here correspond to the ADVANCED gt System Configuration gt General screen see Section 11 2 on page 121 for more Figure 7 Internet Connection Wizard gt System Information System Information Enter a name to help you identify your router on the network This information is optional and you may safely leave this field blank System Name The ISP s domain name is often sent automatically by the ISP to the router If you are having difficulty accessing ISP services you may need to enter the Domain Name manually in the field below This field is normally left blank Domain Name MAX 306M1 The following table describes the labels in this screen Table 5 Internet Connection Wizard gt System Information LABEL DESCRIPTION System Name System Name is a unique name to identify the WiMAX Modem in an Ethernet network Enter a descriptive name This name can be up to 30 alphanumeric characters long Spaces are not allowed but dashes and underscores are accepted Domain Name Type the domain name if you know it here If you leave this field blank
250. k to save your changes Reset Click to restore your previously saved settings User s Guide 18 1 18 1 1 The Remote Management Screens Overview Use the TOOLS gt Remote Management screens to control which computers can use which services to access the WiMAX Modem on each interface Remote management allows you to determine which services protocols can access which WiMAX Modem interface if any from which computers You may manage your WiMAX Modem from a remote location via Table 70 Remote Management Internet WAN only ALL LAN and WAN LAN only Neither Disable To disable remote management of a service select Disable in the corresponding Server Access field You may only have one remote management session running at a time The WiMAX Modem automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts The priorities for the different types of remote management sessions are as follows Telnet HTTP What You Can Do in This Chapter The WWW screen Section 18 2 on page 205 lets you control HTTP access to your WiMAX Modem The Telnet screen Section 18 3 on page 206 lets you control Telnet access to your WiMAX Modem The FTP screen Section 18 4 on page 206 lets you control FTP access to your User s Guide WiMAX Modem Chapter 18 The Remote Management Screens The SNMP screen
251. key is preferred since the timing is much more precise The WiMAX Modem may interpret manual tapping as hanging up if the duration is too long You can invoke all the supplementary services by using the flash key 13 5 2 Europe Type Supplementary Phone Services This section describes how to use supplementary phone services with the Europe Type Call Service Mode Commands for supplementary services are listed in the table below After pressing the flash key if you do not issue the sub command before the default sub command timeout 2 seconds expires or issue an invalid sub command the current operation will be aborted Table 52 European Type Flash Key Commands COMMAND SUE M AND DESCRIPTION Flash Put a current call on hold to place a second call Switch back to the call if there is no second call Flash 0 Drop the call presently on hold or reject an incoming call which is waiting for answer Flash 1 Disconnect the current phone connection and answer the incoming call or resume with caller presently on hold Flash 2 1 Switch back and forth between two calls 2 Put a current call on hold to answer an incoming call 3 Separate the current three way conference call into two individual calls one is on line the other is on hold Flash 3 Create three way conference connection Flash 98 Transfer the call to another phone European Call Hold allows you to put a call A on hold by pressing
252. know The key is not sent over User s Guide Appendix A WiMAX Security the network In addition to the shared key password information exchanged is also encrypted to protect the network from unauthorized access Diameter Diameter RFC 3588 is a type of AAA server that provides several improvements over RADIUS in efficiency security and support for roaming Security Association The set of information about user authentication and data encryption between two computers is known as a security association SA In a WiMAX network the process of security association has three stages Authorization request and reply The MS SS presents its public certificate to the base station The base station verifies the certificate and sends an authentication key AK to the MS SS Key request and reply The MS SS requests a transport encryption key TEK which the base station generates and encrypts using the authentication key Encrypted traffic The MS SS decrypts the TEK using the authentication key Both stations can now securely encrypt and decrypt the data flow CCMP All traffic in a WiMAX network is encrypted using CCMP Counter Mode with Cipher Block Chaining Message Authentication Protocol CCMP is based on the 128 bit Advanced Encryption Standard AES algorithm Counter mode refers to the encryption of each block of plain text with an arbitrary number known as the counter This number changes each time a block
253. ks in this tutorial INFORMATION VALUE SEE ALSO Speed Dial Setup 01 Chapter 14 on page 159 Number 411 Name Information 1 Open the VOICE gt Phone Book gt Speed Dial screen then enter the required information as presented above Speed Dial Setup Speed Dial Setup 01 m Number 411 Name Information Type Use Proxy Non Proxy Use IP or URL 2 Click Add to save the number to your speed dial list in position 1 Speed Dial Phone Book Number Name Destination Action Information fiij tuj T Ww Ww T T T T T 3 Now whenever you want to dial local Information pick up the handset on your phone and dial 1 User s Guide Chapter 5 Tutorials 5 4 Remotely Managing Your WiMAX Modem The remote management feature allows you to log into the device over the Internet and configure its settings from a second trusted location Goal Set up the WiMAX Modem to allow management requests from the demonstration IP address 2 2 2 2 See Also Chapter 18 on page 203 1 Open the TOOLS Remote Management WWW screen Remote Management WWW Server Port 80 Server Access WAN v 7 Secured Client IP Address Oal G selected 2 2 2 2 2 Leavethe Server Port setting as 80 in order to allow computers back at the WiMAX Modem s location to continue to access the Internet 3 From the Server Access menu select WAN This allows remote management co
254. lementary phone services available though the WiMAX Modem s phone port you may need to subscribe to the services from your VoIP service provider 13 2 Analog Phone Click VOI CE gt Phone gt Analog Phone to control which SIP accounts each phone uses Figure 64 VOICE gt Phone gt Analog Phone Phone Port Settings Phonei Outgoing Call Use SIP1 Incoming Call apply to SIP1 User s Guide Chapter 13 The Phone Screens The following table describes the labels in this screen Table 48 VOICE gt Phone gt Analog Phone LABEL DESCRIPTION Phone Port Select the phone port you want to see in this screen If you change this Settings field the screen automatically refreshes Phone Port Displays the phone port number Settings Outgoing Call Use SIP1 Select this if you want this phone port to use the SIP1 account when it makes calls If you select both SIP accounts the WiMAX Modem tries to use SIP2 first Incoming Call apply to SIP1 Select this if you want to receive phone calls for the SIP1 account on this phone port If you select more than one source for incoming calls there is no way to distinguish between them when you receive phone calls Apply Click to save your changes Reset Click to restore your previously saved settings Advanced Setup Click this to edit the advanced settings for this phone port The Advanced Analog Phone Setup screen ap
255. list of features for your model 1 1 1 WiMAX Internet Access Connect your computer or network to the WiMAX Modem for WiMAX Internet access See the Quick Start Guide for instructions on hardware connection In a wireless metropolitan area network MAN the WiMAX Modem connects to a WiMAX base station BS for Internet access The following diagram shows a notebook computer equipped with the WiMAX Modem connecting to the Internet through a WiMAX base station marked BS Figure 1 Mobile Station and Base Station When the firewall is on all incoming traffic from the Internet to your network is blocked unless it is initiated from your network User s Guide ES Chapter 1 Getting Started Use content filtering to block access to web sites with URLs containing keywords that you specify You can define time periods and days during which content filtering is enabled and include or exclude particular computers on your network from content filtering For example you could block access to certain web sites for the kids 1 1 2 Make Calls via Internet Telephony Service Provider In a home or small office environment you can use the WiMAX Modem to make and receive the following types of VolP telephone calls Peer to Peer calls Use the WiMAX Modem to make a call directly to the recipient s IP address without using a SIP proxy server Figure 2 WiMAX Modem s VoIP Features Peer to Peer Calls Calls via a VoIP service p
256. lly from the server To automatically search for free IP and then assign it statically select Zeroconf To use iy Network Card Setup General configuration Name Ethernet D No IP Address for Bonding Devices _ Dynamic Address Statically assigned IP Address IP Address DHCP Subnet Mask Hostname 6 Select Dynamic Address DHCP if you have a dynamic IP address Select Statically assigned IP Address if you have a static IP address Fill in the I P address Subnet mask and Hostname fields 7 Click Next to save the changes and close the Network Card Setup window User s Guide Appendix B Setting Up Your Computer s IP Address 8 If you know your DNS server IP address es click the Hostname DNS tab in Network Settings and then enter the DNS server information in the fields provided Figure 142 openSUSE 10 3 Network Settings B YaST 2 linux h20z Enter the name for DNS domain that it belongs to Optionally enter the name server list and domain search list Note that the hostname is global it applies to all interfaces not just this one The domain is especially important if this computer is a mail server If you are using DHCP to get an IP address check whether to get a hostname via DHCP The hostname of your host which can be seen by issuing the hostname command will be set auto
257. lso need to fill in the Reference Number and Key if the certification authority requires them Enrollment Protocol This field applies when you select Create a certification request and enroll for a certificate immediately online Select the certification authority s enrollment protocol from the drop down list box Simple Certificate Enrollment Protocol SCEP is a TCP based enrollment protocol that was developed by VeriSign and Cisco Certificate Management Protocol CMP is a TCP based enrollment protocol that was developed by the Public Key Infrastructure X 509 working group of the Internet Engineering Task Force IETF and is specified in RFC 2510 CA Server Address This field applies when you select Create a certification request and enroll for a certificate immediately online Enter the IP address or URL of the certification authority server For a URL you can use up to 511 of the following characters a zA ZO 9 _ CA Certificate This field applies when you select Create a certification request and enroll for a certificate immediately online Select the certification authority s certificate from the CA Certificate drop down list box You must have the certification authority s certificate already imported in the Trusted CAs screen Click Trusted CAs to go to the Trusted CAs screen where you can view and manage the WiMAX Modem s list of certificates of trusted certification authorities
258. lumn displays each interface of the WiMAX Modem Status This field indicates whether or not the WiMAX Modem is using the interface For the WAN interface this field displays the port speed and duplex setting when the WiMAX Modem is connected to a WiMAX network and Down when the WiMAX Modem is not connected to a WiMAX network For the LAN interface this field displays the port speed and duplex setting when the WiMAX Modem is using the interface and Down when the WiMAX Modem is not using the interface For the WLAN interface it displays the transmission rate when WLAN is enabled or Down when WLAN is disabled TxPkts This field displays the number of packets transmitted on this interface RxPkts This field displays the number of packets received on this interface Collisions This field displays the number of collisions on this port Tx B s This field displays the number of bytes transmitted in the last second Rx B s This field displays the number of bytes received in the last second Up Time This field displays the elapsed time this interface has been connected System up Time This is the elapsed time the system has been on Poll Interval s Type the time interval for the browser to refresh system statistics Set Interval Click this button to apply the new poll interval you entered in the Poll Interval field above Stop Click this button to halt the refreshing of the system statistics User s Guide Chapter
259. main SIP Number The SIP number is the part of the SIP URI that comes before the symbol A SIP number can use letters like in an e mail address johndoe your ITSP com for example or numbers like a telephone number 1122334455 9 Vol P provider com for example SIP Service Domain The SIP service domain of the VoIP service provider the company that lets you make phone calls over the Internet is the domain name in a SIP URI For example if the SIP address is 1122334455 VolP provider com then Vol P provider com is the SIP service domain SIP Register Server A SIP register server maintains a database of SIP identity to IP address or domain name mapping The register server checks your user name and password when you register RTP When you make a VolP call using SIP the RTP Real time Transport Protocol is used to handle voice data transfer See RFC 1889 for details on RTP Use NAT If you know the NAT router s public IP address and SIP port number you can use the Use NAT feature to manually configure the WiMAX Modem to use a them in the SIP messages This eliminates the need for STUN or a SIP ALG You must also configure the NAT router to forward traffic with this port number to the WiMAX Modem 132 User s Guide Chapter 12 The Service Configuration Screens 12 1 3 Before you Begin Ensure that you have all of your voice account information on hand If not contact your voice account service
260. matically by the DHCP client You may want to disable this option if you connect to different networks m this computer and the Network Settings Global Options Overview Hostname DNS Routing A Hostname and Domain Name Hostname Domain Name linux h2oz J site _ Change Hostname via DHCP _ Write Hostname to etc hosts X Change etc resolv conf manually Name Servers and Domain Search List Name Server 1 Domain Search 10 0 2 3 Name Server 2 Name Server 3 _ Update DNS data via DHCP 9 Click Finish to save your settings and close the window User s Guide Appendix B Setting Up Your Computer s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP IP properties From the Options sub menu select Show Connection I nformation Figure 143 openSUSE 10 3 KNetwork Manager i Disable Wireless 134 KNetworkManager a Wired Devices v 3 Switch to Offline Mode X Wired Network 4 Show Connection Information E Dial Up Connections Configure Xl Options When the Connection Status KNetwork Manager window opens click the Statistics tab to see if your connection is working properly Figure 144 openSUSE Connection Status KNetwork Manager Connection Status KNetworkManager a Device Addresse Statistics J Received Transmitted Bytes 231744
261. me IP address In the following example the computer and the router s LAN port both use 192 168 1 1 as the IP address User s Guide Appendix D IP Addresses and Subnetting The computer cannot access the Internet This problem can be solved by assigning a different IP address to the computer or the router s LAN port Figure 160 Conflicting Computer and Router IP Addresses Example 20mm um um um um Um Um mo mo a 1192 168 1 1 1 dx i i D o a x Im D i 8 192 168 1 1 Internet 3 7 n mum m mom 9 User s Guide Importing Certificates This appendix shows you how to import public key certificates into your web browser Public key certificates are used by web browsers to ensure that a secure web site is legitimate When a certificate authority such as VeriSign Comodo or Network Solutions to name a few receives a certificate request from a website operator they confirm that the web domain and contact information in the request match those on public record with a domain name registrar If they match then the certificate is issued to the website operator who then places it on the site to be issued to all visiting web browsers to let them know that the site is legitimate Many ZyXEL products such as the NSA 2401 issue their own public key certificates These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and
262. me Setting features like Port Forwarding Port Triggering and voice service and phone settings WAN settings U a TOOLS A STATUS The Tools section allows you to configure your The Status section displays status and statistical certificates firewall content filter remote information for all connections and interfaces management logs among other things The following table describes the icons in this screen Table 3 Main gt Icons ICON DESCRIPTION MAIN Click to return to the Main screen SETUP Click to go the Setup screen where you can configure LAN DHCP and SNTP settings ADVANCED Click to go to the Advanced screen where you can configure features like Port Forwarding and Triggering WAN settings and so on 38 User s Guide Chapter 2 Introducing the Web Configurator Table 3 Main gt Icons continued ICON DESCRIPTION VOICE Click to go to the Voice screen where you can configure your voice service and phone settings U TOOLS i d A Click to go the Tools screen where you can configure your firewall W QoS and content filter among other things STATUS Click to go to the Status screen where you can view status and statistical information for all connections and interfaces Strength Indicator Displays a visual representation of the quality of your WiMAX connection Disconnected Zero bars Poorreception One bar
263. n the following table Table 107 VoIP Statistics Registration LABEL DESCRIPTION SIP Status Port This column displays each SIP account in the WiMAX Modem Status This field displays the current registration status of the SIP account You can change this in the Status screen Registered The SIP account is registered with a SIP server Register Fail The last time the WiMAX Modem tried to register the SIP account with the SIP server the attempt failed The WiMAX Modem automatically tries to register the SIP account when you turn on the WiMAX Modem or when you activate it I nactive The SIP account is not active You can activate it in VOI CE gt SIP gt SIP Settings Last This field displays the last time you successfully registered the SIP account It displays N A if you never successfully registered this account URI This field displays the account number and service domain of the SIP account You can change these in VOICE gt SIP gt SIP Settings Protocol This field displays the transport protocol the SIP account uses SIP accounts always use UDP Message This field indicates whether or not there are any messages waiting for Waiting the SIP account Last Incoming Number This field displays the last number that called the SIP account It displays N A if no number has ever dialed the SIP account User s Guide Chapter 21 The Status Screen Table 107 VolP Statistics
264. ndividual devices on a network Every networking device including computers servers routers printers etc needs an IP address to communicate across the network These networking devices are also known as hosts Subnet masks determine the maximum number of possible hosts on a network You can also use subnet masks to divide one network into multiple sub networks Introduction to IP Addresses One part of the IP address is the network number and the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house number each host on the network has its own unique identifying number the host ID Routers use the network number to send packets to the correct network while the host ID determines to which host on the network the packets are delivered Structure An IP address is made up of four parts written in dotted decimal notation for example 192 168 1 1 Each of these four parts is known as an octet An octet is an eight digit binary number for example 11000000 which is 192 in decimal notation Therefore each octet has a possible range of 00000000 to 11111111 in binary or O to 255 in decimal User s Guide Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets 192 168 1 are the network number and the fourth octet 16
265. ned User s Guide Chapter 12 The Service Configuration Screens Table 45 Custom Tones Details LABEL DESCRIPTION Maximum Time per 20 seconds Individual Tone Total Number of Tones 8 Recordable You can record up to eight different custom tones but the total time must be 128 seconds or less Use the following steps if you would like to create new tones or change your tones 1 Pick up the phone and press on your phone s keypad and wait for the message that says you are in the configuration menu 2 Press a number from 1101 1108 on your phone followed by the key 3 Play your desired music or voice recording into the receiver s mouthpiece Press the key 4 You can continue to add listen to or delete tones or you can hang up the receiver when you are done Do the following to listen to a custom tone 1 Pick up the phone and press on your phone s keypad and wait for the message that says you are in the configuration menu 2 Press a number from 1201 1208 followed by the key to listen to the tone 3 You can continue to add listen to or delete tones or you can hang up the receiver when you are done Do the following to delete a custom tone 1 Pick up the phone and press on your phone s keypad and wait for the message that says you are in the configuration menu 2 Press a number from 1301 1308 followed by the key to delete the tone of your choice Press 14
266. network Conflicting Computer IP Addresses Example More than one device can not use the same IP address In the following example computer A has a static or fixed IP address that is the same as the IP address that a DHCP server assigns to computer B which is a DHCP client Neither can access the Internet This problem can be solved by assigning a different static IP User s Guide Appendix D IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically Figure 158 Conflicting Computer IP Addresses Example r a A a i ENS i a I 192 168 1 33 RES lt Internet t y i fi p N Ws vn u I 192 168 1 33 i i a Conflicting Router IP Addresses Example Since a router connects different networks it must have interfaces using different network numbers For example if a router is set between a LAN and the Internet WAN the router s LAN and WAN addresses must be on different subnets In the following example the LAN and WAN are on the same subnet The LAN computers cannot access the Internet because the router cannot route between networks 0 um um Nm Em NM Um Nm um Figure 159 Conflicting Computer IP Addresses Example LAN i WAN E uu NS i 192 168 1 88 T s r Internet Seem eee ee Conflicting Computer and Router IP Addresses Example More than one device can not use the sa
267. ng rules to block packets for the services at specific interfaces Protect against IP spoofing by making sure the firewall is active Keep the firewall in a secured locked room The Triangle Route Problem A traffic route is a path for sending or receiving data packets between two Ethernet devices You may have more than one connection to the Internet through one or more ISPs If an alternate gateway is on the LAN and its IP address is in the same subnet as the WiMAX Modem s LAN IP address the triangle route also called asymmetrical route problem may occur The steps below describe the triangle route problem A computer on the LAN initiates a connection by sending out a SYN packet to a receiving server on the WAN The WiMAX Modem reroutes the SYN packet through Gateway A on the LAN to the WAN The reply from the WAN goes directly to the computer on the LAN without going through the WiMAX Modem User s Guide Chapter 16 The Firewall Screens As a result the WiMAX Modem resets the connection as the connection has not been acknowledged Figure 83 Triangle Route Problem LAN 16 4 3 1 Solving the Triangle Route Problem If you have the WiMAX Modem allow triangle route sessions traffic from the WAN can go directly to a LAN computer without passing through the WiMAX Modem and its firewall protection Another solution is to use IP alias IP alias allows you to partition your network into logical s
268. ng Certificates 5 Inthe Certificate Import Wizard click Next Figure 165 Internet Explorer 7 Certificate Import Wizard Certificate Import Wizard Welcome to the Certificate Import Wizard This wizard helps you copy certificates certificate trust lists and certificate revocation lists from your disk to a certificate store A certificate which is issued by a certification authority is a confirmation of your identity and contains information used to protect data or to establish secure network connections A certificate store is the system area where certificates are kept To continue click Next 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate click Next again and then go to step 9 Figure 166 Internet Explorer 7 Certificate Import Wizard Certificate Import Wizard Certificate Store Certificate stores are system areas where certificates are kept Windows can automatically select a certificate store or you can specify a location for Automatically select the certificate store based on the type of certificate Place all certificates in the following store User s Guide Appendix E Importing Certificates 7 Otherwise select Place all certificates in the following store and then click Browse Figure 167 Internet Explorer 7 Certificate Import Wizard Place all certificates in the following store Certificate store
269. nnecting cables carefully so that no one will step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect it to the right supply voltage for example 110V AC in North America or 230V AC in Europe Do NOT remove the plug and connect it to a power outlet by itself always attach the plug to the power adaptor first before connecting it to a power outlet Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution f the power adaptor or cord is damaged remove it from the device and the power source Do NOT attempt to repair the power adaptor or cord Contact your local vendor to order a new one Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device Use only No 26 AWG American Wire Gauge or larger telecommunication line cord Antenna Warning This device meets ETSI and FCC certification requirements when using the included antenna s Only use the included antenna s f you wall mount your device make sure that no electrical lines gas or water pi
270. nnections only from the Internet 4 Finally in the Secured Client IP Address field enter 2 2 2 2 as the IP address from which you will be connecting to the WiMAX Modem Any other attempts by computer on the Internet to connect will be rejected because their IP addresses won t match the one specified here 5 Click Apply to save your changes User s Guide PART Il Basic Screens The Setup Screens 6 1 Overview Use these screens to configure or view LAN DHCP Client and WAN settings 6 1 1 What You Can Do in This Chapter The Set IP Address screen Section 6 2 on page 66 lets you configure the WiMAX Modem s IP address and subnet mask The DHCP Client screen Section 6 3 on page 67 to view connection information for clients configured by the WiMAX Modem s internal DHCP server The Time Setting screen Section 6 4 on page 68 lets you configure your WiMAX Modem s time and date keeping settings 6 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter LAN A Local Area Network or a shared communication system to which many computers are attached A LAN as its name implies is limited to a local area such as a home or office environment LANs have different topologies the most common being the linear bus and the star configuration IP Address P addresses identify individual devices on a network Every networking device including computers servers routers p
271. nued LABEL DESCRIPTION Ingress This is the MPLS virtual circuit label number for traffic coming from the peer device Egress This is the MPLS virtual circuit label number for traffic going to the peer device Pseudowire Description This displays the information you previously entered describing the pseudowire Action Click the Edit icon to set up an Ethernet pseudowire or alter the configuration of an existing Ethernet pseudowire Click the Delete icon to remove an existing Ethernet pseudowire 9 4 1 Ethernet Pseudowire Setup Click a pseudowire entry s Edit icon in the ADVANCED gt VPN Transport gt Ethernet Pseudowire screen to set up or modify an Ethernet pseudowire s configuration Figure 42 ADVANCED gt VPN Transport gt Ethernet Pseudowire Setup C Active MPLS VC Label Ingress Egress Ethernet Pseudowire Setup Pseudowire Description lo 161048575 0 16741048575 The following table describes the labels in this screen Table 30 ADVANCED gt VPN Transport gt Ethernet Pseudowire Setup LABEL DESCRIPTION Active Select this to enable the pseudowire Deselect it to disable the pseudowire MPLS VC Label Ingress Enter the VC ingress label number for this pseudowire This must be the egress label number of the peer device This should not be the ingress label number of any other Ethernet pseudowire configured on the Wi
272. nux KDE distributions If your device s web configurator is set to use SSL certification then the first time you browse to it you are presented with a certification error Click Continue Figure 201 Konqueror 3 5 Server Authentication 3X Server Authentication Konqueror The server certificate failed the authenticity test 172 20 37 202 x cancel Click Forever when prompted to accept the certificate Figure 202 Konqueror 3 5 Server Authentication 3X Server Authentication Konqueror Would you like to accept this certificate forever without being prompted Eorever User s Guide Appendix E Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page s security details Figure 203 Konqueror 3 5 KDE SSL Information amp J amp KDE SSL Information Konqueror Current connection is secured with SSL Chain Peer certificate Issuer Organization ZyXEL Organization ZyXEL Organizational unit XYZ200 Organizational unit XYZ200 Country Us Country US Common name 172 23 37 202 Common name 172 23 37 202 IP address 172 23 37 202 URL https 172 23 37 202 loginwrap html Certificate state Certificate is self signed and thus may not be trustworthy Valid from Wednesday 21 May 2008 06 42 35 am GMT Valid until Saturday 21 May 2011 06 42 35 am GMT Serial number 11139321193569894228 MD5 digest 3F 9A
273. o restore a previously saved configuration file to your system browse to the location of the configuration file and click Upload File Path Browse Upload Back to Factory Defaults Click Reset to clear all user entered configuration information and return to factory defaults After resetting the Password will be 1234 LAN IP address will be 192 168 1 1 DHCP will be reset to server The following table describes the labels in this screen Table 41 ADVANCED gt System Configuration gt Configuration LABEL DESCRIPTION Backup Configuration Backup Click this to save the WiMAX Modem s current configuration to a file on your computer Once your device is configured and functioning properly it is highly recommended that you back up your configuration file before making configuration changes The backup configuration file is useful if you need to return to your previous settings Restore Configuration File Path Enter the location of the file you want to upload or click Browse to find it Browse Click this to find the file you want to upload Upload Click this to restore the selected configuration file Note Do not turn off the device while configuration file upload is in progress Back to Factory Defaults Reset Click this to clear all user entered configuration information and return the WiMAX Modem to its factory defaults There is no warning screen
274. oE Qe your computer does not have an IP address Not Connected Ethernet f ane IP Address 0 0 0 0 FireWire Kd Not Connected Subnet Mask AirPort A 9 or Router DNS Server Jj Search Domains UU Mee TA rS M 6 id Click the lock to prevent further changes 6 Click Apply and close the window User s Guide Appendix B Setting Up Your Computer s IP Address Verifying Settings Check your TCP IP properties by clicking Applications gt Utilities gt Network Utilities and then selecting the appropriate Network interface from the Info tab Figure 129 Mac OS X 10 5 Network Utility 900 Network utility o Netstat AppleTalk Ping Lookup Traceroute Whois Finger PortScan Please aterface for information Network Interface en1 Sn EXER L Transfer Statistics Hardware Address 00 30 65 25 6a b3 Sent Packets 1230 IP Address es 10 0 2 2 Send Errors 0 Link Speed 11 Mbit s Recv Packets 1197 Link Status Active Recv Errors 0 Vendor Apple Collisions 0 Model Wireless Network Adapter 802 11 Linux Ubuntu 8 GNOME This section shows you how to configure your computer s TCP IP settings in the GNU Object Model Environment GNOME using the Ubuntu 8 Linux distribution The procedure screens and file locations may vary depending on your specific distribution release version and individual configuration The following screens use the defaul
275. ocations to other networks or the Internet A WAN configuration can include switched and permanent telephone circuits terrestrial radio systems and satellite systems 8 1 1 What You Can Do in This Chapter The Internet Connection screen Section 8 2 on page 88 lets you set up your WiMAX Modem s Internet settings The WiMAX Configuration screen Section 8 3 on page 90 lets set up the frequencies used by your WiMAX Modem The Advanced screen Section 8 4 on page 94 lets configure your DNS server RIP Multicast and Windows Networking settings 8 1 2 What You Need to Know The following terms and concepts may help as you read through this chapter WiMAX WiMAX Worldwide Interoperability for Microwave Access is the IEEE 802 16 wireless networking standard which provides high bandwidth wide range wireless service across wireless Metropolitan Area Networks MANs ZyXEL is a member of the WiMAX Forum the industry group dedicated to promoting and certifying interoperability of wireless broadband products In a wireless MAN a wireless equipped computer is known either as a mobile station MS or a subscriber station SS Mobile stations use the IEEE 802 16e standard and are able to maintain connectivity while switching their connection from one base station to another base station handover while subscriber stations use other standards that do not have this capability IEEE 802 16 2004 User s Guide Chapter 8 The WAN
276. ode Use the ZyXEL Setup Wizard to quickly and easily configure your Internet connection or VoIP account server settings If this is your first time using the web configurator we suggest that you use this mode Use the Advanced mode if you want to configure all possible settings for your device Go to Wizard setup Go to Advanced setup Note For security reasons the WiMAX Modem automatically logs you out if you do not use the Web Configurator for five minutes If this happens log in again User s Guide Chapter 2 Introducing the Web Configurator 2 2 The Main Screen When you first log into the web configurator and by pass the wizard the Main screen appears Here you can view a summary of your WiMAX Modem connection status This is also the default home page for the ZyXEL web configurator and it contains conveniently placed shortcuts to all of the other screens Note Some features in the web configurator may not be available depending on your firmware version and or configuration Figure 5 Main Screen Help Wizard Logout ADVANCED VOICE WiMAX Connection Status DL_SYN Software Version V3 70 BQP 0 a1 07 28 2009 Voice 1 changeme On Hook Version Date Jul 28 2009 23 04 31 System Uptime 0 13 12 Wimax Uptime 00 00 00 e SETUP uw ADVANCED Ye VOICE The Setup section allows you to configure LAN The Advanced section allows you to configure The Voice section allows you to configure your DHCP Ti
277. oded PKCS 77 This Privacy Enhanced Mail PEM format uses lowercase letters uppercase letters and numerals to convert a binary PKCS 7 certificate into a printable form Note Be careful to not convert a binary file to text during the transfer process It is easy for this to occur since many programs use text files by default User s Guide Chapter 15 The Certificates Screens 15 4 2 Verifying a Certificate Before you import a certificate into the WiMAX Modem you should verify that you have the correct certificate This is especially true of trusted certificates since the WiMAX Modem also trusts any valid certificate signed by any of the imported trusted certificates 15 4 2 1 Checking the Fingerprint of a Certificate on Your Computer A certificate s fingerprints are message digests calculated using the MD5 or SHA1 algorithms The following procedure describes how to check a certificate s fingerprint to verify that you have the actual certificate Browse to where you have the certificate saved on your computer Make sure that the certificate has a cer or crt file name extension On some Linux distributions the file extension may be der Figure 77 Remote Host Certificates User s Guide Chapter 15 The Certificates Screens 3 Double click the certificate s icon to open the Certificate window Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields Figu
278. odem in the other session or ask the person who is logged in to log out 3 Disconnect and re connect the power adapter or cord to the WiMAX Modem 4 Ifthis does not work you have to reset the WiMAX Modem to its factory defaults See Section 11 5 on page 126 User s Guide 251 Chapter 22 Troubleshooting cannot Telnet to the WiMAX Modem See the troubleshooting suggestions for cannot see or access the Login screen in the web configurator Ignore the suggestions about your browser 22 3 Internet Access cannot access the Internet 1 Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 2 1 on page 33 2 Make sure you entered your ISP account information correctly in the wizard These fields are case sensitive so make sure Caps Lock is not on 3 Check your security settings In the web configurator go to the Status screen Click the WiMAX Profile link in the Summary box and make sure that you are using the correct security settings for your Internet account 4 Check your WiMAX settings The WiMAX Modem may have been set to search the wrong frequencies for a wireless connection In the web configurator go to the Status screen Click the WiMAX Site I nformation link in the Summary box and ensure that the values are correct If the values are incorrect enter the correct frequency settings in the ADVANCED gt WAN Configuration gt WiMAX
279. ol used by the service If this is TCP UDP then the service uses the same port number with TCP and UDP If this is USER DEFI NED the Port s is the IP protocol number not the port number Port s This value depends on the Protocol Please refer to RFC 1700 for further information about port numbers f the Protocol is TCP UDP or TCP UDP this is the IP port number f the Protocol is USER this is the IP protocol number Description This is a brief explanation of the applications that use this service or the situations in which this service is used Table 126 Commonly Used Services NAME PROTOCOL PORT S DESCRIPTION AH User Defined 51 The IPSEC AH Authentication IPSEC TUNNEL Header tunneling protocol uses this service AIM New ICQ TCP 5190 AOL s Internet Messenger service It is also used as a listening port by ICQ AUTH TCP 113 Authentication protocol used by some servers BGP TCP 179 Border Gateway Protocol BOOTP CLIENT UDP 68 DHCP Client BOOTP SERVER UDP 67 DHCP Server CU SEEME TCP 7648 A popular videoconferencing solution from White Pines Software UDP 24032 DNS TCP UDP 53 Domain Name Server a service that matches web names for example www zyxel com to IP numbers User s Guide 355 Appendix G Common Services Table 126 Commonly Used Services continued NAME PROTOCOL PORT S
280. omatically logs you out if the management session remains idle for longer than this timeout period The management session does not time out when a statistics screen is polling You can change the timeout period in the Maintenance gt System gt General screen User s Guide Chapter 18 The Remote Management Screens SNMP Simple Network Management Protocol SNMP is a protocol used for exchanging management information between network devices SNMP is a member of the TCP IP protocol suite Your WiMAX Modem supports SNMP agent functionality which allows a manager station to manage and monitor the WiMAX Modem through the network The WiMAX Modem supports SNMP version one SNMPv1 and version two SNMPv2 The next figure illustrates an SNMP management operation Note SNMP is only available if TCP IP is configured 18 2 WWW Click TOOLS Remote Management WWW to control HTTP access to your WiMAX Modem Figure 87 TOOLS gt Remote Management gt WWW Server Port 80 Server Access LAN amp WAN Secured Client IP Address 9 Al Selected 6 0 0 0 rm The following table describes the labels in this screen Table 71 TOOLS gt Remote Management gt WWW LABEL DESCRIPTION Server Port Enter the port number this service can use to access the WiMAX Modem The computer must use the same port number Server Access Select the interface s through which a computer may access the WiMAX Modem using th
281. on is the process of encoding information so that it cannot be read by anyone who does not know the code WiMAX uses PKMv2 Privacy Key Management version 2 for authentication and CCMP Counter Mode with Cipher Block Chaining Message Authentication Protocol for data encryption WiMAX supports EAP Extensible Authentication Protocol RFC 2486 which allows additional authentication methods to be deployed with no changes to the base station or the mobile or subscriber stations PKMv2 is a procedure that allows authentication of a mobile or subscriber station and negotiation of a public key to encrypt traffic between the MS SS and the base station PKMv2 uses standard EAP methods such as Transport Layer Security EAP TLS or Tunneled TLS EAP TTLS for secure communication In cryptography a key is a piece of information typically a string of random numbers and letters that can be used to lock encrypt or unlock decrypt a message Public key encryption uses key pairs which consist of a public freely available key and a private secret key The public key is used for encryption and the private key is used for decryption You can decrypt a message only if you have the private key Public key certificates or digital IDs allow users to verify each other s identity User s Guide 267 Appendix A WiMAX Security RADIUS RADIUS is based on a client server model that supports authentication authorization and accounting
282. on of the bin file you want to upload or click Browse to find it You must decompress compressed zip files before you can upload them Browse Click this to find the bin file you want to upload Upload Click this to begin uploading the selected file This may take up to two minutes Note Do not turn off the device while firmware upload is in progress 11 4 1 The Firmware Upload Process When the WiMAX Modem uploads new firmware the process usually takes about two minutes The device also automatically restarts in this time This causes a temporary network disconnect Note Do not turn off the device while firmware upload is in progress After two minutes log in again and check your new firmware version in the Status screen You might have to open a new browser window to log in If the upload is not successful you will be notified by error message Click Return to go back to the Firmware screen User s Guide Chapter 11 The System Configuration Screens 11 5 Configuration Click ADVANCED gt System Configuration gt Configuration to back up or restore the configuration of the WiMAX Modem You can also use this screen to reset the WiMAX Modem to the factory default settings Figure 54 ADVANCED gt System Configuration gt Configuration Backup Configuration Click Backup to save the current configuration of your system to your computer Backup Restore Configuration T
283. on to begin configuring this screen afresh User s Guide Chapter 19 QoS 19 3 1 Class Configuration Click the Create New Class button or the edit icon in the Class Setup screen to configure a classifier Figure 98 QoS gt Class Configuration C Active Index Name Interface CI Protocol Class Setup Class Configuration The following table describes the labels in this screen Table 81 QoS Class Setup LABEL DESCRIPTION Class Configuration Active Select this to make a class active Index Enter an index number for the class Similar classes are processed in order of index number from lowest to highest Name Enter a descriptive name of up to 20 printable English keyboard characters including spaces Interface Select an interface to which the class will apply From WAN The class is applied to all packets incoming from the WAN Wide Area Network From LAN The class is applied to all packets outgoing from the LAN Local Area Network Protocol Select a protocol Options are TCP UDP and User Defined Apply Click this button to save your changes back to the WiMAX Modem Cancel Click this button to begin configuring this screen afresh User s Guide 217 Chapter 19 QoS User s Guide 20 1 20 1 1 20 1 2 The Logs Screens Overview Use the TOOLS gt Logs screens to look at log entries and alerts and to configure the W
284. one calls Clear this if you do not want to send identification Authentication User Name Enter the user name for registering this SIP account exactly as it was given to you You can use up to 95 printable ASCII characters Password Enter the user name for registering this SIP account exactly as it was given to you You can use up to 95 printable ASCII Extended set characters Apply Click to save your changes Reset Click to restore your previously saved settings Advanced Click this to edit the advanced settings for this SIP account The Advanced SI P Settings screen appears User s Guide Chapter 12 The Service Configuration Screens 12 2 1 Advanced SIP Settings This section describes the features of the Advanced SIP settings screen 12 2 1 1 STUN STUN Simple Traversal of User Datagram Protocol UDP through Network Address Translators allows the WiMAX Modem to find the presence and types of NAT routers and or firewalls between it and the public Internet STUN also allows the WiMAX Modem to find the public IP address that NAT assigned so the WiMAX Modem can embed it in the SIP data stream STUN does not work with symmetric NAT routers or firewalls See RFC 3489 for details on STUN The following figure shows how STUN works 1 The WiMAX Modem A sends SIP packets to the STUN server B 2 The STUN server B finds the public IP address and port number that the NAT router used on the
285. onfigurator is set to use SSL certification then the first time you browse to it you are presented with a certification error 2 Click Install to accept the certificate Figure 190 Opera 9 Certificate signer not found Certificate signer not found The root certificate for this server is not registered You may install this certificate Accept install The root certificate from 172 20 37 202 is not known to Opera Opera cannot decide if this certificate can be trusted User s Guide Appendix E Importing Certificates 3 The next time you visit the web site click the padlock in the address bar to open the Security information window to view the web page s security details Figure 191 Opera 9 Security information e Secure site The connection to 172 20 37 202 is secure Certificate summary Holder 172 20 37 202 ZyXEL Issuer 172 20 37 202 ZyXEL Expires 05 21 2011 Encryption protocol TLS v1 0 256 bit AES 1024 bit DHE_RSA SHA User s Guide Appendix E Importing Certificates Installing a Stand Alone Certificate File in Opera 1 Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted you can install a stand alone certificate file if one has been issued to you Open Opera and click TOOLS gt Preferences Figure 192 Opera 9 Tools Menu Mail and chat accounts Delete private data Notes Ctrl Alt E Transfers Ctrl Alt T History Ctrl Alt
286. onqueror 3 5 Server Authentication tanien ninn kon tk td kd ud 346 Figure 202 Konqueror 3 5 Server A theritiGatiol 1e cesci testeur reset pere eerie Psp Leite ERE Fred a 346 igure 203 Kondgaeror 3 5 KDE SSL Ing OE 2siocieibe bora Rev ea bo Re E bonnie 347 Figure 204 Konqueror 3 5 Public Key Certificate File c ccsssecccsssetsseseeesseteessacconscceesssneseceeeesenecens 348 Figure 205 Kondueror 3 5 Certificate Import Resul iiiter ere teo netter tane a 348 Figure 206 Kongueror 3 5 Kleopatra MM aaa a a EE aa Sa EE 348 Figure 207 Kongueror 3 5 Settings Menu asiosio Leto da a 350 Moure 208 Kongiaror o S GOODIES ahirna N re Labbe c 350 User s Guide 23 List of Figures User s Guide List of Tables List of Tables Bs MEIN ETSI DU EE at eel 5 Toloz The SD ISON RE S Lm 33 Table 3 Mam ICONS E 38 jr c ae 39 Table 5 Internet Connection Wizard gt System Information seessseeeeeenne 42 Table 6 Internet Connection Wizard gt Authentication Settings Screen sssssssssssss 43 Table 7 Internet Connection Wizard gt IP Address teen rank ete XE Ek at dua mana 45 Table 8 VoIP Connection gt First Voice Account Settings 48 Tabe D SETUP S Der PATIESS aussen oia apii bonito atn AY CE GR en ERR a D oe La RU d 67 TRIS TO SETUP ss DERI ORBE siiis SEAS aac cda bota lundi ro Dried dor b bad ber and 67 Table 11 SETUP
287. ons and identification Clear SSL state V Certificates Publishers AutoComplete AutoComplete stores previous entries on webpages and suggests matches for you Feeds provide updated content from websites that can be read in Internet Explorer and other programs User s Guide Appendix E Importing Certificates 3 In the Certificates dialog box click the Trusted Root Certificates Authorities tab select the certificate that you want to delete and then click Remove Figure 177 Internet Explorer 7 Certificates Certificates Intended purpose lt lt All gt Intermediate Certification Authoriti Trusted Root Certification Authorities Trusted Root Certification Authorities Certification Authorities Listed Publ Issued By Expiratio Friendly Name E3 172 20 37 202 172 20 37 202 5 21 2011 ABA ECOM RootCA X ABA ECOM Root CA 7 10 2009 DST ABA ECOM EJautoridad Certifica Autoridad Certificador 6 29 2009 Autoridad Certifi Autoridad Certifica Autoridad Certificador 6 30 2009 Autoridad Certifi aaltimore Ez byDST Baltimore EZ by DST 7 4 2009 DST Baltimore E JBelgacom E TrustP Belgacom E Trust Prim 1 21 2010 BelgacomE Trus E caw HKT SecureN C amp W HKT SecureNet 10 16 2009 CW HKT Secure Ecaw HKT SecureN C amp W HKT SecureNet 10 16 2009 CW HKT Secure Ecaw HKT SecureN C amp W HKT SecureNet 10 16 2010 CW HKT Secure mera
288. original and if it is acceptable transmits details of the voice elements it used to make the synthesis Because the codec at the receiving end has the same list it can exactly recreate the synthesized audio signal G 729 provides good sound quality and reduces the required bandwidth to 8kbps 12 2 1 4 MWI Message Waiting Indication Enable Message Waiting Indication MWI enables your phone to give you a message waiting beeping dial tone when you have one or more voice messages Your VoIP service provider must have a messaging system that sends message waiting status SIP packets as defined in RFC 3842 User s Guide Chapter 12 The Service Configuration Screens 12 2 1 5 Advanced SIP Settings Options Click Advanced in VOICE gt Service Configuration gt SIP Settings to set up and maintain advanced settings for each SIP account Figure 58 VOICE gt Service Configuration gt SIP Settings gt Advanced SIP Server Settings URL Type Expiration Duration Register Re send timer Session Expires Min SE RTP Port Range Start Port End Port Voice Compression Primary Compression Type Secondary Compression Type Third Compression Type DTMF Mode STUN C Active Server Address Server Port Use NAT CI Active Server Address Server Port sP w 3600 20 65535 sec 180 165535 sec 180 30 3600 sec 30 20 1800 sec 4000 1025 65535 65535 1025 65535 G
289. orithm This field displays the type of algorithm that was used to sign the certificate The WiMAX Modem uses rsa pkcs1 shal RSA public private key encryption algorithm and the SHA1 hash algorithm Some certification authorities may use rsa pkcs1 md5 RSA public private key encryption algorithm and the MD5 hash algorithm Valid From This field displays the date that the certificate becomes applicable none displays for a certification request Valid To This field displays the date that the certificate expires The text displays in red and includes an Expired message if the certificate has expired none displays for a certification request Key Algorithm This field displays the type of algorithm that was used to generate the certificate s key pair the WiMAX Modem uses RSA encryption and the length of the key set in bits 1024 bits for example Subject Alternative Name This field displays the certificate owner s IP address IP domain name DNS or e mail address EMAIL User s Guide 175 Chapter 15 The Certificates Screens 176 Table 60 TOOLS gt Certificates gt My Certificates gt Edit LABEL DESCRIPTION Key Usage This field displays for what functions the certificate s key can be used For example DigitalSignature means that the key can be used to sign certificates and KeyEncipherment means that the key can be used to encrypt text Basic
290. our device has built in DHCP server capability enabled by default It can assign IP addresses an IP default gateway and DNS servers to DHCP clients Your device can also act as a surrogate DHCP server DHCP Relay where it relays IP address assignment from the actual real DHCP server to the clients IP Alias IP alias allows you to partition a physical network into logical networks over the same Ethernet interface Your device supports three logical LAN interfaces via its single physical Ethernet interface with the your device itself as the gateway for each LAN network Multiple SIP Accounts You can configure multiple voice SIP accounts SIP ALG Your device is a SIP Application Layer Gateway ALG It allows VoIP calls to pass through NAT for devices behind it such as a SIP based VoIP software application on a computer Dynamic Jitter Buffer The built in adaptive buffer helps to smooth out the variations in delay jitter for voice traffic up to 60 ms This helps ensure good voice quality for your conversations Voice Activity Detection Silence Suppression Voice Activity Detection VAD reduces the bandwidth that a call uses by not transmitting when you are not speaking Comfort Noise Generation Your device generates background noise to fill moments of silence when the other device in a call stops transmitting because the other party is not speaking as total silence could easily be mistaken for a
291. ous sequence of zeros for a total number of 32 bits Subnet masks can be referred to by the size of the network number part the bits with a 1 value For example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes Subnet masks are expressed in dotted decimal notation just like IP addresses The following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks Table 116 Subnet Masks BINARY 1ST 2ND 3RD 4TH DECIMAL OCTET OCTET OCTET OCTET 8 bit mask 11111111 00000000 00000000 00000000 255 0 0 0 16 bit 11111111 11111111 00000000 00000000 255 255 0 0 mask 24 bit 11111111 11111111 11111111 00000000 255 255 255 0 mask 29 bit 11111111 11111111 11111111 11111000 255 255 255 24 mask 8 Network Size The size of the network number determines the maximum number of possible hosts you can have on your network The larger the number of network number bits the smaller the number of remaining host ID bits An IP address with host IDs of all zeros is the IP address of the network 192 168 1 0 with a 24 bit subnet mask for example An IP address with host IDs of all ones is the broadcast address for that network 192 168 1 255 with a 24 bit subnet mask for example As these two IP addresses cannot be used for individual hosts calculate the maximum number of possi
292. packets received Receive and sent Transmit on the customer interface since the interface was activated or the Clear button pressed Total Bytes This displays the number of bytes received Receive and sent Transmit on the customer interface since the interface was activated or the Clear button pressed Interface Description This is the brief name or description of the customer interface configured in the ADVANCED gt VPN Transport gt Customer Interface Setup screen User s Guide 107 Chapter 9 The VPN Transport Screens User s Guide The NAT Configuration Screens 10 1 Overview Use these screens to configure port forwarding and trigger ports for the WiMAX Modem You can also enable and disable SIP FTP and H 323 ALG Network Address Translation NAT maps a host s IP address within one network to a different IP address in another network For example you can use a NAT router to map one IP address from your ISP to multiple private IP addresses for the devices in your home network 10 1 1 What You Can Do in This Chapter The General screen Section 10 2 on page 109 lets you enable or disable NAT and to allocate memory for NAT and firewall rules The Port Forwarding screen Section 10 3 on page 110 lets you look at the current port forwarding rules in the WiMAX Modem and to enable disable activate and deactivate each one The Trigger Port screen Section 10 4 on page
293. pears 13 2 1 Advanced Analog Phone Setup Click the Advanced button in VOICE gt Phone gt Analog Phone to edit advanced settings for each phone port Figure 65 VOIC E Phone Analog Phone Advanced Speaking Volume Listening Volume Echo Cancellation G 168 Active Dialing Interval Sele C VAD Support Voice Volume Control Dialing Interval Select l Min 1 Min ct 3 wl User s Guide Chapter 13 The Phone Screens The following table describes the labels in this screen Table 49 VOICE gt Phone gt Analog Phone gt Advanced LABEL DESCRIPTION Voice Volume Control Speaking Enter the loudness that the WiMAX Modem uses for speech that it sends Volume to the peer device 14 is the quietest and 14 is the loudest Listening Enter the loudness that the WiMAX Modem uses for speech that it Volume receives from the peer device 14 is the quietest and 14 is the loudest Echo Cancellation G 168 Active Select this if you want to eliminate the echo caused by the sound of your voice reverberating in the telephone receiver while you talk Dialing Interval Select Dialing Interval Enter the number of seconds the WiMAX Modem should wait after you Select stop dialing numbers before it makes the phone call The value depends on how quickly you dial phone numbers If you select Active Immediate Dial in VOICE gt Phone gt Common you can press th
294. pes will be damaged 6 User s Guide Safety Warnings Make sure that the cable system is grounded so as to provide some protection against voltage surges Your product is marked with this symbol which is known as the WEEE mark WEEE stands for Waste Electronics and Electrical Equipment It means that used electrical and electronic products should not be mixed with general waste Used electrical and electronic equipment should be treated separately User s Guide Safety Warnings User s Guide Contents Overview Contents Overview iniroduclion and 29 Saa HER AE aE CRF AEEA A Dae A 31 Introduce ihe Web CONNIE assirinassi ainaani amni dada c na canda d 35 iemet Connection EI etm E 41 VOIP Conneccion Wald eee YER ERREUR EROR FRDRT EIER Fr Hi e E I ar RUN C POHRL VA GRE LRL REI 47 iri er UTERE 51 r L 7 eR 63 The Se OP BIIS ies cis aire a up Eee u dude cod uam etes tU Ad ace N 65 Li rT so iis 2 e n 71 Ah LAN D BIDUO SOPSBHB iit wes E tB nexa e bet deut ob bera todo po Dep Peur dte ERAT lea cepearasoa eaves 73 The WAN Gonfiguraion SCION e cigar pcc da ein a booa a eda x one agant det estes 85 TEYRN TSE a OI Na sss dans can i actae O Sua easshiuush si dio erro Dru eas OD Odd ci 97 The NAT Coniiguration Sreang ccssscciesssssvenst cnsdsnteatoectessets andani eean EEEa 109 The System Ga
295. provider to find out which settings in this chapter you should configure in order to use your telephone with the WiMAX Modem Connect your WiMAX Modem to the Internet as described in the Quick Start Guide If you have not already done so then you will not be able to test your Vol P settings 12 2 SIP Settings Click VOICE gt Service Configuration gt SIP Setting to setup and maintain your SIP account s in the WiMAX Modem Your VoIP or Internet service provider should provide you with your account information You can also enable and disable each SIP account Figure 56 VOICE Service Configuration SIP Setting SIP Account SIP1 SIP Settings Active SIP Account Number changeme SIP Local Port 5060 1025 65535 SIP Server Address 127 0 0 1 SIP Server Port 5060 1 65535 REGISTER Server Address 127 0 0 1 REGISTER Server Port 5060 1 65535 SIP Service Domain 127 0 0 1 Send Caller 1D Authentication User Name changeme Password CILLI User s Guide 133 Chapter 12 The Service Configuration Screens The following table describes the labels in this screen Table 43 VOICE gt Service Configuration gt SIP Setting LABEL DESCRIPTION SIP Account Select the SIP account you want to see in this screen If you change this field the screen automatically refreshes SIP Settings Active SIP Select this if you want the WiMAX Modem to use this account Clear
296. queror 3 5 Configure Configure Konqueror EA a Configure SSL manage certificates and other cryptography settings Cookies SSL OpenSSL Your Certificates VER Q Organization Common Name ul Do Cache J D Proxy Stylesheets DU PS ZyXEL Organization ZyX4 Organization ai al Organizational unit XYZ200 Oraanizational unit eiygto EAT ue EZ j KT Valid from Wednesday 21 May 2008 06 42 35 am GMT d Valid until Saturday 21 May 2011 06 42 35 am GMT r Cache Policy s Permanently Accept A gt until O Reject Plugins z Prompt Browser Identification MDS digest 3F 9A 76 6E A9 F5 07 41 BE 4C 8B 8B A2 D3 F0 2F Performance Help Defaults iw ok X Cancel 4 The next time you go to the web site that issued the public key certificate you just removed a certification error appears User s Guide Appendix E Importing Certificates Note There is no confirmation when you remove a certificate authority so be absolutely certain you want to go through with it before clicking the button User s Guide 351 Appendix E Importing Certificates 352 User s Guide SIP Passthrough Enabling Disabling the SIP ALG You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address of an existing SIP device that is using STUN If you want to use STUN with a SIP cl
297. quest MD5 Fingerprint This is the certificate s message digest that the WiMAX Modem calculated using the MD5 algorithm SHA1 Fingerprint This is the certificate s message digest that the WiMAX Modem calculated using the SHA1 algorithm Certificate in PEM Base 64 Encoded Format This read only text box displays the certificate or certification request in Privacy Enhanced Mail PEM format PEM uses lowercase letters uppercase letters and numerals to convert the binary certificate into a printable form You can copy and paste a certification request into a certification authority s web page an e mail that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment You can copy and paste a certificate into an e mail to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution via floppy disk for example Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes User s Guide Chapter 15 The Certificates Screens 15 3 2 Trusted CA Import Click TOOLS gt Certificates gt Trusted CAs and then click Import to open the Trusted CA Import screen Follow the instructions in this screen to save a trusted certification authority s certificate from a computer to the WiMAX
298. r two servers Once the WiMAX Modem receives its configuration settings and implements them it can connect to the other servers If the settings change it will once again be unable to connect until it receives its updates from the ACS The WiMAX Modem can be configured to periodically check for updates from the auto configuration server so that the end user need not be worried about it 212 User s Guide Chapter 18 The Remote Management Screens Click TOOLS gt Remote Management gt TRO69 to access this screen Use this screen to open WiMAX Modem s auto configuration and dynamic service configuration options Figure 95 TOOLS gt Remote Management gt TRO69 O Active ACS URL http 172 89 76 1 User Name alcsprn 1045 Password 180945767fa 102395601 Connection Request User Name uio 14601 Connection Request Password ZxER87qqMOarUNubZ C Periodic Inform Enable Periodic Inform Interval 86400 sec Range 30 2147483647 Periodic Inform Time yyyy mm dd Thh mm ss 2012 01 01T03 30 00 Lappy The following table describes the labels in this screen Table 78 TOOLS gt Remote Management gt TRO69 LABEL DESCRIPTION Active Select this option to turn on the WiMAX Modem s TR 069 feature Note If this feature is not enabled then the WiMAX Modem cannot be managed remotely ACS URL Enter the URL or IP address of the auto configuration server User Name Enter the user name sent when the WiMAX Modem
299. r TCP IP properties by clicking Applications gt Utilities gt Network Utilities and then selecting the appropriate Network Interface from the I nfo tab Figure 124 Mac OS X 10 4 Network Utility e e e Network Utility info Netstat AppleTalk Ping Lookup Traceroute Whois Finger Port Scan erface for information Network Interface enO E Transfer Statistics Hardware Address 00 16 cb 8b 50 2e Sent Packets 20607 IP Address es 118 169 44 203 Send Errors 0 Link Speed 100 Mb Recv Packets 22626 Link Status Active Recv Errors 0 Vendor Marvell Collisions 0 Model Yukon Gigabit Adapter 88E8053 282 User s Guide Appendix B Setting Up Your Computer s IP Address Mac OS X 10 5 The screens in this section are from Mac OS X 10 5 1 Click Apple gt System Preferences Figure 125 Mac OS X 10 5 Apple Menu Finder File Edit Vie About This Mac Software Update Mac OS X Software SS System Preferences y R Recent Items b Force Quit X38 Sleep Restart Shut Down 2 In System Preferences click the Network icon Figure 126 Mac OS X 10 5 Systems Preferences eo System Preferences Personal Appearance Desktop amp Expos amp International Spotlight Screen Saver Spaces Hardware O P A M o CDs amp DVDs Displays Energy Keyboard amp Print amp Fax Sound Saver Mouse Internet amp N e eyaqQ a QuickTime Sharing System YI
300. r network has a small number of clients using peer to peer applications you can raise this number to ensure that their performance is not degraded by the number of NAT sessions they can establish If your network has a large number of users using peer to peer applications you can lower this number to ensure no single client is using all of the available NAT sessions Apply Click to save your changes Cancel Click to return to the previous screen without saving your changes Port Forwarding A NAT server set is a list of inside behind NAT on the LAN servers for example web or FTP that you can make accessible to the outside world even though NAT makes your whole inside network appear as a single machine to the outside world Use the ADVANCED gt NAT Configuration gt Port Forwarding screen to forward incoming service requests to the server s on your local network You may enter a single port number or a range of port numbers to be forwarded and the local IP address of the desired server The port number identifies a service for example web service is on port 80 and FTP on port 21 In some cases such as for unknown services or where one server can support more than one service for example both FTP and web service it might be better to specify a range of port numbers In addition to the servers for specified services NAT supports a default server A service request that does not have a server explicitly designated
301. r s Guide 373 Index Q QoS 215 Quality of Service see QoS R RADIUS 87 268 Message Types 268 Messages 268 Shared Secret Key 268 Real time Transport Protocol see RTP redirect server SIP 145 register server SIP 132 registration product 362 related documentation 3 remote management and NAT 204 remote management limitations 204 required bandwidth 136 RFC 1889 132 RFC 2510 See Certificate Management Protocol RFC 3489 135 RFC 3842 136 RTP 132 S safety warnings 6 secure communication 44 89 267 secure connection 87 security 267 security association 269 see SA server outbound proxy 135 services 87 Session Initiation Protocol see SIP silence suppression 149 silent packets 149 Simple Certificate Enrollment Protocol SCEP 172 SIP 131 account 132 ACK message 143 ALG 116 146 Application Layer Gateway see ALG authentication 48 authentication password 48 BYE request 144 call progression 143 client 144 client server 144 identities 132 INVITE request 143 number 48 132 OK response 143 outbound proxy 135 proxy server 144 redirect server 145 register server 132 server address 48 servers 144 service domain 48 132 URI 132 user agent 144 SNMP 205 manager 207 sound quality 136 speed dial 159 SS 85 86 stateful inspection 194 STUN 135 146 subnet 309 mask 310 subnetting 312 subscriber station see SS supplementary phone services 150 syntax conventions 4 system timeout
302. r service provider for details TTLS Inner EAP This field displays the type of secondary authentication method Once a secure EAP TTLS connection is established the inner EAP is the protocol used to exchange security information between the mobile station the base station and the AAA server to authenticate the mobile station See the WiMAX security appendix for more details The WiMAX Modem supports the following inner authentication types CHAP Challenge Handshake Authentication Protocol MSCHAP Microsoft CHAP e MSCHAPV2 Microsoft CHAP version 2 PAP Password Authentication Protocol Certificate This is the security certificate the WiMAX Modem uses to authenticate the AAA server Use the TOOLS gt Certificates gt Trusted CA screen to import certificates to the WiMAX Modem Back Click to display the previous screen Next Click to proceed to the next screen Close Click to close the wizard without saving User s Guide Chapter 3 Internet Connection Wizard 3 1 4 IP Address This Internet Connection Wizard screen allows you to configure your IP address The settings here correspond to the SETUP gt Set IP Address screen see Section 6 2 on page 66 A fixed IP address is a static IP that your ISP gives you An automatic dynamic IP address is not fixed the ISP assigns you a different one each time you connect to the Internet Figure 9 Internet Connection Wizard gt IP Address
303. r the WiMAX Modem to find a connection The WiMAX Modem searches the DL Frequency settings in ascending numerical order from 1 to 9 Note The Bandwidth field is not user configurable when the WiMAX Modem finds a WiMAX connection its frequency is displayed in this field f you enter a 0 in a DL Frequency field the WiMAX Modem immediately moves on to the next DL Frequency field When the WiMAX Modem connects to a base station the values in this screen are automatically set to the base station s frequency The next time the WiMAX Modem searches for a connection it searches only this frequency If you want the WiMAX Modem to search other frequencies enter them in the DL Frequency fields The following table describes some examples of DL Frequency settings Table 22 DL Frequency Example Settings EXAMPLE 1 EXAMPLE 2 Bandwidth 2500000 2500000 DL Frequency 2550000 2550000 1 DL Frequency 2 0 2600000 DL Frequency 0 0 3 DL Frequency 0 0 4 The WiMAX Modem The WiMAX Modem searches at 2500000 searches at 2500000 kHz kHz and then searches and then at 2550000 kHz if at 2550000 kHz if it has it has not found an not found a connection available connection If it still does not find an available connection it searches at 2600000 kHz 8 3 3 Using the WiMAX Frequency Screen In this example your Internet service provider has given you a list of supported frequencies 2
304. rd Authentication Protocol Certificate This is the security certificate the WiMAX Modem uses to authenticate the AAA server if one is available User s Guide PART VI oun sh ooti ng 247 Troubleshooting This chapter offers some suggestions to solve problems you might encounter The potential problems are divided into the following categories Power Hardware Connections and LEDs WiMAX Modem Access and Login Internet Access Phone Calls and VoIP Reset the WiMAX Modem to Its Factory Defaults 22 1 Power Hardware Connections and LEDs The WiMAX Modem does not turn on None of the LEDs turn on 1 Make sure you are using the power adapter or cord included with the WiMAX Modem 2 Make sure the power adapter or cord is connected to the WiMAX Modem and plugged in to an appropriate power source Make sure the power source is turned on 3 Disconnect and re connect the power adapter or cord to the WiMAX Modem 4 Ifthe problem continues contact the vendor One of the LEDs does not behave as expected 1 Make sure you understand the normal behavior of the LED See Section 1 2 1 on page 33 for more information User s Guide Chapter 22 Troubleshooting 2 Check the hardware connections See the Quick Start Guide 3 Inspect your cables for damage Contact the vendor to replace any damaged cables 4 Disconnect and re connect the power adapter to the WiMAX Modem
305. re 78 Certificate Details Certificate General Details Certification Path Show lt All gt Field Value E Subject nsa2401 ZyXEL E Public key RSA 1024 Bits Falsubject Key Identifier 04 21 66 cc a4 f6 4d 02 ff dc 9 FalAuthority Key Identifier KeyID 04 21 66 cc a4 f6 4d 0 I Thumbprint algorithm 4c 3c 5d 03 76 7d 8b 97 39 eb de 9a 07 2a 72 ef c2 la 6a 16 Copy to File 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields The secure method may very based on your situation Possible examples would be over the telephone or through an HTTPS connection 187 User s Guide Chapter 15 The Certificates Screens 188 User s Guide The Firewall Screens 16 1 Overview 16 1 1 16 1 2 Use the TOOLS gt Firewall screens to manage WiMAX Modem s firewall security measures Originally the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another The networking term firewall is a system or group of systems that enforces an access control policy between two networks It may also be defined as a mechanism used to protect a trusted network from an untrusted network Of course firewalls cannot solve every security problem A firewall is one of the mechanisms used to establish a network security perimeter in support of a network security policy
306. re breit Ero aid ur anni ds 65 x Bc Wee i EI Mod ert Tm 65 Boo pae uu Bec udstenidentecdituetrnt Qu temen bred in tpe tp Cum boc eu E Pei EPI DENS 66 mci tel RR 66 Ie CGIE RE cree ect 67 EMPTIS IR E E EO E SEE DUST 68 8 4 1 Pre Delined NIP Time Servers LIBE 1d pete pecie aa Re px CUR SR rnt rH Xr Id 69 om macie NE D DL 70 Part Ill Advanced SCSI Sivas scssccccssisssscensassccectecainnsseenansstdacannnnnnssnvnasaass 71 Chapter 7 The LAN Configuration SCreens ccccssseeecessseeeeeseseneeeesseeneeseeseneeeeenseneeeeseseeeeeesseeneeseesens 73 EXEECCSI LU IU EU UU UE 73 FA What You Can Don TIS hae iioii annaS D ta 73 12 User s Guide Table of Contents yl Wile You Mapd 19 KORE AE A E TA A E mRNA 73 raciru9i dcr qe coU 74 To ote DR F eec E 76 TAIP Sie Fe PIT T 77 MN F aaie Rout SEUD EE oT 78 PEED Rote 79 TO CEU a inl Mec eem e EONA EEN EA E EESE NES 80 7 8 1 IP Address and Subnet Mask ccisseccicassdsntcsaseleguadeenareendrasiecadeemaniideidaseixdageseaniesmaniaes 80 Tee Uren ae aati nsa ee ata eae bos a uen bead ua ce E LUE 81 TE GL Bie 2 Caen meer mr usce Ut an rod tee tomer es P aU UR GR EUN ras acu 81 TEA DNG Server PSG C 82 FAUX ani m I UNT 82 EX Ue met rer reer a err perros rrrrrr re rerreree tt pear ren tererrer S 83 Chapter 8 The WAN Configuration SOreGiiS sissie aaa aaea aaa D Ea ENEAN a 85 GNESCO S S a 85 8 1 3 What You Can De in This CIE scesa amni Dd sa reducat kd 85 51 2 What You N
307. refox 2 Cercate Naage quieta aviera dveRA ERR E uL a Po COGI p P Yn v ln 335 Figure 189 dI d 4 sgg det m 335 a 196 Bri o 2 TOOB MENU mE 336 i in micucpeseereloI qe TUR 336 Figure 188 Firefox e Geriioste Manager iau cusxdviddeso escena aaea iedeen dor Figure 189 Firefox 2 Delete Web Site Certificates 1useszcencektescunnauctutes eene petant ERE perc nnt DR nb ER Up nia 337 Figure 190 Opera 9 Certificate signer not TOWING uiui usas ni tametsi rates atcur da dk Dn cdd 338 Figure 191 Opera 8 Security IFIGFTRSEOIT ssc ctiesacdcasdnicancoesuleg Pao ordin t take eoo ient QUU Ae dIdos dae id dddbveu QU SECU IE 339 Foure 192 Dpsrm 9 Tels MENU usse ve ita PRORA S Mee LY RTRS RERO REPE Pr Er ERR o m Dd eI RR VENUS Qi V da 340 Figure 193 Opora 9 Pre 1 r0 ML 341 Figura 194 Opera 9 Certificate Manager sscctsncieiccecantedcccentendacccanunteisiadatesccerentetataamecacasuedeaciceemcteas 342 Fours 195 Opern 9 Import CentHC ANG nsns AAE nt b nous Rad d ber Ku 342 Figure 196 Opera 9 Install authority certificate sees ete endisse vana dee etti nii tore andas see Va apre ona kai 343 Figure 197 Opera 9 Imnetall authority Geltill Gelb eden ine ero Rae e cios eene te vete nk ue Fete sp eL une vu aa 343 Figure 199 Opera S Tools Menti sass caccrerss en sncsssas oi eet uu SR PUER oe RU LG RR EU MER DOR UR I ERN AME kot ER 344 Fone 10 Opera uic cin pcc erm 344 Figure 200 Opara 8 Cerificate RISBPIBEIBE sieros imati Usar a OG a aada aqaa eb a qat ug dois 345 Figure 201 K
308. ress 1 192 168 1 33 Coffee Bean 00 1f 5b ed 6c 7a 2 192 168 1 34 twpc13435 00 21 85 0c 44 1a Apply Refresh The following table describes the labels in this screen Table 10 SETUP gt DHCP Client LABEL DESCRIPTION This indicates the number of the item in this list IP Address This indicates the IP address of a connected client device Host Name This indicates the host name of a connected client device If the device is computer then the host name is the computer name MAC Address This indicates the MAC address of a connected client device User s Guide Chapter 6 The Setup Screens Table 10 SETUP gt DHCP Client continued LABEL DESCRIPTION Reserve This indicates whether the IP address for the connected client device is reserved When the DHCP server issues IP addresses reserved IPs are assigned to specific client devices If the IP address is reserved the client device identified by its MAC address will always receive this IP address from the DHCP server Apply Click to save your changes Refresh Click to refresh the information in the screen 6 4 Time Setting Click SETUP Time Setting to set the date time and time zone for the WiMAX Modem Figure 19 SETUP gt Time Setting Current Time and Date Current Time 01 36 28 Current Date 2008 07 08 Time and Date Setup Manual New Time hh mm ss 1 36 20 New Date yyyy mm dd
309. rinters etc needs an IP address to communicate across the network These networking devices are also known as hosts Subnet Mask The subnet mask specifies the network number portion of an IP address Your device will compute the subnet mask automatically based on the IP Address that User s Guide Chapter 6 The Setup Screens you entered You do not need to change the computer subnet mask unless you are instructed to do so Daytime A network protocol used by devices for debugging and time measurement A computer can use this protocol to set its internal clock but only if it knows in which order the year month and day are returned by the server Not all servers use the same format Time A network protocol for retrieving the current time from a server The computer issuing the command compares the time on its clock to the information returned by the server adjusts itself automatically for time zone differences then calculates the difference and corrects itself if there has been any temporal drift NTP NTP stands for Network Time Protocol It is employed by devices connected to the Internet in order to obtain a precise time setting from an official time server These time servers are accurate to within 200 microseconds 6 1 3 Before You Begin Make sure that you have made all the appropriate hardware connections to the WiMAX Modem as described in the Quick Start Guide Make sure that you have logged in to the w
310. rk ede RR aa 307 Figure 155 Network Number and Host ID uisus rt tun Er tnunu Eus aaU Eg cee Rua ae inaia 310 Figure 156 Subnetting Example Before Subnetting sess 313 Figure 157 Subnetting Example After Subnetting sessesssssseseseeeeeeeeeennneeeennn nnn 314 Figure 158 Conflicting Computer IP Addresses Example 0 ccccceessceceeeeeeeeeeececeeeeeaaeeceeeeeeeaeeesenees 319 Figure 159 Conflicting Computer IP Addresses Example sss 319 Figure 160 Conflicting Computer and Router IP Addresses Example sssseess 320 Figure 161 Internet Explorer 7 Certification Eror susirado EP EE qua Sua Peru oo REE Ue xS PRAE 322 Figure 162 Intemet Explorer 7 Certification EFON secare rop Rene ideene anra iiaa 322 Figure 163 Intemet Explorer 7 Certificate Biter ica nics ssc sides dba Dias d rais amd ui ai 323 Figure 164 Internet Explorer 7 Cerificate iresiscdee eteddatbre tins ieaie aik neue vu dnte beau gd npud 323 Figure 165 Internet Explorer 7 Certificate Import Wizard cececceceeteeeeeeeeeeeaeeeeeneeeseaaeeeseneeessaeeeteeees 324 Figure 166 Internet Explorer 7 Certificate Import Wizard ssssssssssseneeneeenennen 324 Figure 167 Internet Explorer 7 Certificate Import Wizard sssssssssssseeneneennenn 325 22 User s Guide List of Figures Figure 168 Internet Explorer 7 Select Certificate Store o oo
311. rnet Connection Wizard gt Complete 1 ec isakt enda cic q edis baud daran dat 46 Figure Ti electa NS Heu E 47 Figure 12 VoIP Connection gt First Voice Account Settings cccceesceceeeeeeeeneeeeeeeeeeeeaeseeeeeeseaeseeeeeeess 48 Figure 13 YolP Connection SIP Registration Test ierit toti patr totae dan be Gud dE gk eee p ERE EP Fe erein 49 Figure T4 vol Connection SIP Registration Pall unice sarai pne pera e pne Ere ap nn pepe aaa 50 Figure 15 VolP Connection FINE sisaan uoo ud n kt earned bon eda iue pea b d dw e da 50 Fige 16 Phone Oall ESampiE dece sndatiacedaiaaignchoindat seesecge dam aatdexicentudasuetatniecaubeeaadmta ieee 59 acres 17 SETUP ae IP RiGee Leoben a seb ande pacata pa rd d ae o ada n Pd 66 Figure 18 SETUP s DHCP THU ce ci cactitlag patti D pO oa Rib EURas dub a DR oni aie d lua a UE d dirae a 67 Figure 19 SETUP gt TIME SEI iuecisccsssctiectecoe Rite RRRe FER onte ee SI uan eia DM Reds RN E ES 68 Figure 20 ADVANCED gt LAN Configuration gt DHCP Setup sese 74 Figure 21 ADVANCED gt LAN Configuration gt Static DHCP ssesssseseeeeeeeennnnn tne 76 Figure 22 Advanced LAN Configuration gt IP Static Route sssssssssseeeeeeeenenrerennes T7 Figure 23 Advanced LAN Configuration gt IP Static Route Setup sssssssssssess 78 Figure 24 ADVANCED gt LAN Configuration gt Other Settings ssssseseeeeeneeenee 79 Figure 25 WiMa
312. rovider The WiMAX Modem sends your call to a VoIP service provider s SIP server which forwards your calls to either Vol P or PSTN phones Figure 3 WiMAX Modem s VoIP Features Calls via VoIP Service Provider 32 User s Guide Chapter 1 Getting Started 1 2 WiMAX Modem Hardware Follow the instructions in the Quick Start Guide to make hardware connections 1 2 1 LEDs The following figure shows the LEDs lights on the WiMAX Modem Figure 4 The WiMAX Modem s LEDs ACTIVITY INDICATOR STRENGTH INDICATORS The following table describes your WiMAX Modem s LEDs from right to left Table 2 The WiMAX Modem LED STATE DESCRIPTION Power IDU Off The WiMAX Modem is not receiving power only Green The WiMAX Modem is receiving power and functioning correctly Strength The Strength Indicator LEDs display the Received Signal Strength Indicator Indication RSSI of the wireless WiMAX connection 5 Signal LEDs The signal strength is greater than or equal to 59 4 Signal LEDs The signal strength is between 69 and 60 3 Signal LEDs The signal strength is between 79 dBm and 70 2 Signal LEDs The signal strength is between 89 and 80 dBm 1 Signal LED The signal strength is between 90 and 95 dBm 0 Signal LEDs There is no WiMAX connection User s Guide EJ Chapter 1 Getting Started Table 2 The WiMAX Modem LED STAT
313. rst call is online and the second call is on hold Pressing the flash key again will recreate the three way conversation The next time you press the flash key the second call is online and the first call is on hold Hang up the phone to drop the connection User s Guide 157 Chapter 13 The Phone Screens User s Guide 14 1 14 1 1 14 1 2 The Phone Book Screens Overview The VOICE gt Phone Book screens allow you to configure the WiMAX Modem s phone book for making VoIP calls What You Can Do in This Chapter The Incoming Call Policy screen Section 14 2 on page 160 lets you maintain rules for handling incoming calls You can block redirect or accept them The Speed Dial screen Section 14 3 on page 162 lets you add edit or remove speed dial entries What You Need to Know The following terms and concepts may help as you read through this chapter Speed Dial and Peer to Peer Calling Speed dial provides shortcuts for dialing frequently used VoIP phone numbers It is also required if you want to make peer to peer calls In peer to peer calls you call another VoIP device directly without going through a SIP server In the WiMAX Modem you must set up a speed dial entry in the phone book in order to do this Select Non Proxy Use IP or URL in the Type column and enter the callee s IP address or domain name The WiMAX Modem sends SIP INVITE requests to the peer VolP device when you use the
314. rst party cookies that use personally identifiable information without implicit consent Pop up Blocker S Prevent most pop up windows from appearing i 3 Typethe IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites Figure 148 Pop up Blocker Settings Pop up Blocker Settings Exceptions Pop ups are currently blocked You can allow pop ups from specific Web sites by adding the site to the list below Address of Web site to allow http 192 168 1 1 Allowed sites Notifications and Filter Level Play a sound when a pop up is blocked Show Information Bar when a pop up is blocked Filter Level Medium Block most automatic pop ups Pop up Blocker FAQ 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of the web configurator do not display properly in Internet Explorer check that J avaScripts are allowed User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 149 Internet Options Security AE General Security Privacy Content Connections Programs Advanced Select a Web content zone
315. rt 21 for FTP The Blocked Services window updates accordingly Blocked Services CU SEEME TCP UDP 7648 24032 HTTP TCP 80 4 Next configure the Schedule to Block area with the days and hours for blocking web access to your employees Schedule to Block Day to Block CI Everyday C sun v Mon v Tue v wed v Thu M rri O sat Time of Day to Block 24 Hour Format O All day From Start 3 hour 30 min End 20 hour 30 min In this example the five weekly work days are selected as well as the standard work hours of 3 30 PM to 8 30 PM or 20 30 in 24 hour format 5 Finally click Apply to save your settings User s Guide Chapter 5 Tutorials 5 2 4 Blocking Web Sites by Keyword You can further refine web access by specifying keywords that appear in a URL and blocking them This allows you to control the content you do allow to pass through the WiMAX Modem For example once your daughter s designated study hours end you allow web access and video chat but want to restrict certain sites n u Goal Restrict websites with the words poker sex and beer in their URLs See Also Chapter 17 on page 199 1 Open the TOOLS gt Content Filter gt Filter screen Trusted IP Setup A trusted computer has full access to all blocked resources 0 0 0 0 means there is no trusted computer Trusted Computer IP Address 0 0 0 0 Restrict Web Features L Activex C Java Cookies Web
316. rver fields in the SYSTEM General screen If the ISP did not give you DNS server information leave the DNS Server fields in the SYSTEM General screen set to 0 0 0 0 for the ISP to dynamically assign the DNS server IP addresses User s Guide Chapter 11 The System Configuration Screens 11 2 General Click ADVANCED gt System Configuration gt General to change the WiMAX Modem s mode set up its system name domain name idle timeout and administrator password Figure 51 ADVANCED gt System Configuration gt General System Setup System Name Domain Name Administrator Inactivity Timer 0 minutes 0 means no timeout Password Setup Old Password oes New Password Retype to Confirm rm The following table describes the labels in this screen Table 38 ADVANCED gt System Configuration gt General LABEL DESCRIPTION System Setup System Name Enter your computer s Computer Name This is for identification purposes but some ISPs also check this field This name can be up to 30 alphanumeric characters long Spaces are not allowed but dashes and underscores are accepted Domain Name Enter the domain name entry that is propagated to DHCP clients on the LAN If you leave this blank the domain name obtained from the ISP is used Use up to 38 alphanumeric characters Spaces are not allowed but dashes and periods are accepted Administrator Enter the number of minu
317. ry certificates before adding more certificates The number of the item in this list Name This field displays the name used to identify this certificate Subject This field displays identifying information about the certificate s owner such as CN Common Name OU Organizational Unit or department O Organization or company and C Country It is recommended that each certificate have unique subject information 178 User s Guide Chapter 15 The Certificates Screens Table 63 TOOLS gt Certificates gt Trusted CAs continued LABEL DESCRIPTION Issuer This field displays identifying information about the certificate s issuing certification authority such as a common name organizational unit or department organization or company and country With self signed certificates this is the same information as in the Subject field Valid From This field displays the date that the certificate becomes applicable The text displays in red and includes a Not Yet Valid message if the certificate has not yet become applicable Valid To This field displays the date that the certificate expires The text displays in red and includes an Expiring or Expired message if the certificate is about to expire or has already expired CRL Issuer This field displays Yes if the certification authority issues CRL Certificate Revocation Lists for the certificates that it has issued and you have selected the Check
318. s by SIP SIP Phone Number The listed SIP account s registration was deleted from the SIP register server SIP UnRegistration Fail by SIP SIP Phone Number An attempt to delete the listed SIP account s registration from the SIP register server failed Table 99 RTP Logs LOG MESSAGE DESCRIPTION Error RTP init fail The initialization of an RTP session failed Error Call fail RTP connect fail A VoIP phone call failed because the RTP session could not be established Error RTP connection cannot close The termination of an RTP session failed User s Guide Chapter 20 The Logs Screens Table 100 FSM Logs Caller Side LOG MESSAGE DESCRIPTION VoIP Call Start Ph Phone Port Number Outgoing Call Number Someone used a phone connected to the listed phone port to initiate a VoIP call to the listed destination VoIP Call Established Ph Phone Port gt Outgoing Call Number Someone used a phone connected to the listed phone port to make a VoIP call to the listed destination VoIP Call End Phone Phone Port A VoIP phone call made from a phone connected to the listed phone port has terminated Table 101 FSM Logs Callee Side LOG MESSAGE DESCRIPTION VoIP Call Start from SIP SIP Port Number A VoIP phone call came to the WiMAX Modem from the listed SIP number VoIP Call Established Ph Phone Port
319. s by examining VLAN Virtual Local Area Network tags These tags must be added to the data packets by a switch on the LAN In the following example two users A and B are connected to a switch C A and B are connected to different ports on the switch port 1 and port 2 A and B send untagged packets to the switch The switch adds tags to packets depending on the physical port on which they arrive Packets arriving on port 1 are given a VLAN ID VLAN Dentifier of 1 and packets arriving on port 2 are given a VLAN ID of 2 When the packets reach the WiMAX Modem D their source is identified by examining their VLAN tags Figure 34 Identifying Users PORT 1 VLAN 1 A PORT 2 VLAN 2 SS PORT 1 Ty 13 User s Guide Chapter 9 The VPN Transport Screens 9 1 3 Before You Begin Before you start configuring your WiMAX Modem to use VPN transport ensure that you have the following from the service provider The IP address or domain name of the service provider s edge router Virtual circuit VC labels for each Ethernet Pseudowire you want to create Also make sure that you know the VLAN IDs Virtual LAN IDentifiers of the VLANs on your LAN 9 2 General Click ADVANCED gt VPN Transport to turn VPN transport on or off and to set the VPN transport endpoint your service provider s router Figure 35 ADVANCED gt VPN Transport gt General L2 L3 VPN Transport G
320. ssdesedalecehbebeiesatsaceiadeebeateadgacnas 206 Figure SO SNMP Management Modal 1r irt bcr iaa t E Eta ces bae ae c RR VAR RA tus 207 Figure 91 TOOLS gt Remote Management gt SNMP sssssssssissse esses nennen nennt tinta nnn trnnnn 209 Figure 92 TOOLS gt Remote Management s DNG uccccoe secco rote co epo se sura b erasure tege e peacK Ese PELIS 210 Figure 93 TOOLS gt Remote Management gt Security nennen 211 grs ldcActelu ce EE o o o ETT 212 Figure 55 TOOLS gt Remote Management gt TROBO eei iacit brche ol Eisen oa ard veis Maa p at a 213 gk GS d o1 7 TN MT TT TONS 215 gom 97 Opss REI SUNS Me mm 216 Figure 98 QoS gt Class Setup gt Class Configuration sssrinin na s a a 217 Figuio do TOOLS gt LOJE VIEW LOGS aisiisodusisso adr pazc Dn dpi bois banc bmc cO sex Ra OR d Ea 221 Figure 100 TOOLS Logs Log SAWING sericsson ue ante eat 223 Hous TOi STAIN qe NN D 235 Foue 10 gt Packet Aes casus ea e On Okt A 239 Figure 109 WIMAX StS eni 241 Poed DROP TAU aiai ieia Sia kaiaa case dh S AA Cua adn bp 242 Poue 109 VoF oi E ett rr PT 243 PS TOB INA PTOS naicdsstinibadet phai REO ecd SCHON ER hn e RD SE MT Dag A Mq iaananeenia cee 245 Figure 107 Windows XPSIBITE MEDU aisdsstcomuutepetk pauenp ic dudaxi ac a anta tun EEUU Kk nan Ru Cr Lad ai E t ue 272 Figure 108 Windows XAP Contor Panel eL M 272 Figure 109 Windows XP Control Panel gt Network Connections gt Properties s es 273
321. sseesenmeteene eterne rnt eens 105 Figure 42 ADVANCED gt VPN Transport gt Ethernet Pseudowire Setup sssssesssss 106 Figure 43 ADVANCED gt VPN Transport gt Statistics serisinin daei 107 Figure 44 ADVANCED gt NAT Configuration gt General eese eene 109 Figure 45 Multiple Servers Behind NAT Example sssessssissessesssseeeneee nennen enne nnne nnn 111 Figure 46 ADVANCED gt NAT Configuration gt Port Forwarding essseseeeeeeennnee 111 Figure 47 ADVANCED gt NAT Configuration gt Port Forwarding gt Rule Setup sssssss 113 Figure 48 ADVANCED gt NAT Configuration gt Trigger Port 114 Figure 49 Trigger Port Forwarding Exaile ocean e ono tree E tte tmn epe CE N 115 Figure 50 ADVANCED gt NAT Configuration gt ALG ius eee rr imer enc c d e nc ee 117 Figure 51 ADVANCED gt System Configuration gt General sese 121 Figure 52 ADVANCED gt System Configuration gt Dynamic DNS sse 123 Figure 53 ADVANCED gt System Configuration gt Firmware sssssssssseseseeeeenen nene 124 Figure 54 ADVANCED gt System Configuration gt Configuration ssssseeeneene 126 Figure 55 ADVANCED gt System Configuration gt Restart sssssssssssssseseeeeeen enne 127 Figure 56 VOICE gt Service Configuration gt SIP Setting iioii reitera da d eda dta ttt ska
322. t Protocol RTP RFC 1890 Real time Transport Control Protocol RTCP RFC 2030 Simple Network Time Protocol RFC 2104 HMAC Keyed Hashing for Message Authentication RFC 2131 Dynamic Host Configuration Protocol RFC 2401 Security Architecture for the Internet Protocol RFC 2409 Internet Key Exchange RFC 2475 Architecture for Differentiated Services Diffserv RFC 2617 Hypertext Transfer Protocol HTTP Authentication Basic and Digest Access Authentication RFC 2782 A DNS RR for specifying the location of services DNS SRV RFC 2833 Real time Transport Protocol Payload for DTMF Digits Telephony Tones and Telephony Signals RFC 2976 The SIP INFO Method RFC 3261 Session Initiation Protocol SIP version 2 RFC 3262 Reliability of Provisional Responses in the Session Initiation Protocol SIP RFC 3263 Session Initiation Protocol SIP Locating SIP Servers RFC 3264 An Offer Answer Model with the Session Description Protocol SDP RFC 3265 Session Initiation Protocol SIP Specific Event Notification RFC 3323 A Privacy Mechanism for SIP RFC 3325 Private Extensions to the Session Initiation Protocol SIP for Asserted Identity within Trusted Networks RFC 3550 RTP A Real Time Protocol for Real Time Applications RFC 3581 An Extension to the Session Initiation Protocol SIP for Symmetric Response Routing RFC 3611 RTP Control Protocol Extended Reports RTCP XR XR RFC 3715 IP Sec NAT Compatibility RFC 3842 A Message Summary and Message
323. t Ubuntu 8 installation Note Make sure you are logged in as the root administrator Follow the steps below to configure your computer IP address in GNOME User s Guide Appendix B Setting Up Your Computer s IP Address 1 Click System Administration Network E Preferences Help ands z E Hardware Drivers elp and Support De Hardware Testing About GNOME Language Support 6 About Ubuntu m sus m 53 Network Tools 2 When the Network Settings window opens click Unlock to open the Authenticate window By default the Unlock button is greyed out until clicked You cannot make changes to your configuration unless you first enter your admin password Figure 131 Ubuntu 8 Network Settings Connections Fal ISSUES Settings x Location lt Connections General DNS Hosts Eg ds Properties Point to point connec This network interface is not c User s Guide 287 Appendix B Setting Up Your Computer s IP Address 3 Inthe Authenticate window enter your admin account name and password then click the Authenticate button Figure 132 Ubuntu 8 Administrator Account Authentication Q Authenticate x gt System policy prevents modifying the configuration An application is attempting to perform an action that requires privileges Authentication as one of the users below is required to perform this a
324. t click a network connection click Status and then click the Support tab to view your IP address and connection information 274 User s Guide Appendix B Setting Up Your Computer s IP Address Windows Vista This section shows screens from Windows Vista Professional 1 Click Start gt Control Panel Figure 112 Windows Vista Start Menu Dr eye 7 0 Professional Connect To ES Media Player Classic gt All Programs 7 2 Inthe Control Panel click the Network and Internet icon Figure 113 Windows Vista Control Panel Fere ees GS gt Control Panel gt 1 Pp File Edit View Tools Help Control Panel Home System and Maintenance User Accounts sic V n Classic View Get started with Windows Q8 Change account type Back up your computer Sai Appearance and ecuri cw ANM As Personalization E Allo wa program through Windows Change desktop background Allow g gh Windows s B sd Change the color scheme Firewall Adjust screen resolution etwork and Internet Connect to the Internet Clock Language and Region View network status and tasks I Change keyboards or other input methods Set up file sharin is Change display language 3 Click the Network and Sharing Center icon Figure 114 Windows Vista Network And Internet CION E Control Panel p Network and Internet p v 5 Search File Edit View Tools H
325. t least 20 cm must be maintained between the antenna of this device and all persons WIR EUIS EUER ar I TT EEEE PHAR AUS at ah ZR ES JEREOT RI AE ERE BIE Mae Be EES TIA TSS es EH rl se ZEEE User s Guide Appendix H Legal Information B TUR BARAER 8H LE CT Ss RAR PEARS EISH ice 8 RSE De BE TAG EEREN REL AREE ESSA SE REUS rf CLR EUR Be eee Fd IBC ST E Ra OZ TER gt MZN sie E REN FEE AET PERO E PEE PSE SAMOS a ZOE AL ae ar Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This Class B digital apparatus complies with Canadian I CES 003 Cet appareil num rique de la classe B est conforme la norme NMB 003 du Canada Viewing Certifications 1 Goto http www zyxel com 2 Select your product on the ZyXEL home page to go to that product s page 3 Select the certification you wish to view from this page ZyXEL Limited Warranty
326. t yet changed your password It is highly recommended you change the default password Enter a new password retype it to confirm and click Apply alternatively click I gnore to proceed to the main menu if you do not want to change the password now MAX 306M1 Enter a New Password Your device is currently using the factory default password To protect your network from unauthorized access you should change your password at this time Select a new password that is easy for you to remember yet difficult for would be intruders to guess We suggest that you combine text with numbers to make it even more difficult to crack Your new password may contain up to a maximum of 30 letters numerals and any printable character found on a typical English language keyboard New Password Confirm Password max 30 alphanumeric printable characters and no spaces Laow Cinel User s Guide Chapter 2 Introducing the Web Configurator 6 A screen displays to let you choose to go to the Wizard or the Advanced screens Click Go to Wizard setup if you are logging in for the first time or if you want to make basic changes The wizard selection screen appears after you click it See Chapter 3 on page 41 for more information Click Go to Advanced setup if you want to configure features that are not available in the wizards The main screen appears after you click it See Chapter 6 on page 65 for more information MAX 306M1 Select a M
327. tO Cp aera 200 T2 NE oiu A T ere tis oer sere ett A eee rereer temere deb MI Ea dud 202 Chapter 18 The Remote Management Screens ueeseeeeeeee eese eee eene nnne nennen nnnm nnn nn nnn nnn 203 pOWESS 0 SNNT 203 18 1 1 What You Can Do in This Chapter seapraad aans 203 181 2 What YOU Neb T9 ROM uis ts axed cette sweat pe USE Re TRUE UBER acadeasttaasedinerd ate ae usu a tees 204 cR Np MT NES S TD D 205 pO 3 00 RES ETE 206 DE gj qe PH S 206 jy regem eT NTC Tr 207 1E o SAMP TADS mc 208 Im 2 SNME OOS boe eric iet bn in rna o GO qb en xd Rob LA d E 209 ign e TET 210 jac rj ee M 211 PN I CUN NUNT Pears dae ER NM NR 212 Chapter 19 su IM 215 JEN EE i c EE EQUI HINTEN NEN 215 User s Guide Table of Contents 12 2 ENS sneku ian iain atin eo ERA A eA RAEN 215 TR oN EDI a a A Dock fiu T rbd rado Sacre pa ra pna bodies Fue d Da pb 216 DIM Ee tix uis c m 217 Chapter 20 The go 219 COM EG T MATIS EET TETTE 219 20 1 1 What You Can Do in This Chapter iocis tutt indue SE EXER MERE n tYIo a 219 20 1 2 What Tou Need To RION sazescsicsiasiaats nad ra e pires ero re ad vas ped vid a eee Hr R RR 219 Be RN qs eI sacnabte uumiatin aed ulide dactubkin ducmeutly oa Gumuaayuass 221 PS Es oke eue o
328. table ASCII characters Anonymous Enter the anonymous identity provided by your Internet Service Identity Provider Anonymous identity also known as outer identity is used with EAP TTLS encryption The anonymous identity is used to route your authentication request to the correct authentication server and does not reveal your real user name Your real user name and password are encrypted in the TLS tunnel and only the anonymous identity can be seen Leave this field blank if your ISP did not give you an anonymous identity to use User s Guide Chapter 8 The WAN Configuration Screens Table 19 ADVANCED gt WAN Configuration gt Internet Connection gt ISP Parameters for Internet Access continued LABEL DESCRIPTION PKM This field displays the Privacy Key Management version number PKM provides security between the WiMAX Modem and the base station At the time of writing the WiMAX Modem supports PKMv2 only See the WiMAX security appendix for more information Authentication This field displays the user authentication method Authentication is the process of confirming the identity of a mobile station by means of a username and password for example Check with your service provider if you are unsure of the correct setting for your account Choose from the following user authentication methods TTLS Tunnelled Transport Layer Security TLS Transport Layer Security Note Not all WiMAX Mod
329. tatus Screen Table 103 Status continued LABEL DESCRIPTION WiMAX State This field displays the status of the WiMAX Modem s current connection INIT the WiMAX Modem is starting up DL SYN The WiMAX Modem is unable to connect to a base station RANGING the WiMAX Modem and the base station are transmitting and receiving information about the distance between them Ranging allows the WiMAX Modem to use a lower transmission power level when communicating with a nearby base station and a higher transmission power level when communicating with a distant base station CAP NEGO the WiMAX Modem and the base station are exchanging information about their capabilities AUTH the WiMAX Modem and the base station are exchanging security information REGIST the WiMAX Modem is registering with a RADIUS server OPERATI ONAL the WiMAX Modem has successfully registered with the base station Traffic can now flow between the WiMAX Modem and the base station e IDLE the WiMAX Modem is in power saving mode but can connect when a base station alerts it that there is traffic waiting Bandwidth This field shows the size of the bandwidth step the WiMAX Modem uses to connect to a base station in megahertz MHz CINR mean This field shows the average Carrier to Interference plus Noise Ratio of the current connection This value is an indication of overall radio signal quality A higher value indicates a
330. tes a management session can be left idle Inactivity Timer before the session times out After it times out you have to log in again A value of 0 means a management session never times out no matter how long it has been left idle This is not recommended Long idle timeouts may have security risks The default is five minutes Password Setup Old Password Enter the current password you use to access the WiMAX Modem New Password Enter the new password for the WiMAX Modem You can use up to 30 characters As you type the password the screen displays an asterisk for each character you type User s Guide 121 Chapter 11 The System Configuration Screens Table 38 ADVANCED gt System Configuration gt General continued LABEL DESCRIPTION Retype to Enter the new password again Confirm Apply Click to save your changes Reset Click to restore your previously saved settings 11 3 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you in NetMeeting CU SeeMe etc You can also access your FTP server or Web site on your own computer using a domain name for instance myhost dhs org where myhost is a name of your choice that will never change instead of using an IP address that changes each time you reconnect Your friends or relatives will always be able to call you even if the
331. the ISP may assign a domain name via DHCP The domain name entered by you is given priority over the ISP assigned domain name Back Click to display the previous screen Next Click to proceed to the next screen Close Click to close the wizard without saving User s Guide Chapter 3 Internet Connection Wizard 3 1 3 Authentication Settings This Internet Connection Wizard screen allows you to configure your Internet access settings The settings here correspond to the ADVANCED gt WAN Configuration gt Internet Connection screen see Section 8 2 on page 88 for more information Figure 8 Internet Connection Wizard gt Authentication Settings Screen Authentication Settings Enter the required settings as issued by your ISP User Name myuser asb com Password eececcece Anonymous Identity anonymous asb com PKM PKMV2 Authentication TTLS TTLS Inner EAP CHAP v Certificate auto generated self signed cert v The following table describes the labels in this screen Table6 Internet Connection Wizard Authentication Settings Screen LABEL DESCRIPTION Authentication User Name Use this field to enter the username associated with your Internet access account You can enter up to 61 printable ASCII characters Password Use this field to enter the password associated with your Internet access account You can enter up to 47 printable ASCII characters
332. the flash key User s Guide Chapter 13 The Phone Screens If you have another call press the flash key and then 2 to switch back and forth between caller A and B by putting either one on hold Press the flash key and then 0 to disconnect the call presently on hold and keep the current call on line Press the flash key and then 1 to disconnect the current call and resume the call on hold If you hang up the phone but a caller is still on hold there will be a remind ring European Call Waiting allows you to place a call on hold while you answer another incoming call on the same telephone directory number If there is a second call to a telephone number you will hear a call waiting tone Take one of the following actions Reject the second call Press the flash key and then press 0 Disconnect the first call and answer the second call Either press the flash key and press 1 or just hang up the phone and then answer the phone after it rings Put the first call on hold and answer the second call Press the flash key and then 2 European Call Transfer allows you to transfer an incoming call that you have answered to another phone To do so 1 Press the flash key to put the caller on hold 2 When you hear the dial tone dial 98 followed by the number to which you want to transfer the call to operate the Intercom 3 After you hear the ring signal or the second party answers
333. tings LABEL DESCRIPTION E mail Log Settings Mail Server Enter the server name or the IP address of the mail server the WiMAX Modem should use to e mail logs and alerts Leave this field blank if you do not want to send logs or alerts by e mail Mail Subject Enter the subject line used in e mail messages the WiMAX Modem sends Send Log to Enter the e mail address to which log entries are sent by e mail Leave this field blank if you do not want to send logs by e mail Send Alerts to Enter the e mail address to which alerts are sent by e mail Leave this field blank if you do not want to send alerts by e mail Log Schedule Select the frequency with which the WiMAX Modem should send log messages by e mail Daily Weekly Hourly When Log is Full None If the Weekly or the Daily option is selected specify a time of day when the E mail should be sent If the Weekly option is selected then also specify which day of the week the E mail should be sent If the When Log is Full option is selected an alert is sent when the log fills up If you select None no log messages are sent Day for Sending Log This field is only available when you select Weekly in the Log Schedule field Select which day of the week to send the logs Time for Sending Log This field is only available when you select Daily or Weekly in the Log Schedule field Enter the time of day in 24 hour format for
334. tion sheet when s he signs up If your ISP gives you the DNS server addresses enter them in the DNS Server fields in DHCP Setup otherwise leave them blank Some ISPs choose to pass the DNS servers using the DNS server extensions of PPP IPCP IP Control Protocol after the connection is up If your ISP did not give you explicit DNS servers chances are the DNS servers are conveyed through PCP negotiation The WiMAX Modem supports the IPCP DNS server extensions through the DNS proxy feature If the Primary and Secondary DNS Server fields in the LAN Setup screen are not specified for instance left as 0 0 0 0 the WiMAX Modem tells the DHCP clients that it itself is the DNS server When a computer sends a DNS query to the WiMAX Modem the WiMAX Modem forwards the query to the real DNS server learned through IPCP and relays the response back to the computer Please note that DNS proxy works only when the ISP uses the IPCP DNS server extensions It does not mean you can leave the DNS servers out of the DHCP setup under all circumstances If your ISP gives you explicit DNS servers make sure that you enter their IP addresses in the LAN Setup screen This way the WiMAX Modem can pass the DNS servers to the computers and the computers can query the DNS server directly without the WiMAX Modems s intervention 7 6 5 RIP Setup RIP Routing Information Protocol allows a router to exchange routing information with other routers The RIP Direction fi
335. tions you set in these screens Enter the IP address of Address the trusted computer Restrict Web Select the web features you want to disable If a user downloads a page Features with a restricted feature that part of the web page appears blank or grayed out ActiveX This is a tool for building dynamic and active Web pages and distributed object applications When you visit an ActiveX Web site ActiveX controls are downloaded to your browser where they remain in case you visit the site again Java This is used to build downloadable Web components or Internet and intranet business applications of all kinds Cookies This is used by Web servers to track usage and to provide service based on ID Web Proxy This is a server that acts as an intermediary between a user and the Internet to provide security administrative control and caching service When a proxy server is located on the WAN it is possible for LAN users to avoid content filtering restrictions Keyword Blocking Enable URL Select this if you want the WiMAX Modem to block Web sites based on Keyword words in the web site address For example if you block the keyword Blocking bad http www website com bad html is blocked Keyword Type a keyword you want to block in this field You can use up to 128 printable ASCII characters There is no wildcard character however Add Click this to add the specified Keyword to the Keyword List You can enter up to 1
336. to specify its security settings O Internet Local intranet Trusted sites Restricted sites f This zone contains all Web sites you BE haven t placed in other zones m Security level for this zone Move the slider to set the security level for this zone 5 Medium Safe browsing and still functional Prompts before downloading potentially unsafe content Unsigned ActiveX controls will not be downloaded Appropriate for most Internet sites C Custom Level Default Level OK Cancel Apply 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that Enable is selected the default User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 6 Click OK to close the window Figure 150 Security Settings Java Scripting Security Settings d 1 KT x Settings 5 Scripting B Active scripting Grom 3 Allow paste operations via script Q Disable 9 Enable Q Prompt E Scripting of Java applets Q Disable O Prompt v Llenar Anukhankie skinn af m Reset custom settings Reset to Medium Reset ced Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 UnderJava permissions make sur
337. to your local network firewall rules The default is to block all traffic from the Internet to your local network How can you forward certain WAN to LAN traffic You may allow traffic originating from the WAN to be forwarded to the LAN by Configuring NAT port forwarding rules Configuring WAN or LAN amp WAN access for services in the Remote MGMT screens or SMT menus When you allow remote management from the WAN you are actually configuring WAN to WAN WiMAX Modem firewall rules WAN to WAN WiMAX Modem firewall rules are Internet to the WiMAX Modem WAN interface firewall rules The default is to block all such traffic When you decide what WAN to LAN packets to log you are in fact deciding what WAN to LAN and WAN to WAN WiMAX Modem packets to log Forwarded WAN to LAN packets are not considered alerts 16 2 2 Triangle Route When the firewall is on your WiMAX Modem acts as a secure gateway between your LAN and the Internet In an ideal network topology all incoming and outgoing network traffic passes through the WiMAX Modem to protect your LAN against attacks Figure 80 Ideal Firewall Setup User s Guide Chapter 16 The Firewall Screens 16 2 3 General Options Click TOOLS gt Firewall gt General to configure the basic settings for your firewall Figure 81 TOOLS gt Firewall gt General C Enable Firewall Packet Direction LAN to WAN WAN to LAN CI Bypass Triangle Route Make sure this
338. try code feature when you move the WiMAX Modem from one country to another Do not Disturb This feature allows you to set your phone not to ring when someone DnD calls you You can set each phone independently using its keypad or configure global settings for all phones using the command line interpreter Auto Dial You can set the WiMAX Modem to automatically dial a specified number immediately whenever you lift a phone off the hook Use the Web Configurator to set the specified number Use the command line interpreter to have the WiMAX Modem wait a specified length of time before dialing the number Phone config The phone configuration table allows you to customize the phone keypad combinations you use to access certain features on the WiMAX Modem such as call waiting call return call forward etc The phone configuration table is configurable in command interpreter mode Firmware update If your service provider uses this feature you hear a recorded enable disable message when you pick up the phone when new firmware is available for your WiMAX Modem Enter 99 in your phone s keypad to have the WiMAX Modem upgrade the firmware or enter 99 to not upgrade If your service provider gave you different numbers to use enter them instead If you enter the code to not upgrade you can make a call as normal You will hear the recording again each time you pick up the phone until you upgrade User s
339. ty provided by your Internet Service Provider Anonymous identity also known as outer identity is used with EAP TTLS encryption PKM This field displays the Privacy Key Management version number PKM provides security between the WiMAX Modem and the base station See the WiMAX security appendix for more information Authentication This field displays the user authentication method Authentication is the process of confirming the identity of a user by means of a username and password for example EAP TTLS allows an MS SS and a base station to establish a secure link or tunnel with an AAA Authentication Authorization and Accounting server in order to exchange authentication information See the WiMAX security appendix for more details User s Guide Chapter 21 The Status Screen Table 108 The WiMAX Profile Screen continued LABEL DESCRIPTION TTLS Inner EAP This field displays the type of secondary authentication method Once a secure EAP TTLS connection is established the inner EAP is the protocol used to exchange security information between the mobile station the base station and the AAA server to authenticate the mobile station See the WiMAX security appendix for more details The WiMAX Modem supports the following inner authentication types CHAP Challenge Handshake Authentication Protocol MSCHAP Microsoft CHAP e MSCHAPV2 Microsoft CHAP version 2 PAP Passwo
340. uistypically used in North America and Japan G 723 provides good voice quality and requires 20 or 40 kbps G 729 requires only 8 kbps The WiMAX Modem must use the same codec as the peer When two SIP devices start a SIP session they must agree on a codec For more on voice compression see Voice Coding on page 135 DTMF Mode Control how the WiMAX Modem handles the tones that your telephone makes when you push its buttons You should use the same mode your VoIP service provider uses e RFC 2833 send the DTMF tones in RTP packets PCM send the DTMF tones in the voice data stream This method works best when you are using a codec that does not use compression like G 711 Codecs that use compression like G 729 can distort the tones SIP INFO send the DTMF tones in SIP messages User s Guide Chapter 12 The Service Configuration Screens Table 44 VOICE gt Service Configuration gt SIP Settings gt Advanced continued LABEL DESCRIPTION STUN Active Select this if all of the following conditions are satisfied There is a NAT router between the WiMAX Modem and the SIP server The NAT router is not a SIP ALG Your VoIP service provider gave you an IP address or domain name for a STUN server Otherwise clear this field Server Address Enter the IP address or domain name of the STUN server provided by your VoIP service provider Server Port Enter th
341. utomatically Ask me every time View Certificates 1 Revocation Lists User s Guide Appendix E Importing Certificates 3 In the Certificate Manager dialog box click Web Sites gt I mport Figure 184 Firefox 2 Certificate Manager EER Certificate Manager r Your Certificates Other Peopldis Web Sites Alithorities You have certificates on file that identify these web sites Purposes Certificate Name 4 Usethe Select File dialog box to locate the certificate and then click Open Figure 185 Firefox 2 Select File PR Select File containing Web Site certificate to import in 8 Desktop E My Computer i My Documents my Network Places ES CA cer My Network Places Files of type Cettficate Files 5 The next time you visit the web site click the padlock in the address bar to open the Page Info gt Security window to see the web page s security information EJ User s Guide Appendix E Importing Certificates Removing a Certificate in Firefox 1 2 This section shows you how to remove a public key certificate in Firefox 2 Open Firefox and click TOOLS gt Options Figure 186 Firefox 2 Tools Menu Web Search Downloads Add ons Java Console Error Console Page Info Clear Private Data Ctrl Shift Del N Options In the Options dialog box click ADVANCED gt Encryption gt View Certificates
342. vices field A custom port is a service that is not available in the pre defined Available Services list You must define it using the Type and Port User s Guide Chapter 16 The Firewall Screens Table 67 TOOLS gt Firewall gt Service Setting continued LABEL DESCRIPTION Blocked This is a list of services ports that are inaccessible to computers on Services your LAN when service blocking is effective To remove a service from this list select the service and click Delete Type Select TCP or UDP based on which one the custom port uses Port Number Enter the range of port numbers that defines the service For example suppose you want to define the Gnutella service Select TCP type and enter a port range of 6345 6349 Add Click this to add the selected service in Available Services to the Blocked Services list Delete Select a service in the Blocked Services and click this to remove the service from the list Clear All Click this to remove all the services in the Blocked Services list Schedule to Block Day to Block Select which days of the week you want the service blocking to be effective Time of Day to Select what time each day you want service blocking to be effective Block Enter times in 24 hour format for example 3 00pm should be entered as 15 00 Apply Click to save your changes Reset Click to restore your previously saved settings 16 4
343. vigate to www zyxel com If everything was configured properly the web page should display You can now surf the Internet Refer to the rest of this guide for more detailed information on the complete range of WiMAX Modem features available in the more advanced web configurator Note If you cannot access the Internet open the web configurator again to confirm that the Internet settings you configured in the wizard setup are correct User s Guide VoIP Connection Wizard 4 1 Overview This chapter shows you how to use the wizard to set up your voice account s The WiMAX Modem has Voice over IP VoIP communication capabilities that allow you to use a traditional analog telephone to make Internet calls You can configure the WiMAX Modem to use up to two SIP based VoIP accounts 4 2 Welcome to the ZyXEL Setup Wizard This is the welcome screen for the ZyXEL Setup Wizard You can choose to either configure your Internet connection or your VoIP connection The VoIP Connection Wizard screens are described in detail in the following sections Figure 11 Select a Mode ZyXEL Welcome to the ZyXEL Setup Wizard Internet Connection Wizard m This wizard helps you configure the settings necessary for connecting to Se the Internet VoIP Connection Wizard This wizard helps you configure your Voice over Internet Protocol VoIP settings so that you can use a IP phone with this ZyXEL device User s Guide
344. witch on the same network segment as the device s LAN or WAN port The gateway helps forward packets to their destinations User s Guide Chapter 7 The LAN Configuration Screens 7 4 1 IP Static Route Setup Click an Edit icon in ADVANCED gt LAN Configuration gt IP Static Route to edit a static route in the WiMAX Modem Figure 23 Advanced LAN Configuration gt IP Static Route Setup Static Route Setup Route Name C Active CI Private Destination IP Address 0 0 0 0 IP Subnet Mask 0 0 0 0 Gateway IP Address 0 0 0 0 Metric 2 The following table describes the labels in this screen Table 17 Advanced LAN Configuration gt IP Static Route gt Edit LABEL DESCRIPTION Route Name Enter the name of the static route Active Select this if you want the static route to be used Clear this if you do not want the static route to be used Private Select this if you do not want the WiMAX Modem to tell other routers about this static route For example you might select this if the static route is in your LAN Clear this if you want the WiMAX Modem to tell other routers about this static route Destination IP Address Enter one of the destination IP addresses that this static route affects IP Subnet Mask Enter the subnet mask that defines the range of destination IP addresses that this static route affects If this static route affects only one IP address
345. with the SIP server Click Register to have the WiMAX Modem attempt to register the SIP account with the SIP server The second field displays the reason the account is not registered Inactive The SIP account is not active You can activate it in VOI CE gt Service Configuration gt SIP Settings Register Fail The last time the WiMAX Modem tried to register the SIP account with the SIP server the attempt failed The WiMAX Modem automatically tries to register the SIP account when you turn on the WiMAX Modem or when you activate it URI This field displays the account number and service domain of the SIP account You can change these in VOICE gt Service Configuration gt SI P Settings 21 2 1 Packet Statistics Click Status Packet Statistics to open this screen This read only screen displays information about the data transmission through the WiMAX Modem To configure these settings go to the corresponding area in the Advanced screens Figure 102 Packet Statistics Packet Statistics Port Status WAN Down LAN 100M Full Poll Interval 500 System Up Time 6 00 02 TxPkts RxPkts Collisions Tx Bjs Rx B s Up Time 0 0 0 0 0 00 00 00 11091 9262 0 64 593 5 58 17 sec Set Interval User s Guide Chapter 21 The Status Screen The following table describes the fields in this screen Table 104 Packet Statistics LABEL DESCRIPTION Port This co
346. work layer protocol used to establish membership in a multicast group The WiMAX Modem supports both IGMP version 1 IGMP v1 and I GMP v2 Select None to disable it Windows Networking NetBIOS over TCP IP Allow between LAN and WAN Select this check box to forward NetBIOS packets from the LAN to the WAN and from the WAN to the LAN If your firewall is enabled with the default policy set to block WAN to LAN traffic you also need to enable the default WAN to LAN firewall rule that forwards NetBIOS traffic Clear this check box to block all NetBIOS packets going from the LAN to the WAN and from the WAN to the LAN Allow Trigger Dial Select this option to allow NetBIOS packets to initiate calls Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 8 The WAN Configuration Screens User s Guide The VPN Transport Screens 9 1 Overview This chapter describes the ADVANCED gt VPN Transport screens where you can configure the WiMAX Modem to allow traffic from multiple users to pass through the WiMAX network to the service provider s router Each user has his own personal connection to the service provider even though there is only a single WiMAX connection This allows the service provider to identify which user traffic comes from VPN stands for Virtual Private Network There are many types of VPN the type
347. ws you to put a call A on hold by pressing the flash key If you have another call press the flash key to switch back and forth between caller A and B by putting either one on hold If you hang up the phone but a caller is still on hold there will be a remind ring USA Call Waiting allows you to place a call on hold while you answer another incoming call on the same telephone directory number If there is a second call to your telephone number you will hear a call waiting tone Press the flash key to put the first call on hold and answer the second call USA Call Transfer allows you to transfer an incoming call that you have answered to another phone To do so Press the flash key to put the caller on hold When you hear the dial tone dial 98 followed by the number to which you want to transfer the call to operate the Intercom User s Guide Chapter 13 The Phone Screens After you hear the ring signal or the second party answers it hang up the phone USA Three Way Conference allows you to make three way conference calls To do so When you are making a call press the flash key to put the call on hold and get a dial tone Dial a phone number to make a second call When the second call is answered press the flash key to create a three way conversation If you want to separate the three way conference into two individual calls one call is online the other is on hold press the flash key The fi
348. x Mobile SUGI syiar aa a AAA 86 Figure 26 WIMAX Multiple Mobile Stations uiis coii eise pda eria exilia dann rada das trend 86 Figure 27 ID EE Rc qi Et 87 Figure 28 ADVANCED gt WAN Configuration gt Internet Connection ssssssseee 88 Figure 29 ADVANCED gt WAN Configuration WiMAX Configuration ssssssee 91 Figuro 30 Froguency Ranges T 92 Figure 31 Completing the WiMAX Frequency Screen ccccccceeeeeeeeneeececeeeeeeaeeeeeeeeeaaeeseaeeeeeaeeeseneeess 94 Figure 32 ADVANCED gt WAN Configuration gt Advanced a eeeeececeteeeeeceeeeeeaeeeeeeeececaeeeeeneeeseaeeeteneeeees 94 POUS 32 VPN Tia pent Exemple i25 nas Dosis senses EPIS pp eared IR 97 Foue c CNS RATS eC I ETT 98 Figure 35 ADVANCED gt VPN Transport gt General sirosis nnna dete eR ERE eu Le RUE 99 Figure 36 Pseudowire MODE iiuiasspsivennspisxda avevi VY yd E jw vb Had ad a vag ud ua rage aa oaa 100 Figure S7 VPLS MINDENI sascueondbtbeeuutiutbsosidda ee or Oei Qdibes t tiu er 101 Figure 38 ADVANCED gt VPN Transport gt Customer Interface sssssseeseeee 102 User s Guide List of Figures Figure 39 ADVANCED gt VPN Transport gt Customer Interface Setup sss 103 Figure 40 Ethernet Pseudowire Settings Example sssssssssesssssseeeereeeenn entren 105 Figure 41 Advance gt VPN Transport gt Ethernet Pseudowire s ece
349. y don t know your IP address First of all you need to have registered a dynamic DNS account with www dyndns org This is for people with a dynamic IP from their ISP or DHCP server that would still like to have a domain name The Dynamic DNS service provider will give you a password or key Enabling the wildcard feature for your host causes yourhost dyndns org to be aliased to the same IP address as yourhost dyndns org This feature is useful if you want to be able to use for example www yourhost dyndns org and still reach your hostname Note If you have a private WAN IP address then you cannot use Dynamic DNS 122 User s Guide Chapter 11 The System Configuration Screens Click ADVANCED gt System Configuration gt Dynamic DNS to set up the WiMAX Modem as a dynamic DNS client Figure 52 ADVANCED gt System Configuration gt Dynamic DNS Dynamic DNS Setup C Enable Dynamic DNS Service Provider Dynamic DNS Type Host Name User Name Password C Enable Wildcard Option CI Enable off line option Only applies to custom DNS IP Address Update Policy 9 Use WAN IP Address Dynamic DNS server auto detect IP Address Use specified IP Address WWW DynDNS ORG Dynamic DNS Ni The following table describes the labels in this screen Table 39 ADVANCED gt System Configuration gt Dynamic DNS LABEL DESCRIPTION Dynamic DNS Se tup Enable Dynamic DNS Sele
350. y have enabled Figure 146 Internet Options Privacy Internet Options PIR General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing _ Block pop ups 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions 2 Select Settings to open the Pop up Blocker Settings screen Figure 147 Internet Options Privacy Internet Options General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable LJ information without your implicit consent Restricts fi
351. y such pseudowire the ingress label on one User s Guide Chapter 9 The VPN Transport Screens device must be the same as the egress label on the peer device as shown in the following figure A is your WiMAX Modem and B is your service provider s router Figure 40 Ethernet Pseudowire Settings Example PSEUDOWIRE INGRESS LABEL Y INGRESS LABEL X EGRESS LABEL Y EGRESS LABEL X Click ADVANCED gt VPN Transport gt Ethernet Pseudowire to configure the WiMAX Modems s Ethernet pseudowires Figure 41 Advance VPN Transport Ethernet Pseudowire MPLS VC Label Active Pseudowire Description Action Ingress Egress 1 Bg ui 2 Sw H Gg ui The following table describes the icons in this screen Table 28 Advanced VPN Transport Ethernet Psuedowire ICON DESCRIPTION g Edit Click to edit this item t Delete Click to delete this item The following table describes the labels in this screen Table 29 ADVANCED gt VPN Transport gt Ethernet Pseudowire LABEL DESCRIPTION The number of the item in this list Active This icon is green if the associated pseudowire is enabled The icon is grey if the associated pseudowire is disabled Enable or disable a pseudowire by clicking its Edit icon MPLS VC Label User s Guide Chapter 9 The VPN Transport Screens Table 29 ADVANCED gt VPN Transport gt Ethernet Pseudowire conti
352. you are instructed to do otherwise Private IP Addresses Every machine on the Internet must have a unique address If your networks are isolated from the Internet running only between two branch offices for example you can assign any IP addresses to the hosts without problems However the Internet Assigned Numbers Authority IANA has reserved the following three blocks of IP addresses specifically for private networks e 10 0 0 0 10 255 255 255 e 172 16 0 0 172 31 255 255 192 168 0 0 192 168 255 255 You can obtain your IP address from the IANA from an ISP or it can be assigned from a private network If you belong to a small organization and your Internet access is through an ISP the ISP can provide you with the Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Regardless of your particular situation do not create an arbitrary IP address always follow the guidelines above For more information on address assignment please refer to RFC 1597 Address Allocation for Private Internets and RFC 1466 Guidelines for Management of IP Address Space IP Address Conflicts Each device on a network must have a unique IP address Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources The devices may also be unreachable through the
353. z DL Frequency 4 0 kHz DL Frequency 5 0 kHz DL Frequency 6 0 kHz DL Frequency 7 0 kHz DL Frequency 8 0 kHz DL Frequency 9 0 kHz DL Frequency 10 0 kHz DL Frequency 11 0 kHz DL Frequency 12 0 kHz DL Frequency 13 0 kHz DL Frequency 14 0 kHz DL Frequency 15 0 kHz DL Frequency 16 0 kHz DL Frequency 17 0 kHz DL Frequency 18 0 kHz DL Frequency 19 0 kHz Bandwidth 10000 KHz The following table describes the labels in this screen Table 21 ADVANCED gt WAN Configuration WiMAX Configuration LABEL DESCRIPTION DL Frequency These fields show the downlink frequency settings in kilohertz KHz Bandwidth Enter values in these fields to have the WiMAX Modem scan these frequencies for available channels in ascending numerical order Note The Bandwidth field is not user configurable when the WiMAX Modem finds a WiMAX connection its frequency is displayed in this field Contact your service provider for details of supported frequencies Apply Click to save your changes Reset Click to restore your previously saved settings User s Guide Chapter 8 The WAN Configuration Screens 8 3 1 Frequency Ranges The following figure shows the WiMAX Modem searching a range of frequencies to find a connection to a base station Figure 30 Frequency Ranges B C Cc C C C C C C C P In this figure A is the WiMAX frequency range WiMAX frequency range refers to

Download Pdf Manuals

image

Related Search

Related Contents

Sony Optiarc AD-5280S  Edimax IC-7010PoE  Samsung HT-DM150N راهنمای محصول  DD 200 - Hilti  Untitled - Scootertech  VAIO Digital Studio™ Computer User Guide  Implementing an IBM High Performance Computing  取扱説明書 - アイコム  SERVICE MANUAL _ ' US Mode,  AVR ATICE10 User Guide  

Copyright © All rights reserved.
Failed to retrieve file