background image

 

 

the stated destination computer has 
previously requested the current 
communication. This is a way of 
ensuring that all communications 
are initiated by the recipient 
computer and are taking place only 
with sources that are known and 
trusted from previous interactions. 
In addition to being more rigorous 
in their inspection of packets, 
stateful inspection firewalls also 
close off ports until a connection to 
the specific port is requested.  

 

 

When particular types of traffic are 
checked, only the particular type of 
traffic initiated from the internal LAN 
will be allowed. For example, if the 
user only checks FTP Service in 
the Stateful Packet Inspection 
section, all incoming traffic will be 
blocked except for FTP connections 
initiated from the local LAN.  

 
Hacker Prevention  
Feature  

Discard Ping 
from WAN  

Discard   Prevents a ping on the router’s 

WAN port from being routed to the 
network.  

 

 

Parameter 

 

Defaults 

 

Description 

 

RIP Defect  

Enabled  

If the router does not reply to an 
IPX RIP request  

 

 

packet, it will stay in the input 
queue and not be  

 

 

released. Accumulated packets 
could cause the  

 

 

input queue to fill, causing severe 
problems for all  

 

 

protocols. Enabling this feature 
prevents the  

 

 

packets accumulating.  

When 
hackers  

 

 

attempt to 
enter your 
network, we 
can alert 
youby email  

 

 

Your E-mail 
Address  

 

Enter your email address.  

SMTP 
Server 
Address  

 

Enter your SMTP server address 
(usually the part of the email 
address following the “@” sign).  

64 

Summary of Contents for B-BOX

Page 1: ...Belgacom b box Instructions for use Version 1 0...

Page 2: ...nfiguring Your Computer in Windows 2000 12 Obtain IP Settings From Your Belgacom b box 14 Manual IP Configuration 15 Disable HTTP Proxy 15 Configuring Your Computer in Windows XP DHCP IP Configuration...

Page 3: ...2 Static Route Parameters 52 RIP Parameter 53 Routing Table 55 Firewall 56 Access Control 57 Access Control Add PC 57 MAC Filter 58 URL Blocking 59 Schedule Rule 61 Edit Schedule Rule 61 Intrusion Det...

Page 4: ...f making calls over the regular telephone network calls are made over computer IP networks either through your Internet Service Provider s connection or through your local network The basic steps invo...

Page 5: ...e observe the local regulations regarding the disposal of packing materials exhausted batteries and old equipment Disclaimer This product is provided by Philips as is and without any express or implie...

Page 6: ...er ISP using an ADSL line A computer equipped with a 10 Mbps 100 Mbps or 10 100 Mbps Fast Ethernet card TCP IP network protocols installed on each PC that will access the Internet A Java enabled web b...

Page 7: ...s RJ 45 Connect devices on your local area network to these ports i e a PC or switch TV Ports Grey Fast Ethernet ports RJ 45 Connect your settop box es to these ports Reset Button Use this button to r...

Page 8: ...etting up the Belgacom b box ISP account user name and password Protocol encapsulation and VPI VCI circuit numbers DNS server address IP address subnet mask and default gateway for fixed IP users only...

Page 9: ...9...

Page 10: ...10...

Page 11: ...standards Notes 1 Use 100 ohm shielded or unshielded twisted pair cable with RJ 45 connectors for all Ethernet ports Use Category 3 4 or 5 for connections that operate at 10 Mbps and Category 5 for c...

Page 12: ...3 15 TCP IP Configuration To access the Internet through the Belgacom b box you must configure the network settings of the computers on your LAN to use the same IP subnet as the Belgacom b box The de...

Page 13: ...tocol TCP IP 2 If Obtain an IP address automatically and Obtain DNS server address automatically are already selected your computer is already configured for DHCP If not select these options Click Can...

Page 14: ...gured your computer correctly 1 On the Windows desktop click Start Programs Accessories Command Prompt 2 In the Command Prompt window type IPCONFIG RELEASE and press the ENTER key 1 Type IPCONFIG RENE...

Page 15: ...your ISP Otherwise add a specific DNS server into the Alternate DNS Server field and click OK to close the dialog boxes 5 Record the configured information in the following table TCP IP Configuration...

Page 16: ...nnection icon for the Ethernet adapter that is connected to the Belgacom b box In the connection status screen click Properties Double click Internet Protocol TCP IP If Obtain an IP address automatica...

Page 17: ...obtain new network settings By releasing old DHCP IP settings and renewing them with settings from your Belgacom b box you can verify that you have configured your computer correctly 1 On the Windows...

Page 18: ...9 2 Select Use the following IP Address 3 Enter an IP address based on the default network 192 168 1 x where x is between 2 and 254 use 255 255 255 0 for the subnet mask and the IP address of the Belg...

Page 19: ...abled This is so that your browser can view the Belgacom b box s HTML configuration pages Your computer is now configured to connect to the Belgacom b box Configuring Your Macintosh Computer You may f...

Page 20: ...255 0 and your Default Gateway is 192 168 1 1 These values confirm that your Belgacom b box is functioning Close the Network window Now your computer is configured to connect to the Belgacom b box Di...

Page 21: ...In the Internet Explorer Preferences window under Network select Proxies Uncheck all check boxes and click OK 21...

Page 22: ...management access Then click LOGIN By default there is no password Navigating the Web Browser Interface The Belgacom b box s management interface consists of a Setup Wizard and an Advanced Setup secti...

Page 23: ...Station you can uncheck the Enable Wireless checkbox Enable Broadcast The ADSL Wireless Base Station broadcasts its Wireless ID by default This means that the SSID will appear as an available network...

Page 24: ...ck on Save Settings and continue You can now surf to your favorite websites by typing an URL in your browser s location box or by selecting one of your favorite Internet bookmarks If you enabled the T...

Page 25: ...Repeat this for each available port The Belgacom b box can append telephone numbers to outgoing calls Select the number you want to use for each port Click Save Settings The connection status page wi...

Page 26: ...Digital Subscriber Line is designed to deliver more bandwidth downstream from the central office to the customer site than upstream This section is used to configure the ADSL operation type and shows...

Page 27: ...Status The Status screen displays information on connection line status data rate operation data and defect indication and statistics 27...

Page 28: ...The following items are included on the ADSL status page 28...

Page 29: ...Sets the TCP IP configuration for the Belgacom b box LAN interface and DHCP clients Wireless Configures the radio frequency SSID and security for wireless communications NAT Shares a single ISP accou...

Page 30: ...rial number Shows the security and DHCP client log Making Configuration Changes Configurable parameters have a dialog box or a drop down list Once a configuration change has been made on a page click...

Page 31: ...access to the user interface press the reset button colored blue on the rear panel holding it down for at least five seconds to restore the factory defaults By default there is no password Enter a ma...

Page 32: ...of 0 0 0 0 any host can manage the Belgacom b box For remote management via WAN IP address you need to connect using port 8080 Simply enter WAN IP address followed by 8080 in the address field of you...

Page 33: ...N interface Click on each ATM VC for WAN configuration See the table below for a description of the parameters Parameter Description Description Click on the VC to set the values for the connection VP...

Page 34: ...3 Bridging Bridging is a standardized layer 2 technology It is typically used in corporate networks to extend the physical reach of a single LAN segment and increase the number of stations on a LAN wi...

Page 35: ...psulation allows only one protocol running per virtual circuit with less overhead LLC Point to Point Protocol over ATM Logical Link Control allows multiple protocols running over one virtual circuit u...

Page 36: ...If this is the case the MAC address of the Belgacom b box must be changed manually to the MAC address that you have registered with your ISP LAN Use the LAN menu to configure the LAN IP address and t...

Page 37: ...om b box IP Subnet Mask The subnet mask of the Belgacom b box DHCP Server To dynamically assign an IP address to client PCs enable the DHCP Dynamic Host Configuration Protocol Server Lease Time Set th...

Page 38: ...this field blank Remember to configure your client PCs for dynamic address allocation See TCP IP Configuration on page 3 2 for details Wireless The Belgacom b box also operates as a wireless access p...

Page 39: ...ble Wireless Mode This device supports both 11g and 11b wireless networks Make your selection depending on the type of wireless network that you have Channel The radio channel used by the wireless rou...

Page 40: ...unique identifier known as a Medium Access Control MAC address With MAC filtering enabled only the computers whose MAC address you have listed in the filtering table may connect to the Belgacom b box...

Page 41: ...less You can configure your security settings on this page If you are transmitting sensitive data across radio channels you should enable wireless security For a more secure network the Belgacom b box...

Page 42: ...rt provided in Windows XP Provides good security in small networks Requires configured RADIUS server or manual management of pre shared key 802 1X Requires WPA enabled system and network card driver n...

Page 43: ...bit key A hexadecimal digit is a number or letter in the range 0 9 or A F Default Key IDSelect the default key Passphrase For automatic key generation check the Passphrase box enter a passphrase and c...

Page 44: ...secure option Cypher suite Auto Aes The key encryption suite used by WPA and WPA2 for frame body and CRC frame encryption This setting ensures maximum security Authentication 802 1X Select the authen...

Page 45: ...n Enable 802 1X Yes Session Idle 300 seconds Timeout Re Authentication 3600 seconds Period Quiet Period 60 seconds Server Type RADIUS Starts using 802 1x security control Defines a maximum period of t...

Page 46: ...e request identifier of the Network Access Server NAS or RADIUS client that is requesting client authentication from the RADIUS server Easy pairing Your Belgacom b box is equipped with a wireless pair...

Page 47: ...T allows one or more public IP addresses to be shared by multiple internal users Enter the Public IP address you wish to share into the Global IP field Enter a range of internal IPs that will share th...

Page 48: ...ess Mapping to allow a limited number of public IP addresses to be translated into multiple private IP addresses for use on the internal LAN network This also hides the internal network for increased...

Page 49: ...ed service TCP UDP port number the Belgacom b box redirects the external service request to the appropriate server located at another internal IP address For example if you set Type Public Port to TCP...

Page 50: ...l public ports to be opened for each application Specify the public port number normally associated with an application in the Trigger Port field Set the protocol type to TCP or UDP then enter the por...

Page 51: ...current settings Example ID Trigger Port Trigger Type Public Port Public Type Comment 1 6112 UDP 6112 UDP Battle net 2 28800 TCP 2300 2400 TCP MSN Game Zone 47624 For a full list of ports and the serv...

Page 52: ...e flow Local Port local LAN host s port number for the flow Pseudo IP translated IP address for the flow Pseudo Port translated port number for the flow Peer IP remote WAN host s IP address for the fl...

Page 53: ...e number of the route Network Address Enter the IP address of the remote computer for which to set a static route Subnet Mask Enter the subnet mask of the remote network for which to set a static rout...

Page 54: ...orks connected to the ADLS Router If enabled this sub network information will be summarized to one piece of information covering all sub networks Table of current Interface RIP parameter Interface Th...

Page 55: ...reation of a 128 bit message digest from data input which may be a message of any length that is claimed to be as unique to that specific data as a fingerprint is to a specific individual Authenticati...

Page 56: ...p of this route is reached Metric When a router receives a routing update that contains a new or changed destination network entry the router adds 1 to the metric value indicated in the update and ent...

Page 57: ...etwork LAN The MAC Filtering Table allows the Belgacom b box to enter up to 32 MAC addresses that are not allowed access to the WAN port The following items are displayed on the Access Control screen...

Page 58: ...iate settings for client PC services as shown above Click OK to save your settings The added PC will now appear in the Access Control page MAC Filter Use this page to block access to your network usin...

Page 59: ...specify the web sites www somesite com and or keywords you want to filter on your network To complete this configuration you will need to create or modify an access rule in Access Control on page 4 3...

Page 60: ...allows the user to block access to web sites from a particular PC by entering either a full URL address or just a keyword This feature can be used to protect children from accessing violent or pornogr...

Page 61: ...sed on rules Each access control rule may be activated at a scheduled time Define the schedule on the Schedule Rule page and apply the rule on the Access Control page Click Add Schedule Rule Edit Sche...

Page 62: ...y to Thursday Upon completion click OK to save your schedule rules Intrusion Detection The Belgacom b box s firewall inspects packets at the application layer maintains TCP and UDP session information...

Page 63: ...and Yes The Intrusion Detection feature of the Telephony Anti DoS firewall protection Router limits the access of incoming traffic at the WAN port When the Stateful Packet Inspection SPI feature is t...

Page 64: ...vice in the Stateful Packet Inspection section all incoming traffic will be blocked except for FTP connections initiated from the local LAN Hacker Prevention Feature Discard Ping from WAN Discard Prev...

Page 65: ...for which a UDP session will timeout be managed if there is no activity H 323 data 180 secs The length of time for which an H 323 session will channel idle be managed if there is no activity timeout...

Page 66: ...ime period Flooding cracker 300 secs Length of time from detecting a flood attack to block time blocking the attack DMZ If you have a client PC that cannot run an Internet application properly from be...

Page 67: ...o access this information Access rights to the agent are controlled by community strings To communicate with the Belgacom b box the NMS must first submit a valid community string for authentication Pa...

Page 68: ...o prevent unauthorized individuals from reading information on your system Sets the trap status to disabled or enabled with V1 or V2c The v2c protocol was proposed in late 1995 and includes enhancemen...

Page 69: ...at the default Automatic setting to automatically negotiate with the remote DSLAM Parameter Description Operation Mode Automatic T1 413 Issue 2 G 992 1 G DMT G 992 2 G Lite G 992 3 ADSL2 G 992 5 ADSL...

Page 70: ...ream Downstream Operation Data Defect Indication Noise Margin Upstream Downstream Output Power Attenuation Upstream Downstream Fast Path FEC Correction Interleaved Path FEC Correction Fast Path CRC Er...

Page 71: ...nity an interleaver may be used to supplement FEC An interleaver is basically a buffer used to introduce a delay allowing for additional error correction techniques to handle noise Interleaving slows...

Page 72: ...rames transmitted Number of fast superframes received Number of fast superframes transmitted Telephony Port Setting Configure the port settings on this page and click OK to save the parameters Telepho...

Page 73: ...phone number Display Name Your name often the same as your phone number SIP Domain From your Telephony provider e g sipcenter com or an IP address Realm From your Telephony provider Username From your...

Page 74: ...s SIP requests from a client and then forwards the requests on the client s behalf Proxy servers receive SIP messages and forward them to the next SIP server in the network A series of proxy and redir...

Page 75: ...end point is capable of functioning as both a UAC and a UAS but functions only as one or the other per transaction Phone standards vary internationally so it is important that the Belgacom b box is c...

Page 76: ...acket e g the caller s ID may be displayed Default Disabled Telephony Hook The hook flash timer is the length of time before the hook Flash Timer flash indicates a time out or call disconnect Default...

Page 77: ...parameters Parameter Description Port Type Displays the port type i e FXS SIP URL Shows the SIP URL Registration Indicates whether the user has successfully registered or not Telephony Call Logs View...

Page 78: ...file named backup bin on your PC You can then check Restore from saved Configuration file backup bin to restore the saved backup configuration file To restore the factory settings check Restore router...

Page 79: ...firmware file and click Open Click SAVE to start the upgrade process Reset Perform a reset from this page Should your unit become unresponsive for any reason you can simply perform a reset from this...

Page 80: ...Status The Status screen displays WAN LAN connection status firmware and hardware version numbers as well as information on DHCP clients connected to your network 80...

Page 81: ...81...

Page 82: ...lish a connection to the WAN Displays system IP settings as well as DHCP Server and Firewall status Displays the number of attached clients the firmware versions the physical MAC address for each medi...

Page 83: ...83...

Page 84: ...ce are powered on Be sure the cable is plugged into both the Belgacom b box and the corresponding device Verify that the proper cable type is used and that its length does not exceed the specified lim...

Page 85: ...ask and default gateway Check that you have a valid network connection to the Belgacom b box and that the port you are using has not been disabled Check the network cabling between the management stat...

Page 86: ...lision A condition in which packets transmitted over the cable interfere with each other Their interference makes both signals unintelligible Collision Domain Single CSMA CD LAN segment CSMA CD CSMA C...

Page 87: ...layer specifications for 1000BASE T Fast Ethernet IEEE 802 3u Defines CSMA CD access method and physical layer specifications for 100BASE TX Fast Ethernet IETF Internet Engineering Task Force Glossar...

Page 88: ...sted pair wiring Straight through Port An RJ 45 port which does not cross the receive and transmit signals internally MDI so it can be connected with straight through twisted pair cable to any device...

Page 89: ...ed to 10 Mbps Ethernet or 100 Mbps Fast Ethernet and the transmission mode to half duplex or full duplex WAN Interface 1 ADSL RJ 11 port FXS Interface 2 FXS ports Input Power 12 V 1 25 A Power Consump...

Page 90: ...Storage 40 to 70 C 40 to 158 F Humidity 5 to 95 non condensing 90...

Page 91: ...Electronic Equipment Directive 2002 96 EC has been put in place to ensure that products are recycled using best available treatment recovery and recycling techniques to ensure human health and high en...

Reviews: