background image

© (2010) Pirelli Broadband Solutions S.p.A. All Rights Reserved. Proprietary Use Pursuant to Cover Page Instructions.

Router Configuration

HBK 939800036-A1

19

R

ou

te

r

C

on

fig

ur

at

io

n

Router
Configuration

INTRODUCTION

The Router setup program is web based, which means that it is accessed
through your web browser.

To access to Router’s web server:

1.

Launch your web browser on the computer

2.

Enter the following URL in the location or address field of your browser:

http://192.168.1.1

The Router comes with a default IP address (192.168.1.1). If you change it, please take note of the
new Router’s IP address, otherwise a “Reset to Factory Default” operation should be done to be able
to access again to the Router.

Access to router configuration pages is controlled through user accounts. The
default one is the

admin

user with unrestricted access to change and view con-

figuration of the Router.

The default username and password are both set to “admin”. It is recommended to change these de-
fault values. Make sure you remember your user name and password, since this is the only way you
will be able to manage your Router

You will be asked to choose the Router interface language between

English,

French, Russian, Spanish, Korean, Traditional Chinese, Japanese, German,
Italian

and

Simplified Chinese

and to insert a

User Name

and a

Password

: in-

sert them to access to Router’s configuration panels.

Summary of Contents for P.RG F4202N

Page 1: ......

Page 2: ... of a term in this document should not be regarded as affecting the validity of any trademark or service mark This publication is subject to change without notice Pirelli reserves the right to make changes to equipment design and system components as well as system documentation and literature as progress in engineering manufacturing methods or other circumstances may warrant This publication is i...

Page 3: ...ments 6 Front Panel 7 Rear Panel 8 Hardware Installation 9 Introduction 9 Positioning the Router 9 Powering up the router 10 Connecting the Router 10 Setting Up Your Computer 12 Ethernet Connection 12 Ethernet Connection TCP IP Protocol Installation 12 Ethernet Connection MS Windows 98SE ME 2000 13 Ethernet Connection MS Windows XP 15 Ethernet CONNECTION Windows vista 16 Ethernet Connection MAC OS...

Page 4: ...35 LAN Wireless 802 11n Access Point 36 LAN Wireless 802 11n Access Point General 36 LAN Wireless 802 11n Access Point Settings 37 LAN Wireless 802 11n Access Point Wireless 38 LAN Wireless 802 11n Access Point Advanced 43 Security Section 44 General 45 Access Control 47 Port Forwarding 48 DMZ Host 51 Port Triggering 52 Web Site Restrictions 52 NAT 53 Connections 54 Advanced Filtering 55 Security ...

Page 5: ...store 84 Certificates 86 Configuration File 87 DDNS 88 DLNA 89 DNS Server 90 Date and Time 91 Diagnostics 93 Disk Management 95 ftp server 96 File Server 96 IP Address Distribution 97 ipsec 99 l2tp server 100 media sharing 101 Network Objects 102 pptp server 103 P RG F4202N Firmware Upgrade 104 Print Server 106 Protocols 106 RADIUS 107 Reboot 108 Remote Administration 108 Restore Defaults 111 Rout...

Page 6: ...LAN 127 Web Server 127 System Monitoring Section 131 Network Connections 131 System Log 132 CPU 133 Troubleshooting 135 Basic Connection Checks 135 Browsing to the Router Configuration Screens 135 Connecting to the Internet 136 Forgotten Password and Reset to Factory Defaults 136 Wireless Networking 137 Frequently Asked Questions 138 Safety Information 139 IP Addressing 141 Technical Specification...

Page 7: ...etting up network equipment consequently it assumes a basic working knowledge of LANs Lo cal Area Networks and Internet Routers NAMING CONVENTION Throughout this guide the P RG F4202N is referred to as the Router Cate gory 5 Ethernet Cables are referred to as Ethernet Cables throughout this guide CONVENTIONS Table 1 and Table 2 list conventions that are used throughout this guide TABLE 1 Notice Ic...

Page 8: ...t Conventions Convention Description The words enter and type When you see the word enter in this guide you must type some thing and then press Return or Enter Do not press Return or En ter when an instruction simply says type Keyboard key names If you must press two or more keys simultaneously the key names are linked with a plus sign Example Press Ctrl Alt Del Words in italics Italics are used t...

Page 9: ...use existing analog phones and a fallback to old telephony at loss of power WAN Internet or VoIP The P RG F4202N is an Optical Fiber router targeted to residential environ ments and SOHO customers that provides routed broadband services from a single and modular access point The P RG F4202N is the ideal solution for 1 Connecting multiple PCs and Video game consoles 2 Sharing broadband internet con...

Page 10: ...vice Provider It implements an Optical Fiber WAN connection as well as several local con nectivity technologies on the LAN side Four switched 10 100 Base TX Ethernet ports Two USB 2 0 Host port for external USB peripherals One IEEE 802 11b g n Wireless LAN access point Two FXS ports to analog phones FIGURE 1 shows a sample network while in Figure 2 an existing SIP account case is shown your Router...

Page 11: ...over Page Instructions Introduction HBK 939800036 A1 5 FIGURE 1 Sample Home Network FIGURE 2 Sample Home Network existing SIP account case ROUTER ADVANTAGES The advantages of the Router include Shared Internet connection for both wired and wireless computers High speed 802 11b g n wireless networking ...

Page 12: ...ss network traffic VoIP functionalities supporting existing analog phones Communication fallback of to analog lines in case of power or hardware faults if supported by your network operator a multi language GUI MINIMUM SYSTEM AND COMPONENT REQUIREMENTS Your Router requires the computer s and components in your network to be configured with at least the following A computer with the Operating Syste...

Page 13: ...e and Red Power off Solid Green WAN IP address available Blinking Green IP connected and IP traffic is passing through device either direction Solid Red WAN IP address not available 2 Internet activity White Red Off Modem power off or the modem is in bridged mode or connection not pre sent On One of the FXS port has been registered with a SIP proxy server Blinking One of the telephones connected t...

Page 14: ...ower adapter socket four LAN ports two USB Host port two FXS ports Do not force the antenna beyond its mechanical stops Rotating the antenna further may cause dam age FIGURE 4 Rear Panel Ports TABLE 3 Port Description PORT DESCRIPTION A Fiber connector B port Four Ethernet ports 10 100 Mbps C ports USB 2 0 Host ports D FXS E Power connector F Reset to factory default button Power button located on...

Page 15: ...fety Information in Appendix A POSITIONING THE ROUTER You should place the Router in such a location to ensure that It is located near an electrical outlet and the fiber socket Water or moisture cannot enter the case of the unit It is out of direct sunlight and away from sources of heat The cabling is away from power lines fluorescent lighting fixtures and sources of electrical noise such as radio...

Page 16: ...ter is to physically connect it to the fiber line and then to connect it to a computer by means of an Ethernet connection To connect the fiber cable 1 Connect one end of the fiber cable into the fiber port located on the rear panel of the Router 2 Connect the other end of the fiber cable into the fiber socket To connect the Ethernet cable 1 Connect one end of the Ethernet cable into one of the fou...

Page 17: ...Hardware Installation HBK 939800036 A1 11 FIGURE 1 Ethernet Cable Connection In the case your provider will supply to you a SIP account it will be needed to properly connect the FXS In detail you must connect a maximum of two analog phones to the Phone1 or Phone 2 ports of the Router FXS connection FIGURE 2 FXS connections ...

Page 18: ...tructions described in this chapter You will be guided to set up an Ethernet connection to the Router To do so first you have to verify the exis tence of a TCP IP protocol stack and then according to your Operating Sys tem to establish an Ethernet connection to it This connection will require you to enable your computer to receive from the Router its own IP Address automati cally in such a case th...

Page 19: ...1 Put in the CD ROM drive your Windows installation CD ROM 2 Starting from Start Settings Control Panel make a double click on the Network icon 3 Select Protocol and click on the Add button Select Microsoft and TCP IP then click on the OK button 4 Configure the Network adapter to obtain automatically an IP address Apple MacOS 10 x TCP IP is installed on a MacOS system as part of Open Transport ETH...

Page 20: ...939800036 A1 Setting Up Your Computer 3 Select the IP Address Tab then check to obtain an automatically IP address Click on OK button FIGURE 2 Internet Protocol TCP IP Properties 4 A system reboot will be required to make the changes real 5 Enter http 192 168 1 1 in the address bar of your browser to open the P RG F4202N Home Page ...

Page 21: ...WS XP To configure TCP IP on MS Windows XP Operating System follow these steps 1 Select Start Settings Control Panel and make a double click on the Network icon 2 Select Protocols TCP IP then click on Properties button FIGURE 3 Local Area Connection Properties 3 Select the General Tab then check to obtain an automatically IP address Click on OK button FIGURE 4 Internet Protocol TCP IP Properties ...

Page 22: ...P on MS Windows Vista Operating System follow these steps 4 Starting from Start Settings Control Panel make a double click on the Network and Sharing Center icon 5 Select Manage Network Connections make a click on the connection properties FIGURE 5 Local Area Connection Properties Windows Vista 6 Select IPv4 then check to obtain an automatically IP address Click on OK button FIGURE 6 Internet Prot...

Page 23: ...Apple Menu System Preferences and select Network 2 From the Show drop down list according to the type of connection used se lect Built in Ethernet 3 Select the TCP IP tab 4 Select DHCP from the Configure pop up menu to have a dynamic IP ad dress FIGURE 7 Network panel on MAC OS 10 x 5 Click Apply Now 6 Click on the Register button to save the changes in the Control Panel 7 Enter http 192 168 1 1 i...

Page 24: ...eed to properly configure your adapter to communicate with the P RG F4202N according to the configuration rules 2 In the configuration window of your wireless adapter scan the wireless net work marked with the relevant SSID name present in your physical envi ronment 3 Select the SSID of the P RG F4202N 4 Complete the configuration of the wireless adapter with the same parame ters of the P RG F4202...

Page 25: ... address otherwise a Reset to Factory Default operation should be done to be able to access again to the Router Access to router configuration pages is controlled through user accounts The default one is the admin user with unrestricted access to change and view con figuration of the Router The default username and password are both set to admin It is recommended to change these de fault values Ma...

Page 26: ...shows the status of network connections allowing to modify them or to create new ones 5 Security it allows to set security settings 6 Voice over IP it allows to set VoIP accounts 7 Parental Control it allows to set Parental Control filtering 8 QoS it gathers all QoS parameters and settings 9 Advanced it allows the access to the advanced configuration panels and to define Router parameters devoted ...

Page 27: ...4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions Router Configuration HBK 939800036 A1 21 FIGURE 1 Router s Home Page FIGURE 2 MAP View Page ...

Page 28: ...e wall corre sponds to the security level currently selected Minimum Typical or Maximum Click this icon to configure security settings It represents a Wireless LAN connection Click this icon to config ure network parameters for the Wireless LAN device It represents a bridge connected in the home network Click this icon to view the bridge s underlying devices It represents a computer host connected...

Page 29: ...ter will describe the Quick Setup Section accessible from the Home Page of the P RG F4202N upon user authentication to the Router Be aware that any configuration changes could compromise your connectivity When subscribing to a broadband service you should be aware of the method by which you are connected to the Internet Your physical WAN device can be Ethernet Fibre or both FIGURE 1 Quick Setup Pa...

Page 30: ...re this setting is the same for all points in your wire less network For added security you should change the default SSID openrg to a unique name 802 11 Mode Select the Wireless communication standard that is compatible with you PC s wireless card You can work in either 802 11n 802 11g or in mixed mode Security To configure your wireless security select the WPA mode encryption WPA WPA is a data e...

Page 31: ...nges could compromise your connectivity This section see Figure 1 is intended to present a summary of the Router s connections such as WAN and LAN i e Ethernet Wireless interfaces P RG F4202N supports various network connections both physical and logical The Network Connections screen enables you to configure the various parame ters of your physical connections the LAN and WAN and create new conne...

Page 32: ...s formerly underlying devices in herit the bridge s DHCP settings For example the removal of a bridge that is configured as DHCP client automatically configures the LAN devices formerly constituting the bridge as DHCP clients with the exact DHCP client configura tion LAN BRIDGE GENERAL To view and edit the LAN bridge connection settings click the LAN Bridge link in the Network Connections screen T...

Page 33: ... 939800036 A1 27 FIGURE 2 LAN Bridge General Panel LAN BRIDGE SETTINGS General This section displays the connection s general parameters It is re commended not to change the default values unless familiar with the network ing concepts they represent Since your gateway is configured to operate with the default values no parameter modification is necessary ...

Page 34: ...ction may be active Once a scheduler rule s is defined this field changes to a combo box allowing you to choose between the available rules Network Select whether the parameters you are configuring relate to a WAN LAN or DMZ connection by selecting the connection type from the combo box Physical Address The physical address of the network card used for your network Some cards allow you to change t...

Page 35: ...new the leased IP address Use the Following IP Address Your connection can be configured using a permanent static IP address Your service provider should provide you with such an IP address and subnet mask DNS Server Domain Name System DNS Server is the method by which Web site domain names are translated into IP addresses You can configure the connection to automatically obtain a DNS server addre...

Page 36: ...uters on the network Provide Host Name if Not Specified by Client If the DHCP client does not have a host name the gateway will automatically assign one for him DHCP Relay Your gateway can act as a DHCP relay in case you would like to dynamically assign IP addresses from a DHCP server other than your gate way s DHCP server Note that when selecting this option you must also change Router s WAN to w...

Page 37: ... port translation in addition to address translation Device Metric The device metric is a value used by the gateway to determine whether one route is superior to another considering parameters such as bandwidth delay and more Default Route Select this check box to define this device as a the default route Multicast IGMP Proxy Internal IGMP proxy enables the system to issue IGMP host messages on be...

Page 38: ...hen RIP is enabled select the fol lowing Listen to RIP messages select None RIPv1 RIPv2 or RIPv1 2 Send RIP messages select None RIPv1 RIPv2 broadcast or RIPv2 multicast Routing Table Allows you to add or modify routes when this device is active Use the New Route button to add a route or edit existing routes LAN BRIDGE BRIDGING This section allows you to specify the devices that you would like to ...

Page 39: ...he Internet The firewall can be activated per network connection To enable the firewall on this network connection select the Enabled check box FIGURE 6 LAN Bridge Advanced Panel Additional IP Addresses You can add alias names additional IP addresses to the gateway by clicking the New IP Address link This enables you to access the gateway using these aliases in addition to the 192 168 1 1 LAN ETHE...

Page 40: ...ctions Section FIGURE 7 LAN Ethernet General Panel LAN ETHERNET SETTINGS General This section displays the connection s general parameters It is re commended not to change the default values unless familiar with the network ing concepts they represent Since your gateway is configured to operate with the default values no parameter modification is necessary ...

Page 41: ...U MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for the transmission In the default setting Automatic the gate way selects the best MTU for your Internet connection Select Automatic by DHCP to have the DHCP determine the MTU In case you select Manual it is recommended to enter a value in the 1200 to 1500 range LAN ETHERNET ADVANCED Internet Connection Firewall...

Page 42: ...n protocol RADIUS client EAP MD5 EAP TLS EAP TTLS EAP PEAP Wi Fi Protected Access WPA WPA2 WPA and WPA2 mixed mode and industry leading Discus Firewall and VPN applications In addition the Router s built in authentication server enables home SOHO users to define authorized wireless users without the need for an external RADIUS server LAN WIRELESS 802 11N ACCESS POINT GENERAL To view and edit the L...

Page 43: ...s Point General Panel LAN WIRELESS 802 11N ACCESS POINT SETTINGS General This section displays the connection s general parameters It is re commended not to change the default values unless familiar with the network ing concepts they represent Since your gateway is configured to operate with the default values no parameter modification is necessary FIGURE 11 LAN Wireless 802 11n Access Point Setti...

Page 44: ...you to change this address MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission In the default setting Automatic the gateway selects the best MTU for your Internet connection Select Automatic by DHCP to have the DHCP determine the MTU In case you select Manual it is recommended to enter a value in the 1200 to 1500 range LAN WIRELESS 802 ...

Page 45: ...ge Instructions Network Connections Section HBK 939800036 A1 39 FIGURE 12 LAN Wireless 802 11n Access Point Wireless Panel SSID Broadcast Select this check box to enable the SSID s broadcast SSID broadcast is used in order to hide the name of the AP SSID from clients that should not be aware to its existence ...

Page 46: ...ers according to their MAC ad dress either allowing or denying access Choose the action to be performed by selecting it from the drop down menu MAC Filtering Table Use this section to define advanced wireless access point settings New MAC Address Click this link to define filtering of MAC addresses Enter the MAC address to be filtered and press the OK button A MAC address list will appear upon whi...

Page 47: ...es the time interval in seconds for updating a group key WPA and WPA2 Mixed Mode WPA and WPA2 is a mixed data encryption method Authentication Method Select the authentication method you would like to use You can choose between Pre Shared Key and 802 1x Pre Shared Key This entry appears only if you had selected this authentication method Enter your encryption key in the Pre Shared Key field You ca...

Page 48: ...basic Quality of Service QoS features to IEEE 802 11 networks If your wireless card supports WMM enable this feature by checking its Enabled check box Upon enabling WMM the highest priority is given to Voice packets decreasing towards Background packets which receive the lowest priority In addition you can control the reliability of traffic flow By default the Ack Pol icy for each access category ...

Page 49: ...mote wireless networks When enabled a WDS List box is shown LAN WIRELESS 802 11N ACCESS POINT ADVANCED Internet Connection Firewall Your gateway s firewall helps protect your com puter by preventing unauthorized users from gaining access to it through a net work such as the Internet The firewall can be activated per network connection To enable the firewall on this network connection select the En...

Page 50: ...simultaneously be protected from the security threats of the Internet The firewall has been exclusively tailored to the needs of the residential office user and has been pre configured to provide optimum security The Router s firewall provides both the security and flexibility that home and of fice users seek It provides a managed professional level of network security while enabling the safe use ...

Page 51: ...in the home network is checked against the set of firewall rules to determine whether the request should be allowed to pass through the firewall If the re quest is permitted to pass then all subsequent data associated with this request a session will also be allowed to pass regardless of its direction For example when you point your Web browser to a Web page on the Internet a request is sent out t...

Page 52: ...warding DMZ host and Remote Access screens Limited by default only commonly used services such as Web browsing and e mail are permitted Typical Security Blocked no access to home network from Inter net except as configured in the Port Forwarding DMZ host and Remote Access screens Unrestricted all services are permitted except as configured in the Access Con trol screen Minimum Security Unrestricte...

Page 53: ...figured In the e mail example given above you may prevent com puters in the home network from receiving e mail by blocking their outgoing re quests to POP3 servers on the Internet There are numerous services you should consider blocking such as popular game and file sharing servers For example if you want to make sure that your employees do not put your business at risk from illegally traded copyr...

Page 54: ...al users from connecting to or communicating with your network Therefore the system is safe from hackers who may try to intrude on the net work and damage it However you may want to expose your network to the Internet in certain limited and controlled ways in order to enable some applica tions to work from the LAN game voice and chat applications for example and to enable Internet access to server...

Page 55: ...P and enter into the NAT IP Addresses Pool You will then be able to define FTP to use address X to reach computer A and address Y to reach computer B Additionally port forwarding enables you to redirect traffic to a different port in stead of the one to which it was designated Lets say that you have a Web server running on your PC on port 8080 and you want to grant access to this server to anyone ...

Page 56: ...dded only one LAN computer can be assigned to provide a specific service or application 6 The Protocol combo box lets you select or specify the type of protocol that will be used Selecting the Show All Services option will expand the list of available protocols Select a protocol or add a new one using the User De fined option This will commence a sequence that will add a new service representing t...

Page 57: ...ing a DMZ host may also put other computers in the home network at risk When designating a DMZ host you must consider the security implications and protect it if necessary An incoming request for access to a service in the home network such as a Web server is handled by the Router P RG F4202N will forward this request to the DMZ host if one is designated unless the service is being provided by ano...

Page 58: ...case you must use port triggering since this scenario conflicts with the following default firewall settings The firewall blocks inbound traffic by default The server replies to the Router s IP and the connection is not sent back to your host since it is not part of a session In order to solve this you need to define a Port Triggering entry which allows inbound traffic on UDP port 3333 only after ...

Page 59: ... the computer or group of computers for which you would like to apply the web site restric tion You can select between any a specific computer in your LAN or User Defined If you choose the User Defined option the Edit Network Object screen will appear Specifying an address is done by creating a Network Object 5 The Schedule combo box allows you to define the time period during which this rule will...

Page 60: ...th a single NAT IP address in order to assure its permanent connection to the Internet Another example is when an application server with which you wish to connect such as a security server requires that packets have a specific IP address you can define a NAT rule for that address FIGURE 7 NAT panel CONNECTIONS The connection list displays all the connections that are currently open on the firewal...

Page 61: ...tering options click Advanced Filtering under the Firewall tab in the Services screen The Advanced Filtering screen will ap pear This screen is divided into two identical sections one for Input Rule Sets and the other for Output Rule Sets which are for configuring inbound and outbound traffic respectively Each section is comprised of subsets which can be grouped into three main subjects Initial ru...

Page 62: ...ink The Add Advanced Filter screen will appear this screen is divided into two main sections Matching and Operation which are for defining the operation to be executed when matching conditions apply FIGURE 9 Advanced Filtering panel SECURITY LOG The Security Log displays a list of firewall related events including attempts to establish inbound and outbound connections attempts to authenticate thro...

Page 63: ...icates that a user has logged in to WBM CLI Login Indicates that a user has logged in to CLI via Telnet Event Type A textual description of the event Blocked The packet was blocked The message is colored red Accepted The packet was accepted The message is colored green Details More details about the packet or the event such as protocol IP ad dresses ports etc To view or change the security log set...

Page 64: ...f the P RG F4202N Be aware that any configuration changes could compromise your connectivity LINE SETTINGS The Line Settings tab of the VoIP screen defines the phone ports of the Router and allows you to configure them 1 Click the Voice Over IP side bar icon 2 Click the Line Settings tab the following screen will appear Before starting to make phone calls you need to configure each line s paramete...

Page 65: ...d dial entry must specify a destination which may be of one of three types proxy local line or direct call FIGURE 2 Speed Dial Panel Speed Dial via Proxy To add a new proxy speed dial entry 1 Click the Speed Dial tab 2 Click the New Entry link to add a new speed dial entry The Speed Dial Set tings screen will appear 3 Enter the following parameters Speed Dial A shortcut number which you will dial ...

Page 66: ...cal lines Select the des tination line 3 Click OK to save the settings Speed Dial via Direct Call To add a new direct call speed dial entry 1 Click the New Entry link on the Speed Dial tab and select the Direct Call option from the combo box 2 Enter the following parameters Speed Dial A shortcut number which you will dial to call this party Destination The entry s destination in this case a direct...

Page 67: ...uant to Cover Page Instructions Voice over IP Section HBK 939800036 A1 61 ADVANCED The IP Telephony tab of the Voice over IP screen allows configuration of dialing parameters VoIP Signaling Protocol media streaming parameters and codecs The following sections describe these various parameters ...

Page 68: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 62 HBK 939800036 A1 Voice over IP Section FIGURE 4 Advanced Panel ...

Page 69: ...hould get specific QoS Leave this value as 0XB8 default if you are unfamiliar with the differentiated Services IP protocol parameter Codecs Codecs define the method of relaying voice data Different codecs have different characteristics such as data compression and voice quality For example G 723 is a codec that uses compression so it is good for use where bandwidth is limited but its voice quality...

Page 70: ...rnet access policies and easily apply them to your home network computers As a result you may keep your children from harm s way by limiting access to adult and violent mate rial or increase employee productivity by regulating access to non work related Internet content To effectively filter Web content one must first have a good idea of the kind of information that is available on the Internet It...

Page 71: ...Services tab click the Parental Control menu item The Paren tal Control s General screen appears 2 In the Activate section select the Enable Web Content Filtering check box and click Apply A Server Status section is added 3 If you have not subscribed yet or your subscription has expired click the Click Here to Initiate and Manage your Subscription link in the Subscribe section The Web filtering su...

Page 72: ...sites under the Child Protection category Employee Blocks sites from non work related categories Block All Blocks all access to the Internet Allow All Allows unlimited Internet access These policies can be set from the Default Filtering Policy drop down menu in the Filtering Policy screen To view or edit the Home and Employee policies click their respective links in this screen To create your own ...

Page 73: ...es you can either define a default policy that will be applied to all of your LAN computers or apply different poli cies to individual computers separately LAN Filtering Policy To select a default filtering policy for the LAN select the policy name from the Default Filtering Policy drop down menu located in the Filtering Policy screen and click Apply PC Filtering Policy To apply separate policies ...

Page 74: ...l Web Access on Failure to Contact Provider The filtering service provider is consulted about every site s category in order to decide whether to allow or block it If for any reason the provider cannot be consulted use this check box to determine whether to block or allow access to all sites Redirect URL When a site is blocked an OpenRG Blocked Access page is displayed specifying the requested URL...

Page 75: ...HBK 939800036 A1 69 FIGURE 3 Advanced Options Panel STATISTICS Click the Statistics link of the Parental Control menu item under the Services tab The Statistics screen monitors content filtering statistics The statistics include a record of Access attempts Allowed URLs Blocked URLs URLs that were accessed from Cache memory FIGURE 4 Statistics Panel ...

Page 76: ...in failure of a single component along the data path can easily cause a VoIP call or a Video on Demand VoD broadcast to fail miserably QoS must therefore obviously be addressed end to end GENERAL The General tab provides a Quality of Service wizard with which you can configure your QoS parameters according to predefined profiles with just a few clicks A chosen QoS profile will automatically define...

Page 77: ...ons will receive priority Triple Play User VoIP and video streaming will receive priority Home Worker VPN and browsing will receive priority Gamer Game related traffic will receive priority Priority By Host This entry provides the option to configure which computer in your LAN will receive the highest priority and which the lowest If you have additional computers they will receive medium priority ...

Page 78: ...ietary Use Pursuant to Cover Page Instructions 72 HBK 939800036 A1 QoS Section FIGURE 1 General Panel TRAFFIC PRIORITY Traffic Priority allows you to manage and avoid traffic congestion by defining in bound and outbound priority rules for each device on your gateway These rules ...

Page 79: ...tion SPI Once a packet matches a rule all subsequent packets with the same attributes receive the same QoS parameters both inbound and outbound A packet can match more than one rule Therefore The first class rule has precedence over all other class rules scanning is stopped once the first rule is reached The first traffic priority classless rule has precedence over all other traffic priority rules...

Page 80: ...y screen will appear This screen is divided into two identical sections one for QoS input rules and the other for QoS output rules which are for prioritizing inbound and outbound traffic respectively Each section lists all the gateway devices on which rules can be set You can set rules on all de vices at once using the All devices entry 2 After choosing the traffic direction and the device on whic...

Page 81: ...al configuration makes the modem having no QoS module the bottleneck The router sends traffic as fast as it is received while its well designed QoS algorithms are left unused Traffic shaping limits the bandwidth of the router artificially forcing the router to be the bottleneck A traffic shaper is essentially a regulated queue that accepts uneven and or bursty flows of packets and transmits them i...

Page 82: ...th the Differentiated Services model Differentiated Services Diffserv is a Class of Service CoS model that en hances best effort Internet services by differentiating traffic by users service requirements and other criteria Packets are specifically marked allowing net work nodes to provide different levels of service as appropriate for voice calls video playback or other delay sensitive application...

Page 83: ... RG F4202N provides a table of predefined DSCP values which are mapped to 802 1p priority marking method You can edit or delete any of the existing DSCP setting as well as add new entries 1 Click DSCP Settings under the QoS tab in the Services screen The follow ing screen will appear 2 To edit an existing entry click its Edit action icon To add a new entry click the New Entry link In both cases th...

Page 84: ...ouped into eight levels of priority P RG F4202N maps these eight levels to three main priorities high medium and low By default values six and seven are mapped to high priority which may be assigned to network critical traffic Values four and five are mapped to medium priority which may be applied to delay sensitive applications such as interactive video and voice Values three to zero are mapped t...

Page 85: ... medium and low You can change these levels for each of the eight values in their respective combo box 3 Click OK to save the settings FIGURE 5 802 1p Settings Panel CLASS STATISTICS P RG F4202N provides you with accurate real time information on the traffic moving through your defined device classes For example the amount of pack ets sent dropped or delayed are just a few of the parameters that y...

Page 86: ... HBK 939800036 A1 QoS Section To view your class statistics click Class Statistics under the QoS tab in the Services screen The following screen will appear Note that class statistics will only be available after defining at least one class otherwise the screen will not present any information FIGURE 6 Class Statistics Panel ...

Page 87: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions QoS Section HBK 939800036 A1 81 ...

Page 88: ...n This chapter will describe the Advanced Section accessible from the Home Page of the P RG F4202N Be aware that any configuration changes could compromise your connectivity The Advanced panel collects many functionalities from the operating and con figuration point of view This chapter will describe one by one all icons and re lated features as shown in the following screen shot ...

Page 89: ...prietary Use Pursuant to Cover Page Instructions Advanced Section HBK 939800036 A1 83 FIGURE 1 Advanced Panel ABOUT P RG F4202N The About P RG F4202N screen presents various details about Router s soft ware version such as version number type of platform and list of features ...

Page 90: ... of at least two disks Please note that the backup is done at the directory level meaning that it is not possible to backup a single stand alone file To backup your data 1 Access the Backup settings either from its link in the Advanced tab under the Services screen or by clicking the Backup and Restore icon in the Ad vanced screen The Backup and Restore screen will appear 2 Click the New Entry lin...

Page 91: ...n HBK 939800036 A1 85 a time for the backup operation You can choose between daily weekly or monthly backups in the Schedule combo boxes 4 Press OK to save the schedule settings 5 Press Backup Now to run the backup operation immediately When backing up the screen will display the status and progress of the operation FIGURE 3 Backup Panel ...

Page 92: ...n as the sub directory c Choose a destination for which to restore the archive You can choose between the original location or any other directory If you choose the an other directory a second field will appear in which you must enter the name of the directory Note that the path of the restored directory will be created under the path of the destination directory For example if you specify the di ...

Page 93: ... of private and public keys FIGURE 5 Certificates Discus s Local Panel Certificate Authority CA Store This store contains a list of the trusted certifi cate authorities which is used to check certificates presented by the Router cli ents FIGURE 6 Certificates CA s Panel CONFIGURATION FILE This feature is intended to provide the whole configuration of the P RG F4202N in only one step You are asked ...

Page 94: ... Typically when you connect to the Internet your service provider assigns an unused IP address from a pool of IP ad dresses and this address is used only for the duration of a specific connection Dynamically assigning addresses extends the usable pool of available IP ad dresses whilst maintaining a constant domain name When using the DDNS service each time the IP address provided by your ISP chang...

Page 95: ...e DDNS feature you must first obtain a DDNS account For example you can open a free account at http www dyndns org account create html When applying for an account you will need to specify a user name and password DLNA This functionality allows you to configure your DLNA parameters DLNA allows entertainment devices within the home to share their content with each other across a home network ...

Page 96: ...Page Instructions 90 HBK 939800036 A1 Advanced Section FIGURE 9 DLNA Panel DNS SERVER Domain Name System DNS provides a service that translates domain names into IP addresses and vice versa The gateway s DNS server is an auto learning DNS which means that when a new computer is connected to the network the ...

Page 97: ... The DNS server does not require configuration However you may wish to view the list of computers known by the DNS edit the host name or IP address of a computer on the list or manually add a new computer to the list FIGURE 10 DNS Server Panel To add a new entry to the list 1 Click the New DNS Entry button The DNS Entry screen will appear 2 Enter the computer s host name and IP address 3 Click OK ...

Page 98: ...me offset 3 If you want the gateway to perform an automatic time update perform the following Select the Enabled check box under the Automatic Time Update section Select the protocol to be used to perform the time update by selecting wither the Time of Day or Network Time Protocol radio button Specify how often to perform the update in the Update Every field You can define time server addresses by...

Page 99: ...ant to Cover Page Instructions Advanced Section HBK 939800036 A1 93 FIGURE 11 Date and Time Panel DIAGNOSTICS The Diagnostics screen can assist you in testing network connectivity and view ing statistics such as the number of packets transmitted and received round trip time and success status ...

Page 100: ...RL to be tested in the Destination field 3 Enter the number of pings you would like to perform 4 Press the Go button 5 In a few seconds diagnostic statistics will be displayed If no new informa tion is displayed press the Refresh button ARP To perform an ARP packet test Performing a Traceroute To perform a traceroute follow these steps 1 Click the Diagnostics icon from the Advanced screen in the W...

Page 101: ... disk or a connected storage device will appear on the network map You can view information about the disk by clicking its icon The Disk Informa tion screen will appear For a broader view click the Shared Storage link from the Local Network tab of the Web based management The Disk Management screen will appear FIGURE 13 Disk Management Panel Enabled Check or un check this box to enable or disable ...

Page 102: ... FTP server allowing users and guests to access its internal disks to easily but securely exchange files Dis cus FTP access consists of two levels User Access Registered users can access predefined directories which are protected by their username and password Anonymous Access Guests can access predefined public directories This fea ture allows you FIGURE 14 FTP Server Panel FILE SERVER The Router...

Page 103: ...is box to enable or disable this feature NetBIOS Workgroup Discus workgroup name that will be displayed in the Windows net work map of LAN hosts File Server Shares Define file shares on your disk partitions FIGURE 15 File Server Panel IP ADDRESS DISTRIBUTION Your gateway s Dynamic Host Configuration Protocol DHCP server makes it possible to easily add computers that are configured as DHCP clients ...

Page 104: ...CP host devices connected to the Router Defines the range of IP addresses that can be allocated in the LAN Defines the length of time for which dynamic IP addresses are allocated Provides the above configurations for each LAN device and can be config ured and enabled disabled separately for each LAN device Can assign a static lease to a LAN PC so that it receives the same IP ad dress each time it ...

Page 105: ... unauthorized resending of data IPSec also specifies meth odologies for key management Internet Key Exchange IKE the IPSec key management protocol defines a series of steps to establish keys for encrypting and decrypting information it defines a common language on which communi cations between two parties is based Developed by the Internet Engineering Task Force IETF IPSec and IKE together standar...

Page 106: ...ture Note that checking this box creates an L2TP server if not yet created with the wizard but does not define remote users Click Here to Create VPN Users Click this link to define remote users that will be granted access to your home network Protect L2TP Connection by IPSec By default the L2TP connection is not protected by the IP Security IPSec protocol Check this option to enable this feature W...

Page 107: ...Discus Media Sharing solution enables you to share and stream media files from a storage device connected to Discus You can access the shared media files with either a networkaware Consumer Electronic CE device or from a LAN PC with an installed media rendering software Both methods utilize a Uni versal Plug and Play UPnP media renderer The Media Sharing screen con tains the following options Shar...

Page 108: ... or more MAC address IP address and host name Defining such a group can assist when configuring system rules For example network objects can be used when configuring the Router s security filtering settings such as IP address filtering host name filtering or MAC address filtering You can use network objects in order to apply security rules based on host names instead of IP addresses This may be us...

Page 109: ...ting a method from the combo box the screen will refresh presenting the respective fields by which to enter the relevant information 4 Select a method and enter the source address accordingly 5 Click OK to save the settings PPTP SERVER P RG F4202N can act as a Point to Point Tunneling Protocol Server PPTP Server accepting PPTP client connection requests This screen enables you to configure Enabled...

Page 110: ...ware image 1 Upgrading from a local computer use a software image file pre downloaded to your PC s disk drive or located on the accompanying evaluation CD 2 Upgrading from the Internet also referred to as Remote Update use this method to upgrade your Firmware by remotely downloading an updated software image file Upgrading From a Local Computer To upgrade the router s software image using a locall...

Page 111: ...yed by the line between the Check Now and Force Upgrade buttons indicating whether a new version is available or not If a new version is available Press the Force Upgrade button A download process will begin When downloading is completed a confirmation screen will appear asking you if you want to upgrade to the new version Click OK to confirm The upgrade process will begin and should take no longe...

Page 112: ...ds To view the basic protocols list click the Protocols icon in the Advanced screen Press the Advanced button at the bottom of this screen for the full list of protocols supported by the Router To define a protocol 1 Click the Protocols icon in the Advanced screen The Protocols screen will appear 2 Click the New Entry link the Edit Service screen will appear 3 Name the service in the Service Name ...

Page 113: ...DIUS server verifies the client s credentials to determine whether the device is author ized to connect to the LAN If the RADIUS server accepts the client the server responds by exchanging data with the Router including security keys for sub sequent encrypted sessions To configure the RADIUS authentication mechanism perform the following steps 1 Click the RADIUS icon in the Advanced screen of the ...

Page 114: ...ol P RG F4202N not only from within the home network but also from the Internet This allows you to view or change settings while travelling It also enables you to allow your ISP to change settings or help you troubleshoot functionality or communication issues from a remote location Remote access to the Router is blocked by default to ensure the security of your home network However remote access i...

Page 115: ...P access is available Allow Incoming WAN Access to the Telnet Server Used to create a com mand line session and gain access to all system settings and parameters using a text based terminal SSH Server Similar to Telnet this protocol is used to create a secured com mand line session and gain access to all system settings and parameters Diagnostic Tools Used for troubleshooting and remote system man...

Page 116: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 110 HBK 939800036 A1 Advanced Section FIGURE 27 Remote Administration Panel ...

Page 117: ... OK to restore Discus factory default settings FIGURE 28 Restore Defaults Panel ROUTING Access the Router s routing settings by clicking the Routing icon from the Ad vanced screen The basic Routing screen will appear Press the Advanced button to view the full routing settings Routing Table You can add edit and delete routing rules from the routing table Click the New Route link The Route Settings ...

Page 118: ... from which it was obtained Internet Group Management Protocol IGMP the Router provides support for IGMP multicasting which allows hosts connected to a network to be updated whenever an important change occurs in the network A multicast is simply a message that is sent simultaneously to a pre defined group of recipients When you join a multicast group you will receive all messages addressed to the...

Page 119: ...ted a secured command line session will grant a user access to all system settings and parameters This service can also be opened to WAN clients Click the SSH icon in the Advanced screen of the Web based management The SSH screen will appear Enabled Check or un check this box to enable or disable this feature Status This feature is enabled by default and its status appears as Running This status w...

Page 120: ...l such as PPTP or IPSec only pre defined applications may be used When using this feature non administrator remote users browsing to Discus will be routed to the SSL VPN Portal This portal will present them each with their list of applications Setting up a Remote Desktop RDP application over SSL VPN in order to re motely connect and control a computer inside Discus LAN consists of two stages creat...

Page 121: ...isplaying the RDP parameters 8 In this screen perform the following Enter a name for the shortcut Enter the IP address of the LAN computer on which the RDP will be per formed Select the Override Default Port option if the LAN computer uses a port other than the application s well known default port An additional field appears in which you must enter the alternative port If you choose the default s...

Page 122: ...l screen appears Click the name of the RDP shortcut A Remote Desktop session screen opens prompting you for login details Enter the computer s login username and password to gain RDP control If an RDP screen fails to load check that JRE is properly installed on the client computer FIGURE 31 SSL VPN Panel SCHEDULER RULES Scheduler rules are used for limiting the activation of Firewall rules to spec...

Page 123: ...ent Protocol SNMP enables network management systems to remotely configure and monitor Discus Your Internet Service Pro vider ISP may use SNMP in order to identify and resolve technical problems Technical information regarding the properties of Discus SNMP agent should be provided by your ISP To configure Discus SNMP agent perform the following 1 Access this feature either from the Management menu...

Page 124: ...otify the manager about the occurrence of important events or serious conditions Discus supports both SNMP version 1 and SNMP version 2c traps Check the Enabled check box to enable this feature The screen re freshes displaying the following fields Version Select between version SNMP v1 and SNMP v2c Destination The remote management station s IP address Community Enter the community name that will ...

Page 125: ...more refined list This ability is useful mainly for software developers debugging Discus By default the screen displays log messages with debug severity level and higher for all components You may change the severity level for this filter To add a new filter click the New Filter link or its corresponding icon The screen refreshes Using the drop down lists select the component and severity level by...

Page 126: ...in which the WBM session will remain active When this duration times out the user will have to re login Language Select a different language for the WBM interface Management Application Ports Configure the following management applica tion ports 1 Primary secondary HTTP ports 2 Primary secondary HTTPS ports 3 Primary secondary Telnet ports 4 Secure Telnet over SSL ports Management Application SSL ...

Page 127: ...ail Address field Port Enter the port that is used by your outgoing mail server Server Requires Authentication If your outgoing mail server requires authenti cation check the Server Requires Authentication check box and enter your user name and password in the User Name and Password fields respectively SWAP If enabled it allows to define the swap size MB HTTP Interception When no Internet connecti...

Page 128: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 122 HBK 939800036 A1 Advanced Section FIGURE 35 System Settings Panel ...

Page 129: ...lly connect with your UMTS according to pre defined rules FIGURE 36 UMTS Panel UNIVERSAL PLUG AND PLAY Universal Plug and Play is a networking architecture that provides compatibility among networking equipment software and peripherals UPnP enabled prod ucts can seamlessly connect and communicate with other Universal Plug and Play enabled devices without the need for user configuration centralized...

Page 130: ... users according to your preferences To access the user settings click the Users icon in the Ad vanced screen The Users screen will appear This screen lists the users and groups defined in the Router The Administrator is a default user provided by the system FIGURE 38 Users Panel To add a new user click the New User link The User Settings screen will ap pear Full Name The remote user s full name U...

Page 131: ...tor Permissions Grants permissions to remotely modify system setting via Web based management or Telnet Remote Access by SSL VPN Grants remote access to the Router using the SSL VPN protocol Mail Server Access Grants permission to use the Router s mail server When selecting this option you must also enable the user home directory and mailbox in the following sections Microsoft File and Printer Sha...

Page 132: ...ol is TCP IP Windows machines identify themselves to the WINS server so that other Win dows machines can query the server to find the IP address Since the WINS server itself is contacted by IP address which can be routed across subnets WINS allows Windows machines on one LAN segment to locate Windows ma chines on other LAN segments by name When a host connects to the LAN it is assigned an IP addre...

Page 133: ...ace you want to use and the MAC address of the PC to Wake Up FIGURE 40 Wake Up on LAN Panel WEB SERVER P RG F4202N can operate as a Web server hosting one or more Web sites which are accessible from the LAN or the WAN The advantages of this feature are The Web site is hosted on P RG F4202N eliminating the need to assign a station on the LAN to act as a Web server or to outsource expensive hosted s...

Page 134: ...ck box 3 In the Data Location field enter the user s sub directory containing the Web site s content 4 Click OK to save the settings You can configure any number of additional Web sites on the P RG F4202N Web server Each of these sites will appear to the Internet user as if they are located on separate hosts This method is referred to as Virtual Hosts In addition you can add any number of aliases ...

Page 135: ... All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions Advanced Section HBK 939800036 A1 129 6 Click OK to save the settings Your site s URL and alias are added to the Virtual Hosts section of the Web server FIGURE 41 Web Server Panel ...

Page 136: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 130 HBK 939800036 A1 Advanced Section ...

Page 137: ... aware that any configuration changes could compromise your connectivity NETWORK CONNECTIONS The Monitoring screen displays a table summarizing the monitored connection data P RG F4202N constantly monitors traffic within the local network and between the local network and the Internet You can view statistical information about data received from and transmitted to the Internet WAN and to computers...

Page 138: ... Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 132 HBK 939800036 A1 System Monitoring Section FIGURE 1 Network Connections Panel SYSTEM LOG The Log screen displays a list of the most recent activity that has taken place on the Router ...

Page 139: ...E 2 System Log Panel CPU The CPU screen displays the amount of time that has passed since the system was last started and the load average In addition the screen also displays a list of all the processes currently running on the Router and their virtual memory usage The screen is automatically refreshed by default though you may change this by clicking Automatic Refresh Off ...

Page 140: ...P RG F4202N 2010 Pirelli Broadband Solutions S p A All Rights Reserved Proprietary Use Pursuant to Cover Page Instructions 134 HBK 939800036 A1 System Monitoring Section FIGURE 3 CPU Panel ...

Page 141: ...es not illuminate for a port that is connected check that you do not have a faulty cable Try a different cable BROWSING TO THE ROUTER CONFIGURATION SCREENS If you have connected your Router and computers together but cannot browse to the Router configuration screens check the following Confirm that the physical connection between your computer and the Router is OK and that the LAN Status LEDs on t...

Page 142: ...connection between the Router and the fiber line is OK and that the WAN LED on the Router is GREEN on Ensure that you have entered the correct information into the Router configu ration screens as required Use the Internet Settings screen to verify this Check that the user name and password are correct Ensure that your computers are not configured to use a Web proxy On Win dows computers this can ...

Page 143: ...er or trying a different channel on the Router Sources of interference The 2 4GHz ISM band is used for 802 11b 802 11g and 802 11n This is generally a licence free band for low power applica tions and you may have other devices at your location that operate in this frequency band You should take care to ensure that there are no devices like microwave ovens for example close to the Router or wirele...

Page 144: ...How many computers on the LAN does the Router support Up to a maxi mum of 256 computers on the LAN are supported The Quality of Service QoS is related to the guaranteed level of throughput the amount of data transferred from the Router to the clients As many clients are connected as lower is the Quality as Service How many wireless clients does the Router support A maximum of 15 wireless clients a...

Page 145: ...or shock hazard do not expose your Router to rain or moisture liquid and toxic sub stances Particular care must be taken during installation and removal of cables and telephone line Never touch uninsulated telephone wire or terminals unless the telephone line has been disconnected at the network interface Ensure the correct ventilation to the Router Do not obstruct the air conducts and do not lean...

Page 146: ...on schemes provided for waste electrical and electronic equipment The separate collection and appropriate treatment of the equipment at the time of disposal helps to con serve natural resources and to ensure that it is recycled in a manner that protects human health and the environment from materials components and substances that can be dangerous to the environment and harmful to human health Fur...

Page 147: ...twork IP ad dresses have the format n n n x where n is a decimal number between 0 and 255 and x is a number between 1 and 254 inclusive However an IP Address alone is not enough to make your device operate In addition to the IP address you need to set a subnet mask All networks are divided into smaller sub networks and a subnet mask is a num ber that enables a device to identify the sub network to...

Page 148: ...nnect from the network DHCP will work on any client Operating System Also using DHCP means that the same IP address and subnet mask will never be duplicated for devices on the network DHCP is particularly useful for networks with large numbers of users on them Static Addressing You must enter an IP Address and the subnet mask manually on every device Using a static IP and subnet mask means the add...

Page 149: ...er Class 1 IEC 60825 1 2007 Link distance up to 15Km Option 3G WAN back up LAN Interface N 4 10 100BASE T Ethernet ports RJ 45 plug compliant IEEE 802 3 with auto MDIX and auto negotiation Ports can be configured in order to be dedicated to video traffic to from a STB N 2 USB Host v 2 0 Wireless LAN Interface Wi Fi access point solution is compliant with the following standards IEEE 802 11b g IEEE...

Page 150: ...port Multiple strict priority and Weighted Round Robin WRR priority queues Shaping per queue and aggregate output rate limiting scheduler configurable parameters selective packet dropping based on Random Early Discard RED Marking Layer 2 and or Layer 3 configurable priority field re marking tagging untagging Voice Over IP Codecs G 711 a law µ law G 729 G 726 G 723 Codecs Control RTP RTCP RFC 1889 ...

Page 151: ...e v1 1 Data Model Broadband Forum TR 104 DSLHome Provisioning Parameters for VoIP CPE Broadband Forum TR 111 Security Stateful Packet Inspection SPI Firewall IP protocol filtering Access Control Parental control Environmental Specifications Temperature Operating 0 to 40 C Non Operating 20 to 65 C Relative Humidity Operating 10 to 85 non condensing Non Operating 5 to 95 non condensing Power Adapter...

Page 152: ... 2 of the R TTE Directive 1999 5 EEC of the European Community Standards Applied EN 55022 EN 61000 3 2 EN 61000 3 3 EN 301 489 1 EN 301 489 17 EN 300 328 EN 60950 1 National Authorities were informed according to Article 6 4 of Frequency Notification Special Requirements are considered The product is labeled with CE Marking Any unauthorized modification of the product voids this declaration This p...

Page 153: ...g requirement The affixed product label see above indicates that you must not discard this electrical electronic product in domestic household waste Product category With reference to the equipment types in the WEEE directive Annex 1 this product is clas sified as an IT and telecommunications equipment product Do not dispose in domestic household waste ...

Page 154: ...less clients connect to other wireless clients and which acts as a bridge between wireless clients and a wired network such as Ethernet Wireless clients can be moved anywhere within the coverage area of the access point and still connect with each other If connected to an Ethernet network the access point monitors Ethernet traffic and forwards appropriate Ethernet messages to the wireless network ...

Page 155: ...s Client The term used to described the desktop PC that is connected to your network DHCP Dynamic Host Configuration Protocol This protocol automatically assigns an IP address for every computer on your network Windows 95 Windows 98 and Windows NT 4 0 contain software that assigns IP addresses to workstations on a network These assignments are made by the DHCP server software that runs on Win dows...

Page 156: ... data transmissions The Router uses two levels of en cryption 40 64 bit and 128 bit 128 bit is a more powerful level of encryption than 40 64 bit Ethernet A LAN specification developed jointly by Xerox Intel and Digital Equipment Corporation Ethernet networks use CSMA CD to transmit packets at a rate of 10 Mbps over a variety of cables Ethernet Address See MAC address Fast Ethernet An Ethernet sys...

Page 157: ...order for them to communicate with the Access Point built into your Router see also Ad Hoc mode IP Internet Protocol IP is a layer 3 network protocol that is the standard for sending data through a network IP is part of the TCP IP set of protocols that describe the routing of packets to addressed devices An IP ad dress consists of 32 bits divided into two or three fields a network number and a hos...

Page 158: ...your network to share one IP address The NAT capability of the Router allows you to access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP Network A Network is a collection of computers and other computer equipment that are connected for the purpose of exchanging information or sharing resources Networks vary in size some are within a ...

Page 159: ...allows a site to use a single IP network address for multiple physical networks Subnet mask A subnet mask which may be a part of the TCP IP information provided by your ISP is a set of four numbers configured like an IP address It is used to create IP address numbers used only within a particular network as opposed to valid IP address numbers recognized by the Internet which must assigned by Inter...

Page 160: ...sing inappropriate Web sites UTP Unshielded twisted pair is the cable used by 10BASE T and 100BASE Tx Ethernet networks VCI VCI Virtual Channel Identifier The identifier in the ATM Asynchronous Transfer Mode cell header that identifies to which virtual channel the cell belongs VPI VPI Virtual Path Identifier The field in the ATM Asynchronous Transfer Mode cell header that identifies to which VP Vi...

Page 161: ...nnected to your wireless network Wireless LAN Service Area Another term for ESSID Extended Service Set Identifier Wizard A Windows application that automates a procedure such as installation or configuration WLAN Wireless Local Area Network A WLAN is a group of computers and devices connected together by wireless in a relatively small area such as a house or office WPA Wi Fi Protected Access A dyn...

Page 162: ......

Reviews: