ZyXEL Communications eir F1000 User Manual Download Page 342

342

 

eir F1000 Modem U

ser’s Guide 

Appendix E IPv6 

 

 

 

 

the time T2 is reached and the server does not respond, the client sends a Rebind message to any 
available server (

S2

). For an IA_TA, the client may send a Renew or Rebind message at the client's 

discretion. 

T2 

T1 

 

 

 

Renew 
to S1

 

Renew 
to S1

 

Renew 
to S1

 

Renew 
to S1

 

Renew 
to S1

 

Renew 
to S1

 

 

Rebind 
to S2

 

Rebind 
to S2

 

 

 

DHCP Relay Agent

 

 

A DHCP relay agent is on the same network as the DHCP clients and helps forward messages 
between the DHCP server and clients. When a client cannot use its link-local address and a well- 
known multicast address to locate a DHCP server on its network, it then needs a DHCP relay agent 
to send a message to a DHCP server that is not attached to the same network. 

 

The DHCP relay agent can add the remote identification (remote-ID) option and the interface-ID 
option to the Relay-Forward DHCPv6 messages. The remote-ID option carries a user-defined string, 
such as the system name. The interface-ID option provides slot number, port information and the 
VLAN ID to the DHCPv6 server. The remote-ID option (if any) is stripped from the Relay-Reply 
messages before the relay agent sends the packets to the clients. The DHCP server copies the 
interface-ID option from the Relay-Forward message into the Relay-Reply message and sends it to 
the relay agent. The interface-ID should not change even after the relay agent restarts. 

 

Prefix Delegation

 

 

Prefix delegation enables an IPv6 router to use the IPv6 prefix (network address) received from the 
ISP (or a connected uplink router) for its LAN. The Device uses the received IPv6 prefix (for 
example, 2001:db2::/48) to generate its LAN IP address. Through sending Router Advertisements 
(RAs) regularly by multicast, the Device passes the IPv6 prefix information to its LAN hosts. The 
hosts then can use the prefix to generate their IPv6 addresses. 

 

 

ICMPv6

 

 

Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. 
ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify 
ICMP for IPv4. ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to report errors 
encountered in packet processing and perform other diagnostic functions, such as "ping". 

 

 

Neighbor Discovery Protocol (NDP)

 

 

The Neighbor Discovery Protocol (NDP) is a protocol used to discover other IPv6 devices and track 
neighbor’s reachability in a network. An IPv6 device uses the following ICMPv6 messages types: 

 

•  Neighbor solicitation: A request from a host to determine a neighbor’s link-layer address (MAC 

address) and detect if the neighbor is still reachable. A neighbor being “reachable” means it 
responds to a neighbor solicitation message (from the host) with a neighbor advertisement 
message. 

Summary of Contents for eir F1000

Page 1: ...igabit IAD Version 1 00 Edition 1 6 2013 User s Guide Default Login Details LAN IP Address http 192 168 1 254 Login admin Password Default password is the wireless key printed on the back of the Devic...

Page 2: ...THIS GUIDE FOR FUTURE REFERENCE Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system Every effort...

Page 3: ...etwork Address Translation NAT 153 Dynamic DNS Setup 171 Interface Group 175 USB Service 181 Firewall 187 MAC Filter 195 Parental Control 197 Scheduler Rule 201 Certificates 203 VPN 211 Log 225 Traffi...

Page 4: ...4 eir F1000 Modem User s Guide Contents Overview Diagnostic 273 Troubleshooting 279...

Page 5: ...8 1 4 2 Device s USB Support 19 1 5 LEDs Lights 20 1 6 The RESET Button 22 1 7 Wireless Access 22 1 7 1 Using the Wi Fi and WPS Buttons 22 1 8 Wall mounting Instructions 23 Chapter 2 The Web Configura...

Page 6: ...view 69 5 1 1 What You Can Do in this Chapter 69 5 1 2 What You Need to Know 70 5 2 The General Screen 70 5 2 1 No Security 73 5 2 2 Basic WEP Encryption 73 5 2 3 More Secure WPA 2 PSK 75 5 2 4 WPA 2...

Page 7: ...ID Screen 121 6 9 The 5th Ethernet Port Screen 121 6 10 The LAN VLAN Screen 122 6 11 The Wake on LAN Screen 123 6 12 Technical Reference 124 6 12 1 LANs WANs and the Device 124 6 12 2 DHCP Setup 124...

Page 8: ...warding 156 9 3 The Applications Screen 157 9 3 1 Add New Application 158 9 4 The Port Triggering Screen 159 9 4 1 Add Edit Port Triggering Rule 160 9 5 The DMZ Screen 161 9 6 The ALG Screen 162 9 7 T...

Page 9: ...nter Server 184 12 4 1 Before You Begin 185 12 4 2 The Printer Server Screen 185 Chapter 13 Firewall 187 13 1 Overview 187 13 1 1 What You Can Do in this Chapter 187 13 1 2 What You Need to Know 188 1...

Page 10: ...er 18 VPN 211 18 1 Overview 211 18 2 The IPSec VPN General Screen 211 18 3 The IPSec VPN Add Edit Screen 212 18 4 The IPSec VPN Monitor Screen 218 18 5 Technical Reference 218 18 5 1 IPSec Architectur...

Page 11: ...35 22 2 ARP Table Screen 235 Chapter 23 Routing Table 237 23 1 Overview 237 23 2 The Routing Table Screen 237 Chapter 24 IGMP MLD Status 239 24 1 Overview 239 24 2 The IGMP MLD Group Status Screen 239...

Page 12: ...verview 257 31 2 The Time Screen 257 Chapter 32 E mail Notification 261 32 1 Overview 261 32 2 The Email Notification Screen 261 32 2 1 Email Notification Edit 262 Chapter 33 Log Setting 263 33 1 Over...

Page 13: ...ing 279 37 1 Power Hardware Connections and LEDs 279 37 2 Device Access and Login 280 37 3 Internet Access 282 37 4 Wireless Internet Access 283 37 5 USB Device Connection 284 37 6 UPnP 284 Appendix A...

Page 14: ...14 eir F1000 Modem User s Guide Table of Contents...

Page 15: ...PART I User s Guide 15...

Page 16: ...16...

Page 17: ...thods to manage the Device Web Configurator This is recommended for everyday management of the Device using a supported web browser TR 069 This is an auto configuration server used to remotely configu...

Page 18: ...N layer 2 interfaces that you configure in the Device Refer to Section 4 2 on page 45 for the Network Setting Broadband screen Computers can connect to the Device s LAN ports or wirelessly Figure 1 De...

Page 19: ...emory stick or a USB hard drive B You can connect one USB hard drive to the Device at a time Use FTP to access the files on the USB device Figure 2 USB File Sharing Application B A Media Server You ca...

Page 20: ...e following graphic displays the labels of the LEDs Figure 5 LEDs on the Device 2 4G None of the LEDs are on if the Device is not receiving power Table 1 LED Descriptions LED COLOR STATUS DESCRIPTION...

Page 21: ...he Device is sending or receiving data to from the LAN at 1000 Mbps Off The Device does not have an Ethernet connection with the LAN WiFi 2 4G Green On The 2 4 GHz wireless network is activated Blinki...

Page 22: ...defaults have been restored and the device restarts 1 7 Wireless Access The Device is a wireless Access Point AP for wireless clients such as notebook computers or PDAs and iPads It allows them to con...

Page 23: ...e Wi Fi button for one to five seconds The WiFi 2 4G LED turns off when the wireless network is off 1 8 Wall mounting Instructions Do the following to hang your Device on a wall 1 Locate a high positi...

Page 24: ...1 Introducing the Device 5 Push the bracket up to tightly attach it to the Device 6 Mount the Device on the screws which are already installed on the wall Make sure that the Device is firmly attached...

Page 25: ...cking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default Java permissions enabled by default See Appendix C on page 315 if you need to make sure these functions are al...

Page 26: ...ype it to confirm and click Apply alternatively click Skip to proceed to the main menu if you do not want to change the password now Figure 8 Change Password Screen The following screen displays and a...

Page 27: ...27 eir F1000 Modem User s Guide Chapter 2 The Web Configurator Figure 10 Connection Status...

Page 28: ...ded into these parts A title bar B main window C navigation panel 2 2 1 Title Bar The title bar shows the following icons in the upper right corner Click the Help icon to get support on eir s website...

Page 29: ...navigation panel to open screens to configure Device features The following tables describe each menu item Table 2 Navigation Panel Summary LINK TAB FUNCTION Connection Status This screen shows the De...

Page 30: ...UPnP and UPnP NAT T on or off Additional Subnet Use this screen to configure IP alias and public static IP STB Vendor ID Use this screen to have the Device automatically create static DHCP entries fo...

Page 31: ...print server on the Device and get the model name of the associated printer Security Settings Firewall General Use this screen to configure the security level of your firewall Protocol Use this screen...

Page 32: ...specific traffic directions for network services TR 064 Use this screen to enable management via TR 064 on the LAN SNMP Use this screen to configure SNMP Simple Network Management Protocol settings T...

Page 33: ...PART II Technical Reference 33...

Page 34: ...34...

Page 35: ...reen to look at the current status of the Device system resources and interfaces LAN WAN and WLAN Use the Network Map screen to view the network connection status of the Device and clients connected t...

Page 36: ...advertisements IPv6 Link Local Address This is the link local address the Device generated itself for the WAN interface Encapsulation This field displays the current encapsulation method LAN Informat...

Page 37: ...start the device See Section 35 2 on page 269 or turn off the device unplug the power for a few seconds NAT Session Usage This field displays what percentage of the Device supported NAT sessions are c...

Page 38: ...on 3 3 1 on page 39 for more information Figure 14 Network Map Icon View Mode By clicking a client s name you can do the following Click Info to view information about the client Select Add device int...

Page 39: ...ange the name or icon of the client If you prefer to view the status in a list click List View in the Viewing mode selection box You can configure how often you want the Device to update this screen i...

Page 40: ...gure 16 Diagnostic Screen No DSL Connection This screen appears when your WAN connection is up but the Device fails to connect to the Internet Figure 17 Diagnostic Screen Internet Connection Is Not Wo...

Page 41: ...rs in other locations Figure 19 LAN and WAN WAN 3G third generation standards for the sending and receiving of voice video and data in a mobile environment You can attach a 3G wireless adapter to the...

Page 42: ...and MTU Bridge N A ATM PVC configuration and QoS EtherWAN N A Routing PPPoE PPP user name and password WAN IPv4 IPv6 IP address routing feature DNS server VLAN QoS and MTU IPoE WAN IPv4 IPv6 IP addre...

Page 43: ...ides broadband Internet access to mobile devices IPv6 Introduction IPv6 Internet Protocol version 6 is designed to enhance IP address size and features The increase in IPv6 address size to 128 bits fr...

Page 44: ...4 packets to cross eir s IPv4 network The Device generates a global IPv6 prefix from its IPv4 WAN address and tunnels IPv6 traffic to eir s Border Relay router BR in the figure to connect to the nativ...

Page 45: ...Network Setting Broadband from the menu The summary table shows you the configured WAN services connections on the Device Figure 23 Network Setting Broadband The following table describes the labels i...

Page 46: ...he Device act as an IGMP proxy on this connection NAT This shows whether NAT is activated or not for this connection Default Gateway This shows whether the Device use the WAN interface of this connect...

Page 47: ...nt The following example screen displays when you select the ADSL VDSL over ATM connection type Routing mode and PPPoE encapsulation The screen varies when you select other interface type encapsulatio...

Page 48: ...one RFC 1483 routing connection over a PVC Encapsulation Mode Select the method of multiplexing used by your ISP from the drop down list box Choices are LLC SNAP BRIDGING In LCC encapsulation bridged...

Page 49: ...automatically disconnects from the PPPoE server This field is not configurable if you select Auto Connect in the PPP Triger Type field PPPoE Service Name Enter the name of your PPPoE service here PPPo...

Page 50: ...s IP Address Select this option and enter the IP address of the computer on the LAN whose MAC you are cloning It is advisable to clone the MAC address from a computer on your LAN even if your ISP does...

Page 51: ...stinations IPv6 Routing Feature This is available only when you select IPv6 IPv4 DualStack or IPv6 Only in the IPv6 IPv4 Mode field You can enable IPv6 routing features in the following section MLD Pr...

Page 52: ...ect ADSL VDSL over PTM as the interface type the following screen appears Figure 25 Network Setting Broadband Add New WAN Interface Edit Bridge Mode The following table describes the fields in this sc...

Page 53: ...n QoS Rate Limit Enter the rate limit for the connection This is the maximum transmission rate allowed for traffic on this connection Apply Click Apply to save your changes Cancel Click Cancel to exit...

Page 54: ...it VC To transport multiple protocols the Device needs separate VCs There is a binding between a VC and the type of the network protocol carried on the VC This reduces payload overhead since there is...

Page 55: ...ving 4 3 The 3G Backup Screen The USB ports at the left side panel of the Device allow you to attach a 3G dongle to wirelessly connect to a 3G network for Internet access You can have the Device use t...

Page 56: ...ant the Device to ping check the connection status of your WAN You can configure the frequency of the ping check and number of consecutive failures before triggering 3G backup Check Cycle Enter the fr...

Page 57: ...do not want the connection to time out Select on Demand if you do not want the connection up all the time and specify an idle time out in the Max Idle Timeout field Max Idle Timeout This value specifi...

Page 58: ...it on the total traffic in both directions Select Download to set a limit on the downstream traffic from the ISPto the Device Select Upload to set a limit on the upstream traffic from the Device to th...

Page 59: ...Advanced Screen Use the Advanced screen to enable or disable ADSL over PTM Annex M DSL PhyR and SRA Seamless Rate Adaption functions The Device supports the PhyR retransmission scheme PhyR is a retran...

Page 60: ...work Setting Broadband 802 1x The following table describes the labels in this screen Table 11 Network Setting Network Setting 802 1x LABEL DESCRIPTION This is the index number of the entry Status Thi...

Page 61: ...ace to which the authentication applies EAP Identity Enter the EAP identity of the authentication EAP method This is the EAP method used for this authentication Enable Bidirectional Authentication Sel...

Page 62: ...ionality in a manner similar to dial up services using PPP PPPoE is an IETF standard RFC 2516 specifying how a personal computer PC interacts with a broadband modem DSL cable wireless etc connection F...

Page 63: ...er and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network This agreement helps eliminate congestion which is important for transmission of real time...

Page 64: ...RT or non real time VBR nRT connections The VBR RT real time Variable Bit Rate type is used with bursty connections that require closely controlled delay and delay variation It also provides a fixed...

Page 65: ...a specific broadcast domain Introduction to IEEE 802 1Q Tagged VLAN A tagged VLAN uses an explicit tag VLAN ID in the MAC header to identify the VLAN membership of a frame across bridges they are not...

Page 66: ...S to map a domain name to its corresponding IP address and vice versa for instance the IP address of www zyxel com is 204 217 0 2 The DNS server is extremely important because without it you must know...

Page 67: ...em User s Guide Chapter 4 Broadband compose the network address The prefix length is written as x where x is a number For example 2001 db8 1a2b 15 1a2f 0 32 means that the first 32 bits 2001 db8 is th...

Page 68: ...68 eir F1000 Modem User s Guide Chapter 4 Broadband...

Page 69: ...ation screen to allow or deny wireless clients based on their MAC addresses from connecting to the Device Section 5 4 on page 81 Use the WPS screen to enable or disable WPS view or generate a security...

Page 70: ...quire a license to use However wireless networking is different from that of most traditional radio communications in that there a number of wireless networking standards available with different meth...

Page 71: ...following table describes the general wireless LAN labels in this screen Table 13 Network Setting Wireless General LABEL DESCRIPTION Wireless Network Setup Wireless You can Enable or Disable the wirel...

Page 72: ...have the Device generate a password the setting in this field determines how the Device generates the password Select None to set the Device s password generation to not be based on a passphrase Selec...

Page 73: ...ption or authentication Note If you do not enable any wireless security on your Device your network is accessible to any wireless networking device that is within range Figure 34 Wireless General No S...

Page 74: ...automatically generate a password The password field will not be configurable when you select this option Password 1 The password WEP key is used to encrypt data Both the Device and the wireless stati...

Page 75: ...n Table 16 Wireless General More Secure WPA 2 PSK LABEL DESCRIPTION Security Level Select More Secure to enable WPA 2 PSK data encryption Security Mode Select WPA PSK or WPA2 PSK from the drop down li...

Page 76: ...is a full implementation the security protocol Use this security option for maximum protection of your network However it is the least backwards compatible with older devices The WPA security mode is...

Page 77: ...Select the encryption type TKIP AES or TKIP AES for data encryption Select TKIP if your wireless clients can all use TKIP Select AES if your wireless clients can all use AES Select TKIP AES to allow t...

Page 78: ...ier identifies the Service Set with which a wireless device is associated This field displays the name of the wireless profile on the network When a wireless client scans for an AP to associate with t...

Page 79: ...Setting Wireless More AP Edit LABEL DESCRIPTION Wireless Network Setup Wireless You can Enable or Disable the wireless LAN in this field Passphrase Type Passphrase type cannot be changed The default i...

Page 80: ...each other directly A Home Guest screen appears A graphic shows whether the wireless clients can access other clients in the same wireless network and in other networks Click Apply to save the change...

Page 81: ...de specific devices from accessing the ZyXEL Device Deny Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hex...

Page 82: ...lick Apply to save your changes Cancel Click Cancel to exit this screen without saving 5 5 The WPS Screen Use this screen to configure WiFi Protected Setup WPS on your Device WPS allows you to quickly...

Page 83: ...k You can find the PIN either on the outside of the device or by checking the device s settings Note You must also activate WPS on that device within two minutes to have it present its PIN to the Devi...

Page 84: ...g data Note Note This works only if the wireless device to which the Device is connected also supports this feature Apply Click Apply to save your changes Cancel Click Cancel to restore your previousl...

Page 85: ...lable only when you set operating mode to Access Point Select Enabled to turn on WDS and enter the peer device s MAC address manually in the table below Select Disable to turn off WDS Remote Bridge MA...

Page 86: ...els in this screen Table 24 WDS Scan LABEL DESCRIPTION Wireless Bridge Scan Setup Refresh Click Refresh to update the table This is the index number of the entry SSID This shows the SSID of the availa...

Page 87: ...channel Enter 0 to disable the periodical scan Output Power Set the output power of the Device If there is a high density of APs in an area decrease the output power to reduce interference with other...

Page 88: ...vices transmit data after a RTS CTS handshake This helps improve IEEE 802 11g performance Select Off to disable 802 11 protection The transmission rate of your Device might be reduced in a mixed mode...

Page 89: ...Technical Reference This section discusses wireless LANs in depth For more information see Appendix D on page 325 5 10 1 Wireless Network Overview Wireless networks consist of wireless clients access...

Page 90: ...the AP Every wireless network must follow these basic guidelines Every device in the same wireless network must use the same SSID The SSID is the name of the wireless network It stands for Service Set...

Page 91: ...er threshold provides faster performance if the network is not very busy 5 10 3 Wireless Security Overview By their nature radio communications are simple to intercept For wireless data networks this...

Page 92: ...00A0C5000002 or 00 A0 C5 00 00 02 To get the MAC address for each device in the wireless network see the device s User s Guide or other documentation You can use the MAC address filter to tell the Dev...

Page 93: ...etwork has two devices Device A only supports WEP and device B supports WEP and WPA Therefore you should set up Static WEP in the wireless network Note It is recommended that wireless networks use WPA...

Page 94: ...unicate with each other When Intra BSS traffic blocking is enabled wireless station A and B can still access the wired network but cannot communicate with each other Figure 48 Basic Service set 5 10 6...

Page 95: ...preamble when all wireless devices on the network support it otherwise the Device uses long preamble Note The wireless devices MUST use the same preamble mode in order to communicate 5 10 8 Wireless...

Page 96: ...the Device see Section 5 6 on page 83 3 Press the button on one of the devices it doesn t matter which For the Device you must press the WPS button for more than three seconds 4 Within two minutes pr...

Page 97: ...N in the AP s configuration interface 5 If the client device s configuration interface has an area for entering another device s PIN you can either enter the client s PIN in the AP or enter the AP s P...

Page 98: ...WPS enabled devices connect each device must assume a specific role One device acts as the registrar the device that supplies network and security settings and the other device acts as the enrollee th...

Page 99: ...can be a registrar and so can some WPS enabled wireless clients By default a WPS devices is unconfigured This means that it is not part of an existing network and can act as either enrollee or registr...

Page 100: ...step 2 you add another wireless client to the network You know that Client 1 supports registrar mode but it is better to use AP1 for the WPS handshake with the new client since you must connect to th...

Page 101: ...ces simultaneously you must enroll one after the other For instance if you have two enrollees and one registrar you must set up the first enrollee by pressing the WPS button on the registrar and the f...

Page 102: ...if this has happened WPS works between only two devices simultaneously so if another device has enrolled your device will be unable to enroll and will not have access to the network If this happens op...

Page 103: ...ters based on their MAC Addresses Section 6 3 on page 109 Use the UPnP screen to enable UPnP and UPnP NAT traversal on the Device Section 6 4 on page 110 Use the Additional Subnet screen to configure...

Page 104: ...you can access it RADVD Router Advertisement Daemon When an IPv6 host sends a Router Solicitation RS request to discover the available routers RADVD with Router Advertisement RA messages in response t...

Page 105: ...achieved UPnP certification from the Universal Plug and Play Forum UPnP Implementers Corp UIC ZyXEL s UPnP implementation supports Internet Gateway Device IGD 1 0 See Section 6 5 on page 111 for examp...

Page 106: ...e 255 255 255 0 factory default Your Device automatically computes the subnet mask based on the IP Address you enter so do not change this field unless you are instructed to do so IGMP Snooping Status...

Page 107: ...s only available when you select Enable in the DHCP field DNS Select the type of service that you are registered for from your Dynamic DNS service provider Select Dynamic if you have the Dynamic DNS s...

Page 108: ...v6 DNS Assign Setup Select how the Device provide DNS server and domain name information to the clients From Router Advertisement The Device provides DNS information through router advertisements From...

Page 109: ...to add a new static DHCP entry This is the index number of the entry Status This field displays whether the static DHCP is active or not A yellow bulb signifies that this static DHCP is active A gray...

Page 110: ...put to manually enter a device s MAC address and IP address in the following fields MAC Address If you select Manual Input enter the MAC address of a computer on your LAN IP Address If you select Manu...

Page 111: ...e by using NAT traversal UPnP applications automatically reserve a NAT forwarding port in order to communicate with another UPnP enabled device this eliminates the need to manually configure port forw...

Page 112: ...Networking 112 eir F1000 Modem User s Guide 1 Click Start and Control Panel Double click Add Remove Programs 2 Click on the Windows Setup tab and select Communication in the Components selection box...

Page 113: ...OK to go back to the Add Remove Programs Properties window and click Next 5 Restart the computer when prompted Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP 1...

Page 114: ...x and click Details 5 In the Networking Services window select the Universal Plug and Play check box 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next 6 6...

Page 115: ...mputer and the Device Auto discover Your UPnP enabled Network Device 1 Click Start and Control Panel Double click Network Connections An icon displays under Internet Gateway 2 Right click the icon and...

Page 116: ...he port mappings or click Add to manually add port mappings 5 When the UPnP enabled device is disconnected from your computer all port mappings will be deleted automatically 6 Select Show icon in noti...

Page 117: ...Configurator Easy Access With UPnP you can access the web based configurator on the Device without finding out the IP address of the Device first This comes helpful if you do not know the IP address...

Page 118: ...er s Guide 3 Select My Network Places under Other Places 4 An icon with the description for each UPnP enabled device displays under Local Network 5 Right click on the icon for your Device and select I...

Page 119: ...Chapter 6 Home Networking 119 eir F1000 Modem User s Guide 6 Right click on the icon for your Device and select Properties A properties window displays with basic information about the Device...

Page 120: ...ting Home Networking Additional Subnet The following table describes the labels in this screen Table 32 Network Setting Home Networking Additional Subnet LABEL DESCRIPTION IP Alias Setup Group Name Se...

Page 121: ...n IP address that gets assigned to another device Use this screen to list the Vendor IDs of connected STBs to have the Device automatically create static DHCP entries for them when they request IP add...

Page 122: ...tworking 5th Ethernet Port LABEL DESCRIPTION State Select Enable to use the Ethernet WAN port as a LAN port on the Device Apply Click Apply to save your changes Cancel Click Cancel to exit this screen...

Page 123: ...this LAN port s downstream traffic specify the VLAN ID from 0 to 4094 to use here Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without saving 6 11 The Wake on LAN Scr...

Page 124: ...service off you must have another DHCP server on your LAN or else the computer must be manually configured IP Pool Setup The Device is pre configured with a pool of IP addresses for the DHCP clients D...

Page 125: ...onnection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255 0 and you must enable the Network Address Translation NAT feature of the...

Page 126: ...e Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Note Regardl...

Page 127: ...e static routes For example the next figure shows a computer A connected to the Device s LAN interface The Device routes most traffic from A to the Internet through the Device s default gateway R1 You...

Page 128: ...t this route is not active Click the bulb to enable disable the static route Name This is the name that describes or identifies this route Destination IP This parameter specifies the IP network addres...

Page 129: ...e IP Type Select whether your IP type is IPv4 or IPv6 Destination IP Address Enter the IPv4 or IPv6 network address of the final destination IP Subnet Mask If you are using IPv4 and need to specify a...

Page 130: ...add a new DNS route This is the index number of a DNS route Domain Name This is the host name or domain name of the DNS route entry Interface This is the WAN connection through which the Device forwa...

Page 131: ...the network administrator Policy based routing is applied to outgoing packets prior to the normal routing You can use source based policy forwarding to direct traffic from different users through diff...

Page 132: ...red information for a policy route Figure 71 Policy Forwarding Add Edit The following table describes the labels in this screen Table 42 Policy Forwarding Add Edit LABEL DESCRIPTION Policy Name Enter...

Page 133: ...ls the format and the broadcasting method of the RIP packets that the Device sends it recognizes both formats when receiving RIP version 1 is universally supported but RIP version 2 carries more infor...

Page 134: ...134 eir F1000 Modem User s Guide Chapter 7 Routing...

Page 135: ...on allowing time sensitive applications to flow more smoothly Time sensitive applications include both those that require a low level of latency delay and a low level of jitter variations in delay suc...

Page 136: ...vide specific treatment or service based on the tag or marker Traffic Shaping Bursty traffic may cause network congestion Traffic shaping regulates packets to be transmitted with a pre configured data...

Page 137: ...m Bandwidth Enter the amount of upstream bandwidth for the WAN interfaces that you want to allocate using QoS The recommendation is to set this speed to match the interfaces actual transmission speed...

Page 138: ...ssigns priorities to various upstream traffic flows None Disables auto priority mapping and has the Device put packets into the queues according to your classification rules Traffic which does not mat...

Page 139: ...ight of this queue Buffer Management This shows the queue management algorithm used for this queue Queue management algorithms determine how the Device should handle packets when it receives too many...

Page 140: ...ecify the maximum transmission rate in Kbps allowed for traffic on this queue OK Click OK to save your changes Cancel Click Cancel to exit this screen without saving 8 5 The Class Setup Screen Use thi...

Page 141: ...Criteria This shows criteria specified in this classifier for example the interface from which traffic of this class should come DSCP Mark This is the DSCP number added to traffic of this classifier...

Page 142: ...User s Guide Chapter 8 Quality of Service QoS 8 5 1 Add Edit QoS Class Click Add new Classifier in the Class Setup screen or the Edit icon next to a classifier to open the following screen Figure 77 C...

Page 143: ...Type the mask for the specified MAC address to determine which bits a packet s MAC address should match Enter f for each bit of the specified source MAC address that the traffic s MAC address should...

Page 144: ...his field is available only when you select 802 1Q in the Ether Type field Select this option and select a priority level between 0 and 7 from the drop down list box 0 is the lowest priority level and...

Page 145: ...Click this to create a new entry This is the index number of the entry Status This field displays whether the policer is active or not A yellow bulb signifies that this policer is active A gray bulb s...

Page 146: ...lso the bucket size The Single Rate Three Color Marker srTCM is based on the token bucket filter and identifies packets by comparing them to the Committed Information Rate CIR the Committed Burst Size...

Page 147: ...ped if there is congestion on the network Available Class Selected Class Select a QoS classifier to apply this QoS policer to traffic that matches the QoS classifier Highlight a QoS classifier in the...

Page 148: ...he IEEE 802 1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges A VLAN tag includes the 12 bit VLAN ID and 3 bit user priority The VLAN...

Page 149: ...fic is going DSCP and Per Hop Behavior DiffServ defines a new Differentiated Services DS field to replace the Type of Service TOS field in the IP header The DS field contains a 2 bit unused field and...

Page 150: ...10 010100 010010 010000 5 5 3 011110 011100 011010 011000 250 6 6 4 100110 100100 100010 100000 5 101110 101000 7 7 6 110000 111000 7 Token Bucket The token bucket algorithm uses tokens in a bucket to...

Page 151: ...el is referred to as red medium is referred to as yellow and low is referred to as green The srTCM is based on the token bucket filter and has two token buckets CBS and EBS Tokens are generated and ad...

Page 152: ...PIR respectively All packets are evaluated against the PIR If a packet exceeds the PIR it is marked red Otherwise it is evaluated against the CIR If it exceeds the CIR then it is marked yellow Finally...

Page 153: ...tion 9 4 on page 159 Use the DMZ screen to configure a default server Section 9 5 on page 161 Use the ALG screen to enable and disable the NAT and SIP VoIP ALG in the Device Section 9 6 on page 162 Us...

Page 154: ...port number or a range of port numbers to be forwarded and the local IP address of the desired server The port number identifies a service for example web service is on port 80 and FTP on port 21 In...

Page 155: ...ng NAT Port Forwarding LABEL DESCRIPTION Add new rule Click this to add a new rule This is the index number of the entry Status This field displays whether the NAT rule is active or not A yellow bulb...

Page 156: ...the following screen Figure 83 Port Forwarding Add Edit The following table describes the labels in this screen Table 55 Port Forwarding Add Edit LABEL DESCRIPTION Active Clear the checkbox to disable...

Page 157: ...of the range to which you want the incoming ports translated Translation End Port This shows the last port of the translated port range Server IP Address Enter the inside IP address of the virtual se...

Page 158: ...ation rules Click Add new application in the Applications screen to open the following screen Figure 85 Applications Add The following table describes the labels in this screen Table 57 Applications A...

Page 159: ...ber and protocol open port the Device forwards the traffic to the LAN IP address of the computer that sent the request After that computer s connection for that service closes another computer on the...

Page 160: ...traffic to a server on the WAN This is the first port number that identifies a service Trigger End Port This is the last port number that identifies a service Trigger Proto This is the trigger transp...

Page 161: ...port number in a range of port numbers Trigger Protocol Select the transport layer protocol from TCP UDP or TCP UDP Open Start Port The open port is a port or a range of ports that a server on the WA...

Page 162: ...ister server the SIP ALG translates the Device s private IP address inside the SIP data stream to a public IP address You do not need to use STUN or an outbound proxy if your Device is behind a SIP AL...

Page 163: ...the Local End IP address This field is blank for One to One mapping types Global Start IP This is the starting Inside Global IP Address IGA Enter 0 0 0 0 here if you have a dynamic IP address from yo...

Page 164: ...evice s Single User Account feature that previous routers supported only Many to Many This mode maps multiple local IP addresses to shared global IP addresses Local Start IP Enter the starting Inside...

Page 165: ...peer to peer application use lower this number to ensure no single client uses too many of the available NAT sessions Apply Click this to save your changes on this screen Cancel Click this to exit thi...

Page 166: ...hat NAT Does In the simplest form NAT changes the source IP address in a packet received from a subscriber the inside local address to another the inside global address before forwarding the packet to...

Page 167: ...ired for communication with hosts on other networks It replaces the original IP source address and TCP or UDP source port numbers for Many to One and Many to Many Overload NAT mapping in each packet a...

Page 168: ...rs are shown in the following table Please refer to RFC 1700 for further information about port numbers Please also refer to the Supporting CD for more examples and details on port forwarding and NAT...

Page 169: ...port 80 to another B in the example and assign a default server IP address of 192 168 1 35 to a third C in the example You assign the LAN IP addresses and the ISP assigns the WAN IP address The NAT ne...

Page 170: ...170 eir F1000 Modem User s Guide Chapter 9 Network Address Translation NAT...

Page 171: ...g table Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you in NetMeeting CU SeeMe etc You can also access...

Page 172: ...Dynamic DNS 10 2 The DNS Entry Screen Use this screen to view and configure DNS routes on the Device Click Network Setting DNS to open the DNS Entry screen Figure 97 Network Setting DNS DNS Entry The...

Page 173: ...DNS Entry Add Edit The following table describes the labels in this screen Table 68 DNS Entry Add Edit LABEL DESCRIPTION Host Name Enter the host name of the DNS entry IPv4 Address Enter the IPv4 IP...

Page 174: ...ovider You can specify up to two host names in the field separated by a comma Username Type your user name Password Type the password assigned to you Dynamic DNS Status User Authentication Result This...

Page 175: ...te multiple networks on the Device Section 11 2 on page 175 11 2 The Interface Group Screen You can manually add a LAN interface to a new group Alternatively you can have the Device automatically add...

Page 176: ...k Setting Interface Group The following table describes the fields in this screen Table 70 Network Setting Interface Group LABEL DESCRIPTION Add New Interface Group Click this button to create a new i...

Page 177: ...e LAN Interfaces Select one or more LAN interfaces Ethernet LAN HPNA or wireless LAN in the Available LAN Interfaces list and use the left arrow to move them to the Grouped LAN Interfaces list to add...

Page 178: ...ibes the fields in this screen Table 72 Interface Grouping Criteria LABEL DESCRIPTION Source MAC Address Enter the source MAC address of the packet DHCP Option 60 Select this option and enter the Vend...

Page 179: ...n the following fields Select Other to enter any string that identifies the device in the DUID field DHCP Option 125 Select this and enter vendor specific information of the matched traffic Enterprise...

Page 180: ...Chapter 11 Interface Group 180 eir F1000 Modem User s Guide...

Page 181: ...not be able to join the workgroup if your local area network has restrictions set up that do not allow devices to join a workgroup In this case contact your network administrator 12 1 1 What You Can...

Page 182: ...File System The Device uses Common Internet File System CIFS protocol for its file sharing functions CIFS compatible computers can access the USB file storage devices connected to the Device CIFS pro...

Page 183: ...that comes with an external power supply make sure it is connected to an appropriate power source that is on Note If your USB device cannot be detected by the Device see the troubleshooting for sugge...

Page 184: ...a server is enabled by default with the video photo and music shares published To change your Device s media server settings click Network Setting USB Service Media Server The screen appears as shown...

Page 185: ...rinter to your computer Connect your printer to the Device instead 12 4 2 The Printer Server Screen Use this screen to enable or disable sharing of a USB printer via your Device To access this screen...

Page 186: ...186 eir F1000 Modem User s Guide Chapter 12 USB Service...

Page 187: ...e an IM Instant Messaging session from the LAN to the WAN 1 Return traffic for this session is also allowed 2 However other traffic initiated from the WAN is blocked 3 and 4 Figure 108 Default Firewal...

Page 188: ...resources The ZyXEL Device is pre configured to automatically detect and thwart all known DoS attacks DDoS A DDoS attack is one in which multiple compromised systems attack a single target thereby ca...

Page 189: ...wall Select Enable to activate the firewall feature on the Device Easy Select Easy to allow LAN to WAN and WAN to LAN packet directions Medium Select Medium to allow LAN to WAN but deny WAN to LAN pac...

Page 190: ...zed service Ports Protocol Number This shows the IP protocol TCP UDP ICMP or TCP UDP and the port number or range of ports that defines your customized service Other and the protocol number displays i...

Page 191: ...This is the IP port TCP UDP ICMP or Other that defines your customized port Ports Protocol Number For TCP UDP ICMP or TCP UDP protocol rules this shows the port number or range that defines the custom...

Page 192: ...nd the direction of traffic to which this rule applies Action This field displays whether the rule silently discards packets DROP discards packets and sends a TCP reset packet or an ICMP destination u...

Page 193: ...ct Specific Service Protocol This field is displayed only when you select Specific Protocol in Select Protocol Choose the IP port TCP UDP TCP UDP ICMP or ICMPv6 that defines your customized port from...

Page 194: ...creen to activate protection against DoS attacks Click Security Firewall DoS to display the following screen Figure 114 Security Firewall DoS The following table describes the labels in this screen Ta...

Page 195: ...screen 14 2 The MAC Filter Screen Use this screen to allow wireless and LAN clients access to the Device Click Security MAC Filter The screen appears as shown Figure 115 Security MAC Filter The follow...

Page 196: ...MAC addresses of the wireless or LAN clients that are allowed access to the Device in these address fields Enter the MAC addresses in a valid MAC address format that is six hexadecimal character pair...

Page 197: ...een Figure 116 Security Parental Control The following table describes the fields in this screen Table 83 Security Parental Control LABEL DESCRIPTION Parental Control Select Enable to activate parenta...

Page 198: ...shown Modify Click the Edit icon to go to the screen where you can edit the rule Click the Delete icon to delete an existing rule Apply Click Apply to save your changes Cancel Click Cancel to restore...

Page 199: ...ting If you select Block the Device prohibits the users from viewing the Web sites with the URLs listed below If you select Allow the Device blocks access to all URLs except ones listed below Add new...

Page 200: ...200 eir F1000 Modem User s Guide Chapter 15 Parental Control...

Page 201: ...Scheduler Rule The following table describes the fields in this screen Table 85 Security Scheduler Rule LABEL DESCRIPTION Add new rule Click this to create a new rule This is the index number of the...

Page 202: ...he fields in this screen Table 86 Scheduler Rule Add Edit LABEL DESCRIPTION Rule Name Enter a name up to 31 printable English keyboard characters not including spaces for this schedule Day Select chec...

Page 203: ...erms and concepts may help as you read through this chapter Certification Authority A Certification Authority CA issues certificates and guarantees the identity of each certificate owner There are com...

Page 204: ...mended that each certificate have unique subject information Issuer This field displays identifying information about the certificate s issuing certification authority such as a common name organizati...

Page 205: ...he Device drops trailing spaces State Province Name Type up to 32 characters to identify the state or province where the certificate owner is located You may use any character including spaces but the...

Page 206: ...signed certificate Certificate Copy and paste the signed certificate into the text box to store it on the Device Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without...

Page 207: ...This field displays the name used to identify this certificate Subject This field displays information that identifies the owner of the certificate such as Common Name CN OU Organizational Unit or dep...

Page 208: ...the certificate ca means that a Certification Authority signed the certificate Subject This field displays information that identifies the owner of the certificate such as Common Name CN Organization...

Page 209: ...Table 92 Trusted CA Import Certificate LABEL DESCRIPTION Certificate File Path Type in the location of the certificate you want to upload in this field or click Browse to find it Enable Trusted CA fo...

Page 210: ...210 eir F1000 Modem User s Guide Chapter 17 Certificates...

Page 211: ...ta integrity and authentication This chapter shows you how to configure the Device s VPN settings 18 2 The IPSec VPN General Screen Use this screen to view and manage your VPN tunnel policies The foll...

Page 212: ...of the VPN policy Remote Gateway This is the IP address of the remote IPSec router in the IKE SA Local Addresses This displays the IP address es on the LAN behind your Device Remote Addresses This dis...

Page 213: ...ON Active Select this to activate this VPN policy IPSec Connection Name Enter the name of the VPN policy Remote IPSec Gateway Address Enter the IP address of the remote IPSec router in the IKE SA Tunn...

Page 214: ...ESP increase processing requirements and latency delay The Device and remote IPSec router must use the same active protocol Key Exchange Method Select the key exchange method Auto IKE Select this to...

Page 215: ...ds on the remote ID type For IP type the IP address of the computer with which you will make the VPN connection If you configure this field to 0 0 0 0 or leave it blank the Device will use the address...

Page 216: ...o the longer it takes to encrypt and decrypt information Both routers must use the same DH key group Key Life Time Define the length of time before an IPSec SA automatically renegotiates in this field...

Page 217: ...e temporarily disconnected The following fields are available if you select Manual in the Key Exchange Method field Encryption Algorithm Select which key size and encryption algorithm to use in the IK...

Page 218: ...screen Status This displays a green line between two hosts if the VPN tunnel has been established successfully Otherwise it displays a red line in between Connection Name This displays the name of the...

Page 219: ...ion techniques such as DES Data Encryption Standard and Triple DES algorithms The Authentication Algorithms HMAC MD5 RFC 2403 and HMAC SHA 1 RFC 2404 provide an authentication mechanism for the AH and...

Page 220: ...ginal IP header in the hashing process Tunnel Mode Tunnel mode encapsulates the entire IP packet to transmit it securely A Tunnel mode is required for gateway services to provide access to internal sy...

Page 221: ...public key cryptography key group Set the IPSec SA lifetime This field allows you to determine how long the IPSec SA should stay up before it times out The Device automatically renegotiates the IPSec...

Page 222: ...psulates the entire original packet including headers in a new IP packet The new IP packet s source address is the outbound address of the sending VPN gateway and its destination address is the inboun...

Page 223: ...table Table 97 VPN and NAT SECURITY PROTOCOL MODE NAT AH Transport N AH Tunnel N ESP Transport Y ESP Tunnel Y Y This is supported in the Device if you enable NAT traversal 18 5 7 ID Type and Content...

Page 224: ...D type E mail Remote ID content 1 1 1 2 Remote ID content tom yourcompany com The two Devices in this example cannot complete their negotiation because Device B s Local ID Type is IP but Device A s Re...

Page 225: ...st of both logs and alerts You may differentiate them by their color in the View Log screen Alerts display in red and logs display in black Syslog Overview The syslog protocol allows devices to send e...

Page 226: ...ty level you have selected When you select a severity the Device searches through all logs of that severity or higher Category Select the type of logs to display Clear Log Click this to delete all the...

Page 227: ...ugh all logs of that severity or higher Category Select the type of logs to display Clear Log Click this to delete all the logs Refresh Click this to renew the log screen Export Log Click this to expo...

Page 228: ...Chapter 19 Log 228 eir F1000 Modem User s Guide...

Page 229: ...iew the WAN traffic statistics Section 20 2 on page 229 Use the LAN screen to view the LAN traffic statistics Section 20 3 on page 231 Use the NAT screen to view the NAT status of the Device s client...

Page 230: ...indicates the number of frames with errors received on this interface Drop This indicates the number of received packets dropped on this interface more hide more Click more to show more information C...

Page 231: ...cates the number of bytes transmitted on this interface Bytes Received This indicates the number of bytes received on this interface more hide more Click more to show more information Click hide more...

Page 232: ...reen Table 106 System Monitor Traffic Status NAT LABEL DESCRIPTION Refresh Interval Select how often you want the Device to update this screen Device Name This displays the name of the connected host...

Page 233: ...in the Device Registration This field displays the current registration status of the SIP account You can change this in the Status screen Registered The SIP account is registered with a SIP server No...

Page 234: ...tatus This field displays the current state of the phone call Idle There are no current VoIP calls incoming calls or outgoing calls being made Dial The callee s phone is ringing Ring The phone is ring...

Page 235: ...found for the IP address ARP broadcasts the request to all the devices on the LAN The device fills in its own MAC and IP address in the sender address fields and puts the known IP address of the targ...

Page 236: ...ABEL DESCRIPTION This is the ARP table entry number IPv4 IPv6 Address This is the learned IPv4 or IPv6 IP address of a device connected to a port MAC Address This is the MAC address of the device with...

Page 237: ...een Figure 142 System Monitor Routing Table The following table describes the labels in this screen Table 109 System Monitor Routing Table LABEL DESCRIPTION IPv4 IPv6 Routing Table Destination This in...

Page 238: ...ed by a routing daemon or redirect M Modified redirect The route is modified from a routing daemon or redirect Metric The metric represents the cost of transmission A router determines the best route...

Page 239: ...h ports have joined it To open this screen click System Monitor IGMP MLD Group Status Figure 143 System Monitor IGMP MLD Group Status The following table describes the labels in this screen Table 110...

Page 240: ...y the IP addresses in the Source List get to receive the multicast group s traffic EXCLUDE means that the IP addresses in the Source List are not allowed to receive the multicast group s traffic but o...

Page 241: ...User s Guide 25 xDSL Statistics 25 1 The xDSL Statistics Screen Use this screen to view detailed DSL statistics Click System Monitor xDSL Statistics to open the following screen Figure 144 System Moni...

Page 242: ...displays the current state of setting up the DSL connection Mode This displays the ITU standard used for this connection Traffic Type This displays the type of traffic the DSL port is sending and rece...

Page 243: ...service provider is receiving from the port Downstream is how much power the port is receiving from the service provider Actual INP Sudden spikes in the line s level of external noise impulse noise c...

Page 244: ...5 xDSL Statistics 244 eir F1000 Modem User s Guide Table 111 Status xDSL Statistics continued LABEL DESCRIPTION LOF This is the number of Loss Of Frame seconds LOM This is the number of Loss of Margin...

Page 245: ...describes the labels in this screen Table 112 System Monitor 3G Statistics LABEL DESCRIPTION Refresh Interval Select how often you want the Device to update this screen Select No Refresh to stop refre...

Page 246: ...nnection Uptime This field displays the time the connection has been up 3G Card Manufacturer This field displays the manufacturer of the 3G card 3G Card Model This field displays the model name of the...

Page 247: ...Type the default password or the existing password you use to access the system in this field New Password Type your new system password 6 to 256 characters At least one numeric character and one let...

Page 248: ...248 eir F1000 Modem User s Guide Chapter 27 User Account...

Page 249: ...lowing table describes the fields in this screen Table 114 Maintenance Remote MGMT LABEL DESCRIPTION WAN Interface used for services Select Any WAN to have the Device automatically activate the remote...

Page 250: ...restore your previously saved settings 28 3 The Trust Domain Screen Use this screen to view a list of public IP addresses which are allowed to access the Device through the services configured in the...

Page 251: ...en to open the following screen Figure 149 Maintenance Remote MGMT Trust Domain Add Trust Domain The following table describes the fields in this screen Table 116 Maintenance Remote MGMT Trust Domain...

Page 252: ...Chapter 28 Remote Management 252 eir F1000 Modem User s Guide...

Page 253: ...4 compliant CPE management application on their computers from the LAN to discover the CPE and configure user specific parameters such as the username and password Click Maintenance TR 064 to open the...

Page 254: ...254 eir F1000 Modem User s Guide Chapter 29 TR 064...

Page 255: ...Management Model An SNMP managed network consists of two main types of component agents and a manager An agent is a management software module that resides in a managed device the Device An agent tra...

Page 256: ...s Click Maintenance SNMP to open the following screen Use this screen to configure the Device SNMP settings Figure 152 Maintenance SNMP The following table describes the fields in this screen Table 11...

Page 257: ...ated settings such as system time password name the domain name and the inactivity timeout interval 31 2 The Time Screen To change your Device s time and date click Maintenance Time The screen appears...

Page 258: ...United States on the second Sunday of March Each time zone in the United States starts using Daylight Saving Time at 2 A M local time So in the United States set the day to Second Sunday the month to...

Page 259: ...eir F1000 Modem User s Guide Chapter 31 Time Settings Table 119 Maintenance Time continued LABEL DESCRIPTION Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without sav...

Page 260: ...Chapter 31 Time Settings 260 eir F1000 Modem User s Guide...

Page 261: ...and add mail server information on the Device Figure 154 Maintenance Email Notification The following table describes the labels in this screen Table 120 Maintenance Email Notification LABEL DESCRIPT...

Page 262: ...If this field is left blank reports logs or notifications will not be sent via e mail Authentication Username Enter the user name up to 32 characters This is usually the user name of a mail account yo...

Page 263: ...gure where the Device sends logs and which logs and or immediate alerts the Device records in the Log Setting screen 33 2 The Log Settings Screen To change your Device s log settings click Maintenance...

Page 264: ...s logs to the e mail address specified in this field If this field is left blank the Device does not send logs via E mail Send Alarm to Alerts are real time notifications that are sent as soon as an e...

Page 265: ...m 192 168 1 131 To 192 168 1 255 default policy forward 09 54 17 UDP src port 00520 dest port 00520 1 00 3 Apr 7 00 From 192 168 1 6 To 10 10 10 10 match forward 09 54 19 UDP src port 03516 dest port...

Page 266: ...Chapter 33 Log Setting 266 eir F1000 Modem User s Guide...

Page 267: ...and may take up to two minutes After a successful upload the system will reboot Do NOT turn off the Device while firmware upload is in progress Figure 158 Maintenance Firmware Upgrade The following ta...

Page 268: ...ly restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 160 Network Temporarily Disconnected After two minutes l...

Page 269: ...configuration appears in this screen as shown next Figure 162 Maintenance Configuration Backup Configuration Backup Configuration allows you to back up save the Device s current configuration to a fi...

Page 270: ...uration file upload is in progress After the Device configuration has been restored successfully the login screen appears Login again to restart the Device The Device automatically restarts in this ti...

Page 271: ...Process Message You can also press the RESET button on the rear panel to reset the factory defaults of your Device Refer to Section 1 6 on page 22 for more information on the RESET button 35 3 The Reb...

Page 272: ...Chapter 35 Configuration 272 eir F1000 Modem User s Guide...

Page 273: ...Ping screen lets you send an ATM OAM Operation Administration and Maintenance packet to verify the connectivity of a specific PVC Section 36 5 on page 276 36 2 What You Need to Know The following term...

Page 274: ...s the fields in this screen Table 125 Maintenance Diagnostic Ping TraceRoute NsLookup LABEL DESCRIPTION URL or IP Address Type the IP address of a computer that you want to perform ping traceroute or...

Page 275: ...Device performs a CFM loopback test 802 1Q VLAN ID Type a VLAN ID 0 4095 for this MA VDSL Traffic Type This shows whether the VDSL traffic is activated Loopback Message LBM This shows how many Loop Ba...

Page 276: ...tifies a channel within a virtual path A series of virtual paths make up a virtual circuit F4 cells operate at the virtual path VP level while F5 cells operate at the virtual channel VC level F4 cells...

Page 277: ...s this to perform an OAM F4 segment loopback test F4 end end Press this to perform an OAM F4 end to end loopback test F5 segment Press this to perform an OAM F5 segment loopback test F5 end end Press...

Page 278: ...Chapter 36 Diagnostic 278 eir F1000 Modem User s Guide...

Page 279: ...1 Make sure the Device is turned on 2 Make sure you are using the power adaptor or cord included with the Device 3 Make sure the power adaptor or cord is connected to the Device and plugged in to an...

Page 280: ...orgot the password 1 The default admin password is the wireless key printed on the back of the Device 2 If this does not work you have to reset the device to its factory defaults See Section 1 6 on pa...

Page 281: ...Device 1 Make sure you have entered the password correctly The default admin password is the wireless key printed on the back of the Device The field is case sensitive so make sure Caps Lock is not on...

Page 282: ...ave the DSL WAN port connected to a telephone jack or the DSL or modem jack on a splitter if you have one 2 Make sure you configured a proper DSL WAN interface Network Setting Broadband screen with th...

Page 283: ...quality of your wireless connection you can Move your wireless device closer to the AP if the signal strength is low Reduce wireless interference that may be caused by other wireless networks or surro...

Page 284: ...e connect your USB device to the Device 37 6 UPnP When using UPnP and the Device reboots my computer cannot detect UPnP and refresh My Network Places Local Network 1 Disconnect the Ethernet cable from...

Page 285: ...pplication package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure t...

Page 286: ...ow click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If you need Client for Microsof...

Page 287: ...P Address and Subnet Mask fields Figure 174 Windows 95 98 Me TCP IP Properties IP Address 3 Click the DNS Configuration tab If you do not know your DNS information select Disable DNS If you know your...

Page 288: ...close the Network window Insert the Windows CD if prompted 7 Turn on your Device and restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 In the Run window type winipcfg...

Page 289: ...ress 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 177 Windows XP Control Panel 3 Right click Local Area Connection and then click P...

Page 290: ...ck Properties Figure 179 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP If you have a dynamic IP address click Obtain...

Page 291: ...IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure...

Page 292: ...perties 7 In the Internet Protocol TCP IP Properties window the General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know you...

Page 293: ...se the Local Area Connection Properties window 10 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 11 Turn on your Device and restart your computer if prompted V...

Page 294: ...er s IP Address 1 Click the Start icon Control Panel Figure 183 Windows Vista Start Menu 2 In the Control Panel double click Network and Internet Figure 184 Windows Vista Control Panel 3 Click Network...

Page 295: ...connections Figure 186 Windows Vista Network and Sharing Center 5 Right click Local Area Connection and then click Properties Note During this procedure click Continue whenever Windows displays a scr...

Page 296: ...Figure 188 Windows Vista Local Area Connection Properties 7 The Internet Protocol Version 4 TCP IPv4 Properties window opens the General tab If you have a dynamic IP address click Obtain an IP addres...

Page 297: ...tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Con...

Page 298: ...Properties 9 In the Internet Protocol Version 4 TCP IPv4 Properties window the General tab Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know yo...

Page 299: ...net Protocol Version 4 TCP IPv4 Properties window 11 Click Close to close the Local Area Connection Properties window 12 Close the Network Connections window 13 Turn on your Device and restart your co...

Page 300: ...dem User s Guide Appendix A Setting up Your Computer s IP Address Macintosh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel Figure 192 Macintosh OS...

Page 301: ...IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your Device in the Router address box 5 Close the TCP IP Control Panel 6 Click Save if prompted to save changes to yo...

Page 302: ...5 Macintosh OS X Network 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask...

Page 303: ...le location may vary depending on your Linux distribution and release version Note Make sure you are logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to c...

Page 304: ...tain IP address settings with and select dhcp from the drop down list If you have a static IP address click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address...

Page 305: ...h0 is the name of the Ethernet card Open the configuration file with any plain text editor If you have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure shows an example Figu...

Page 306: ...t 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 OK Shutting down loopback interface OK Setting network parameters OK Bringing up loopback interface OK Br...

Page 307: ...nd the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house numbe...

Page 308: ...32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is...

Page 309: ...work number bits the smaller the number of remaining host ID bits An IP address with host IDs of all zeros is the IP address of the network 192 168 1 0 with a 24 bit subnet mask for example An IP addr...

Page 310: ...s In the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons In this example the company network...

Page 311: ...2 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask t...

Page 312: ...s 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address...

Page 313: ...255 255 224 27 8 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 6 255 255 255 252 30 64 2 7 255 255 255 254 31 128 1 The following table is a summary for subnet planning on a network with a...

Page 314: ...Your Device will compute the subnet mask automatically based on the IP address that you entered You don t need to change the subnet mask computed by the Device unless you are instructed to do otherwis...

Page 315: ...rnet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking...

Page 316: ...of the screen This disables any web pop up blockers you may have enabled Figure 209 Internet Options Privacy 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if...

Page 317: ...cripts and Java Permissions 2 Select Settings to open the Pop up Blocker Settings screen Figure 210 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to h...

Page 318: ...k Add to move the IP address to the list of Allowed sites Figure 211 Pop up Blocker Settings 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of th...

Page 319: ...plorer click Tools Internet Options and then the Security tab Figure 212 Internet Options Security 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that En...

Page 320: ...ick OK to close the window Figure 213 Security Settings Java Scripting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button...

Page 321: ...ws JavaScripts and Java Permissions 5 Click OK to close the window Figure 214 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sur...

Page 322: ...ck OK to close the window Figure 215 Java Sun Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary You can enable Java Javascripts and pop ups in one screen Cl...

Page 323: ...odem User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions Click Content to show the screen below Select the check boxes as shown in the following screen Figure 217 Mozilla Firefox C...

Page 324: ...324 eir F1000 Modem User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions...

Page 325: ...commonly referred to as an ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an ad hoc wireless LAN Fig...

Page 326: ...t ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution S...

Page 327: ...duce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interf...

Page 328: ...rves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Se...

Page 329: ...ial Quadrature Phase Shift Keying 5 5 11 CCK Complementary Code Keying 6 9 12 18 24 36 48 54 OFDM Orthogonal Frequency Division Multiplexing Wireless Security Overview Wireless security is vital to yo...

Page 330: ...and the server is the RADIUS server The RADIUS server handles the following tasks Authentication Determines the identity of the users Authorization Determines the network services available to authent...

Page 331: ...and a CA issues certificates and guarantees the identity of each certificate owner EAP MD5 Message Digest Algorithm 5 MD5 authentication is the simplest one way authentication method The authenticati...

Page 332: ...e The AP maps a unique key that is generated with the RADIUS server This key expires when the wireless connection times out disconnects or reauthentication times out A new WEP key is generated each ti...

Page 333: ...ributed by the authentication server AES Advanced Encryption Standard is a block cipher that uses a 256 bit mathematical algorithm called Rijndael They both include a per packet key mixing function a...

Page 334: ...tion process again Pre authentication enables fast roaming by allowing the wireless client already connecting to an AP to perform IEEE 802 1x authentication with another AP before connecting to it Wir...

Page 335: ...passwords into the AP and all wireless clients The Pre Shared Key PSK must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters including spaces and symbols 2 The AP checks each...

Page 336: ...able WPA2 PSK TKIP AES Yes Disable Antenna Overview An antenna couples RF signals onto air A transmitter within a wireless device sends an RF signal to the antenna which propagates the signal through...

Page 337: ...ible to make circular overlapping coverage areas with multiple access points Directional antennas concentrate the RF signal in a beam like a flashlight does with the light from its bulb The angle of t...

Page 338: ...338 eir F1000 Modem User s Guide Appendix D Wireless LANs...

Page 339: ...0 0000 0015 can be written as 2001 0db8 1a2f 0000 0000 0015 2001 0db8 0000 0000 1a2f 0015 2001 db8 1a2f 0 0 15 or 2001 db8 0 0 1a2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6 uses...

Page 340: ...sts in a multicast group Multicast scope allows you to determine the size of the multicast group A multicast address has a predefined prefix of ff00 8 The following table describes some of the predefi...

Page 341: ...byte Ethernet MAC address as shown next EUI 64 inserts the hex digits fffe between the third and fourth bytes of the MAC address and complements the seventh bit of the first byte of the MAC address Se...

Page 342: ...the Relay Reply message and sends it to the relay agent The interface ID should not change even after the relay agent restarts Prefix Delegation Prefix delegation enables an IPv6 router to use the IP...

Page 343: ...irectly without passing through a router If the address is unlink the address is considered as the next hop Otherwise the Device determines the next hop from the default router list or routing table O...

Page 344: ...dows Vista Use the ipconfig command to check your automatic configured IPv6 address as well You should see at least one IPv6 address available for the interface on your computer Example Enabling DHCPv...

Page 345: ...from a DHCPv6 server Example Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer To enable IPv6 in Windows 7 1 Select Cont...

Page 346: ...r dynamic IPv6 address This example shows a global address 2001 b021 2d 1000 obtained from a DHCP server C ipconfig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific...

Page 347: ...f IP protocol used by the service If this is TCP UDP then the service uses the same port number with TCP and UDP If this is USER DEFINED the Port s is the IP protocol number not the port number Port s...

Page 348: ...l a program to enable fast transfer of files including large files that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client ser...

Page 349: ...nsfer of data over public networks This is the control channel PPTP_TUNNEL GRE User Defined 47 PPTP Point to Point Tunneling Protocol enables secure transfer of data over public networks This is the d...

Page 350: ...Play UPnP SSH TCP UDP 22 Secure Shell Remote Login Program STRM WORKS UDP 1558 Stream Works Protocol SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server TACACS UDP 49 Login Host Prot...

Page 351: ...anship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to r...

Page 352: ...hat no one will step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect...

Page 353: ...26 B backup configuration 269 Basic Service Set See BSS 325 Basic Service Set see BSS blinking LEDs 20 Broadband 41 broadcast 66 BSS 94 325 example 94 C CA 203 331 Canonical Format Indicator See CFI...

Page 354: ...n Name System see DNS Domain Name System See DNS DoS 188 DS field 149 DS dee differentiated services DSCP 149 dynamic DNS 171 wildcard 172 Dynamic Host Configuration Protocol see DHCP dynamic WEP key...

Page 355: ...te 125 WAN 42 IP Address Assignment 65 IP alias NAT applications 168 IPSec algorithms 219 architecture 218 NAT 222 IPSec VPN 211 IPv6 43 339 addressing 43 66 339 EUI 64 341 global address 340 interfac...

Page 356: ...example 167 global 166 IGA 166 ILA 166 inside 166 IPSec 222 local 166 outside 166 port forwarding 154 port number 168 services 168 SIP ALG 162 activation 162 traversal 222 NAT example 169 negotiation...

Page 357: ...P RTS Request To Send 328 threshold 327 328 RTS threshold 87 91 S security wireless LAN 91 Security Log 227 Security Parameter Index see SPI service access control 249 250 251 Service Set 72 79 Servic...

Page 358: ...Universal Plug and Play see UPnP upgrading firmware 267 UPnP 110 cautions 105 example 111 installation 111 NAT traversal 104 USB features 19 V VID Virtual Circuit VC 63 Virtual Local Area Network See...

Page 359: ...9 limitations 101 PIN 96 push button 22 96 wireless security 329 WLAN interference 327 security parameters 336 WPA 93 333 key caching 334 pre authentication 334 user authentication 334 vs WPA PSK 333...

Reviews: