background image

Solutions

 

Provider

 

for

 

FTTx,

 

RFoG

 

and

 

HFC

                               

www.ascentcomtec.com

 

Page

   

57

   

of

   

114

   

 

 

WPA

 

Algorithms

 

Select

 

TKIP,

 

AES

 

or

 

TKIP/AES

 

as

 

the

 

algorithm

 

for

 

WPA.

 

Pass

 

Phrase

 

Either

 

8

63

 

ASCII

 

characters

such

 

as

 

012345678…(or

 

64

 

Hexadecimal

 

digits

 

led

 

by

 

0x,such

 

as

 

“0x32152fabde…”).

 

Key

 

Renewal

 

Interval

 

WPA

 

uses

 

shared

 

key

 

for

 

authentication

 

to

 

the

 

network.

 

However,

 

normal

 

network

 

operations

 

use

 

a

 

different

 

encryption

 

key

 

that

 

is

 

randomly

 

generated.

 

This

 

randomly

 

generated

 

key

 

that

 

is

 

periodically

 

replaced.

 

Enter

 

the

 

renewal

 

security

 

time

 

(seconds)

 

in

 

the

 

column.

 

Smaller

 

interval

 

leads

 

to

 

greater

 

security

 

but

 

lower

 

performance.

 

Default

 

is

 

3600

 

seconds.

 

Set

 

0

 

to

 

disable

 

re

key.

 

After

 

all

 

settings

 

are

 

completed,

 

click

 

<Apply>

 

to

 

activate

 

them.

 

9)

 

WPA

PSK/WPA2

PSK

:

 

This

 

is

 

a

 

mixed

 

mode,

 

the

 

most

 

secure

 

encryption

 

mode

 

at

 

present.

 

 

WPA

 

Algorithms

 

Select

 

TKIP,

 

AES

 

or

 

TKIP/AES

 

as

 

the

 

algorithm

 

for

 

WPA.

 

Pass

 

Phrase

 

Either

 

8

63

 

ASCII

 

characters

such

 

as

 

012345678…(or

 

64

 

Hexadecimal

 

digits

 

led

 

by

 

0x,such

 

as

 

“0x32152fabde…”).

 

Key

 

Renewal

 

Interval

 

WPA

 

uses

 

shared

 

key

 

for

 

authentication

 

to

 

the

 

network.

 

However,

 

normal

 

Содержание AE208 Series

Страница 1: ...Solutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 1 of 114 AE208 Series P2P Gateway User Guide Revision B ...

Страница 2: ... written permission of Ascent Communication Technology is strictly forbidden This document is produced to assist professional and properly trained personnel with installation and maintenance issues for the product The capabilities system requirements and or compatibility with third party products described herein are subject to change without notice For more information contact ACT Sales ascentcom...

Страница 3: ...guration 18 5 CATV Configurations 19 6 Port Management 20 6 1 Port Configuration 20 6 2 Port Bandwidth 21 7 VLAN Configurations 22 7 1 Advanced VLAN Mode Configuration 22 7 2 Port based VLAN 22 7 3 802 1Q VLAN Configuration 23 7 3 1 802 1Q VLAN 23 7 3 2 802 1Q Configuration 25 7 3 3 802 1Q Port 26 8 QoS Configuration 28 8 1 QoS Configuration 28 8 1 1 General QoS Configuration 28 8 1 2 Port QoS Con...

Страница 4: ... AP Scan 65 11 4 2 AP Channel 66 11 5 Information 67 11 5 1 Station List 67 11 5 2 Statistics 67 12 VoIP 69 12 1 Phone Settings 70 12 1 1 FXS Port Settings 70 12 1 2 Dial Plan Settings 71 12 1 3 Port Function Settings 73 12 2 SIP Settings 75 12 2 1 Server Domain 75 12 2 2 Codec Settings 77 12 2 3 Other Settings 77 12 3 Network Settings 78 13 Statistics 80 13 1 Port status 80 13 2 Port statistics 8...

Страница 5: ...figuration 100 16 4 1 Event 100 16 4 2 Event Log 101 17 Administration 102 17 1 IP Configuration 102 17 2 SNTP 102 17 3 SMTP 103 17 4 E mail Alarm 104 17 4 1 System Event 104 17 4 2 Port Event 105 17 5 System Logs 106 17 6 Ping Diagnosis 107 17 7 Account 108 17 8 TFTP Services 109 17 8 1 TFTP Firmware 109 17 8 2 Backup Configuration 110 17 8 3 Restore Configuration 111 17 9 Reboot 111 17 10 Reset ...

Страница 6: ... terminology theories practices and specific knowledge about the networking devices protocols and interfaces that comprise your network You should have working experiences of the graphical user interfaces GUIs Command Line Interface CLI Simple Network Management Protocol SNMP and Web browsers 0 2 Conventions GUI Convention Description Boldface Keywords on web management page are in Boldface Italic...

Страница 7: ...width occupied by IPTV and VoD 1 2 Features One 100Base FX or 1000Base X single mode fiber network port with CATV overlay Eight Four 10BASE T 100Base TX Half Full duplex layer 2 switch LAN ports with a table up to 8K MAC addresses Store forward architecture and performs forwarding and filtering at non blocking full wire speed with auto aging function 802 3x flow control for full duplex and a backp...

Страница 8: ...tching circuitry with one 75Ω coaxial cable output port High sensitivity of 75 or 88 dBuV RF output at 3dBm optical input Single mode fiber high return loss optical interface with receptacle Wide range of optical input power of 10 0 dBm Digital diagnostic monitoring interface for optical input level supply voltage temperature and RF output level Monitoring on CATV Receiver temperature supply volta...

Страница 9: ...PSK WPA2PSK WPAPSKWPA2PSK and 802 1X encryption WPS registration button Hidden SSID and Multiple SSID TxPower adjustment Wireless Client Access Control WDS Lazy Mode Bridge Mode and Repeater Mode WMM Wi Fi Multimedia AP Discovery Codec Only for VoIP option G 711 64 kb s PCM G 723 1 6 3 5 3 kb s G 726 16 24 32 40 kb s ADPCM G 729A 8 kb s CS ACELP G 729B adds VAD CNG to G 729 GSM 13 kb s Voice Quali...

Страница 10: ...Four Eight RJ 45 Automatic MDI MDIX crossover for 100BASE TX and 10BASE T ports IEEE 802 3u Auto Negotiation support for automatic speed and duplex selection 10BASE T 100BASE TX performance over 100 meters Telephone Ports Only for VoIP option Two RJ11 FXS POTS ports CATV Connector F type 75Ω Frequency 40 860MHz RF output 75dBuV or 84dBuV 3dBm CNR 50dB CSO 65dBc CTB 62dBc Power Supply DC12V 1 5A us...

Страница 11: ...onitored CATV optical power is beyond the above ranges OFF CATV is disabled LAN1 4 LAN1 8 Green 100M Link and activity ON LAN port is connected OFF LAN is disconnected Blinking Data is transmitting sending receiving Yellow 10M Link and activity ON LAN port is connected OFF LAN port is disconnected Blinking transmitting data sending receiving WAN Green Link and activity ON WAN port is connected OFF...

Страница 12: ... T 100BASE TX ports a multi function reset button and a power receptacle in front of the device and a 100Base FX optical port at the back About the CATV ports and Phone ports please refer the table on the cover of this manual 1 6 1 100Base FX Optical Port AE208 P2P Switch series WAN port uses standard SC APC or FC APC port connector to attach 9 125 micron single mode fiber optic cable with 1310nm ...

Страница 13: ...s on the associated port of the attached device AE208 P2P Switch series LAN ports use auto sense ports that are designed to operate at 10 Mb s or at 100 Mb s depending on the connecting device These ports support the IEEE 802 3u auto negotiation standard which means that when a port is connected to another device that also supports the IEEE 802 3u standard the two devices negotiate for the best sp...

Страница 14: ...the following functions Press for or less than 3 second during the normal operation to change the device into static fixed IP mode Press and hold for more than 3 seconds during normal operation to reload the factory default settings Static fixed IP Mode Network Information IP Address 192 168 0 253 Subnet 255 255 255 0 ...

Страница 15: ...92 168 0 x x is any number from 2 to 254 Subnet Mask is 255 255 255 0 After you enter the Web configuration page you can modify the device IP address according to you need For more details please refer to 17 1 IP Configuration And then a login window will appear as shown follows Enter the default User Name and Password Then click the Login button or press the Enter key so that you can see the devi...

Страница 16: ...ulti function reset button for or less than 3 second during the normal operation to change the AE208 P2P Switch series into static fixed IP mode IP address 192 168 0 253 Subnet Mask 255 255 255 0 Note After clicking Apply in the management web pages all of the changes will be saved automatically After testing some supported browsers are listed as follows IE 7 0 or above Firefox 3 5 or above Operat...

Страница 17: ...FTTx RFoG and HFC www ascentcomtec com Page 17 of 114 3 System Information It shows the system information of the ONU as follows System name and system address can be changed via SNMP software for available network management ...

Страница 18: ...Solutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 18 of 114 4 Advanced Configuration On this page you can enable or disable the following items IGMP Snooping STP and 802 1x globally ...

Страница 19: ... with CATV option You can check CATV status and change CATV configuration If this module supports the function of monitoring Operating Temperature Power Supply Voltage CATV Optical Input and CATV RF Output will be shown on this webpage If CATV control is set as OFF the CATV module is powered off If set as ON CATV module is powered on ...

Страница 20: ...e 100Mbps or 10Mbps mode Duplex Allows the user to choose between full and half duplex mode Note The speed and duplex of the WAN port is fixed to be 1000M Full Flow Control Flow control can eliminate frame loss by blocking traffic from end station or segment connected directly to AE200 when it buffers fully When it is enabled back pressure is used for half duplex operation and IEEE 802 3x for full...

Страница 21: ...FTTx RFoG and HFC www ascentcomtec com Page 21 of 114 6 2 Port Bandwidth You can configure the egress traffic limit on individual ports so as to keep normal network service The bottom of the page will show the rate limit list ...

Страница 22: ...s are expensive and provide few ports so they cannot subnet the network particularly The virtual local area network VLAN technology is developed for switches to control broadcast in LANs By creating VLANs in a physical LAN you can divide the LAN into multiple logical LANs each of which has a broadcast domain of its own Hosts in the same VLAN communicate with each other as if they are in a LAN Howe...

Страница 23: ...of different VLANs The switch works at Layer 2 and it can identify the data link layer encapsulation of the packet only so you can add the VLAN tag field into only the data link layer encapsulation if necessary In 1999 IEEE issues the IEEE 802 1Q protocol to standardize VLAN implementation defining the structure of VLAN tagged packets In traditional Ethernet data frames the type field of the upper...

Страница 24: ...eld is not described in detail in this chapter VLAN ID is a 12 bit field indicating the ID of the VLAN to which this packet belongs It is in the range of 0 to 4 095 Generally 0 and 4 095 is not used so the field is in the range of 1 to 4 094 VLAN ID identifies the VLAN to which a packet belongs When the switch receives a packet carrying no VLAN tag it will encapsulate a VLAN tag with the default V...

Страница 25: ...of a VLAN to be a specific type Tag Indicates the port is a tagged member of the VLAN group All packets forwarded by the port are tagged The packets contain VLAN information Untag Indicates the port is an untagged VLAN member of the VLAN group Packets forwarded by the port are untagged Exclude Excludes the port from the VLAN group ...

Страница 26: ... belong to multiple VLANs but it can only be configured as untagged in one VLAN All packages are tagged except when an egress package is in a VLAN group with VID the same as PVID Hybrid A hybrid port can belong to more than one VLAN It can receive send packets from to multiple VLANs and can be used to connect either a switch or user PCs A Hybrid port is similar to a Trunk port except it leaves the...

Страница 27: ...mtec com Page 27 of 114 Note A hybrid port allows the packets of multiple VLANs to be sent without tags but a trunk port only allows the packets of the default VLAN to be sent without tags You can configure all the three types of ports on the same device ...

Страница 28: ...sion platform to implement various applications Besides traditional applications such as WWW e mail and FTP network users are experiencing new services such as tele education telemedicine video telephone videoconference and Video on Demand VoD The enterprise users expect to connect their regional branches together through VPN technologies to carry out operational applications for instance to acces...

Страница 29: ... that they demand preferential service in congestion in order to reduce the response delay Assume that there are eight output queues on the port and the preferential queue classifies the eight output queues on the port into eight classes which are queue7 queue6 queue5 queue4 queue3 queue2 queue1 and queue0 Their priorities decrease in order In queue scheduling SP sends packets in the queue with hi...

Страница 30: ...and Q4 The weight value indicates the proportion of obtaining resources On a 150 M port configure the weight value of WRR queue scheduling algorithm to 1 2 4 and 8 corresponding to Q1 Q2 Q3 and Q4 in order In this way the queue with the lowest priority can get 10 Mbps bandwidth at least and the disadvantage of SP queue scheduling that the packets in queues with lower priority may not get service f...

Страница 31: ...e 31 of 114 You can change the priority map according to your need if unnecessary click Apply directly 8 4 DSCP Map This page sets the mapping between the DSCP value and the local precedence priority DSCP Differentiated Services CodePoint priority ranges from 0 to 63 ...

Страница 32: ...ion The MAC address of a connected network device The interface to which the device is connected The VLAN to which the interface belongs Unicast mode If an entry is available for the destination MAC address the device forwards the frame directly from the outgoing port Unicast MAC address configuration is for the unicast forwarding mode 9 1 1 MAC Address Configuration You can configure the unicast ...

Страница 33: ...lid time The port and type in the entries can be modified and the entries can be deleted 9 1 2 Dynamic Unicast MAC It shows the dynamic MAC addresses which are learnt by the port and added manually They can be deleted manually and it updates the list when the timer is timeout By default the timer is 300 seconds 9 2 Multicast MAC Address In the network packets are sent in three modes unicast broadc...

Страница 34: ...ves this problem It can deliver a high efficiency to send data in the point to multi point service which can save large bandwidth and reduce the network load Features of multicast The number of receivers is not certain Usually point to multipoint transmission is needed Multiple users receiving the same information form a multicast group The multicast information sender just need sends the informat...

Страница 35: ...nage and control multicast groups By listening to and analyzing IGMP messages a Layer 2 device running IGMP Snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings As shown in the following figure when IGMP Snooping is not running on the device multicast packets are broadcast to all devices at Layer 2 When IGMP Snooping is running...

Страница 36: ...oup The configuration steps are as follows Step 1 Specify the VLAN ID of a multicast group the VLAN name can be no changed here Step 2 Enable or disable IGMP Snooping on the field of Statue if enable it select IGMP version 2 or 3 Until now IGMP has three versions including IGMP Version 1 defined by RFC1112 IGMP Version 2 defined by RFC2236 and IGMP Version 3 defined by RFC 3376 On this page you ca...

Страница 37: ...a port is fixed to receive the packets from a multicast group it can be configured to join in the multicast group statically so that the device can receive IGMP message by the port from router Route port the port directly connected to multicast devices which is the IGMP Querier The bottom part of this page lists static router ports of all VLANs Caution the router port should be within the VLAN Ple...

Страница 38: ...t list It is in the range of 1 to 1000 by default the value is 105 seconds IGMP QuerierIGMP Querier sends IGMP general query packets to all the hosts and router ports in the network segment to check the multicast group memebers By default IGMP Querier is disabled Query Transmit Interval The interval IGMP Querier sends IGMP general query packets to all the hosts and router ports After it times out ...

Страница 39: ...Solutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 39 of 114 group the switch will delete the port directly In this way when the port has only one user it can save bandwidth ...

Страница 40: ...counting RADIUS Server IP Accounting Port and Accounting Shared Key Authentication RADIUS Server IP IP address of the radius server to be used a valid unicast address in dotted decimal notation the default value is 192 168 0 234 Authentication Port UDP port number of the radius server ranging from 0 to 65535 the default value is 1812 Authentication Shared Key Sets a shared key for radius messages ...

Страница 41: ...the username and password to the RADIUS client 2 Having received the username and password the RADIUS client sends an authentication request Access Request to the RADIUS server with the user password encrypted by using the Message Digest 5 MD5 algorithm and the shared key 3 The RADIUS server authenticates the username and password If the authentication succeeds it sends back an Access Accept messa...

Страница 42: ...ceAuthorized and ForceUnauthorized Auto The auto access control mode When a port operates in this mode all the unauthenticated hosts connected to it are unauthorized and only EAPoL packets can be exchanged between the switch and the hosts And the authenticated hosts connected to the port are authorized to access the network resources ForceAuthorized The force authorized access control mode When a ...

Страница 43: ...t system timer this timer sets the supp timeout period and is triggered by the device after the device sends a request challenge packet to a supplicant system The device sends another request challenge packet to the supplicant system if the device does not receive any response from the supplicant system when this timer times out It is in the range of 1 to 300 the default value is 30 seconds Server...

Страница 44: ...permissions to access a network MAC address authentication can be performed without client side software With this type of authentication employed an ONU authenticates a user upon detecting the MAC address of the user for the first time In the process of authentication users don t need to input a username or password manually 10 3 1 Port Configuration Enable or disable the MAC authentication statu...

Страница 45: ...detected The value ranges from 1 to 65535 and the default value is 300 seconds Quiet Period To set the time interval the client must wait after a client authentication fails During this time interval the device does not perform the user authentication function The value ranges from 1 to 3600 and the default value is 60 seconds Server Timeout To set the time interval the device waits for a response...

Страница 46: ...p Failed packets passing through a port thus it will lead to traffic congestion If the transmission rate of the three kind packets exceeds the set bandwidth the packets will be automatically discarded to avoid network broadcast storm Traffic Type can be selected from None means to disable storm control Broadcast Broadcast Multicast Broadcast Multicast DLF Set thresholds for the specified Traffic T...

Страница 47: ... cover a building or an area The WLAN solution allows you to provide the following wireless LAN services to your customers Connectivity to the Internet WLAN client connectivity to conventional 802 3 LANs Secured WLAN access with different authentication and encryption methods Seamless roaming of WLAN clients in the mobility domain The Wireless Settings include the following items 11 1 Basic Config...

Страница 48: ...other VLAN ID Add the SSID to the corresponding VLAN If the VLAN exists it is added to the VLAN directly if the VLAN doesn t exist first create the VLAN and then add the SSID to it By default the SSID is in VLAN 1 Frequency channel This is the channel frequency of the wireless LAN The default channel is 6 You may switch channel if the selected channel is under serious interference Channel BandWidt...

Страница 49: ...media It defines the priority levels for four access categories derived from 802 1d prioritization tabs The categories are designed with specific types of traffic voice video best effort and low priority data There are four accessing categories AC_BE AC_BK AC_VI and AC_VO for WMM APSD automatic power save delivery is an enhancement over the power save mechanisms supported by Wi Fi networks It allo...

Страница 50: ... Click Enable to enable the function of automatic power save delivery APSD IGMP Snooping The default setting is Disable Click Enable to enable the function of IGMP Snooping Access point AP An AP bridges frames between wireless and wired networks Aifsn It controls how long the client waits for each data transmission Please specify the value ranging from 1 to 15 Such parameter will influence the tim...

Страница 51: ...ransmission opportunity For WMM categories of AC_VI and AC_VO that need higher priorities in data transmission please set greater values for them to get the highest transmission opportunity Specify the value ranging from 0 to 65535 ACM It is an abbreviation of Admission Control Mandatory It can restrict stations from using specific category class if it is checked AckPolicy Uncheck default value th...

Страница 52: ...t networks Select the current key that will be used WEP Key1 Key4 Four keys can be entered here but only one key can be selected at a time The format of WEP Key is restricted to 10 or 26 Hex characters except and After all settings are completed click Apply to activate them 3 SHARPEDWEP Accepts only WEP clients and the encryption key should be entered in the WEP Key fields The AP sends an unencryp...

Страница 53: ...orks Select the current key that will be used WEP Key1 Key4 Four keys can be entered here but only one key can be selected at a time The format of WEP Key is restricted to 10 or 26 Hex characters except and After all settings are completed click Apply to activate them 4 WEPAUTO Of OPENWEP and SHAREDWEP if you are not sure which one to use choose WEPAUTO ...

Страница 54: ...r WPA Key Renewal Interval WPA uses shared key for authentication to the network However normal network operations use a different encryption key that is randomly generated This randomly generated key is periodically replaced Enter the renewal security time seconds in the column Smaller interval leads to greater security but lower performance Default is 3600 seconds Set 0 to disable re key IP Addr...

Страница 55: ...A Algorithms Select TKIP AES or TKIP AES as the algorithm for WPA Pass Phrase If WEP or AES is selected input 8 64 characters as encrypt key Key Renewal Interval WPA uses shared key for authentication to the network However normal network operations use a different encryption key that is randomly generated This randomly generated key is periodically replaced Enter the renewal security time seconds...

Страница 56: ...unction IP Address Enter the IP address of RADIUS Server Port The UDP port number that the Radius Server is using The default value is 1812 based on RFC 2138 Shared SecretThe Radius Server and client share a secret that is used to authenticate the messages sent between them Both sides must be configured to use the same shared secret Session Timeout Set the maximum time of service provided before R...

Страница 57: ...ndomly generated key that is periodically replaced Enter the renewal security time seconds in the column Smaller interval leads to greater security but lower performance Default is 3600 seconds Set 0 to disable re key After all settings are completed click Apply to activate them 9 WPA PSK WPA2 PSK This is a mixed mode the most secure encryption mode at present WPA Algorithms Select TKIP AES or TKI...

Страница 58: ...he algorithm for WPA Key Renewal Interval WPA uses shared key for authentication to the network However normal network operations use a different encryption key that is randomly generated This randomly generated key is periodically replaced Enter the renewal security time seconds in the column Smaller interval leads to greater security but lower performance Default is 3600 seconds Set 0 to disable...

Страница 59: ... Enter the IP address of RADIUS Server Port The UDP port number that the Radius Server is using The default value is 1812 based on RFC 2138 Shared SecretThe Radius Server and client share a secret that is used to authenticate the messages sent between them Both sides must be configured to use the same shared secret Session Timeout Set the maximum time of service provided before Re authentication S...

Страница 60: ...asy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2 It is the simplest way to build connection between wireless network clients and AE208 Gateway Users do not need to select any encryption mode and type any long encryption passphrase to setup a wireless client every time The user only needs to press a button on wireless cl...

Страница 61: ...elated system information for WPS If the wireless security encryption function of the AE208 Gateway is properly configured you can see Configured message here WPS Configured No will be displayed when AE208 Gateway is not connected with any STA by WPS at present while Yes will be displayed while AE208 Gateway is connected with STA by WPS ...

Страница 62: ...Clicking Generate can generate different AP PIN PBCClick Start PBC to invoke Push Button style WPS setup procedure The AE208 Gateway will wait for WPS requests from wireless clients PIN Type the PIN code specified in wireless client you wish to connect and click Start PIN It will return to normal condition after two minutes You need to set up WPS within two minutes 11 3 WDS WDS means Wireless Dist...

Страница 63: ...itted via communication channel Encryp Type There are four types for security Disabled WEP TKIP and Key or Peer Mac Address field valid or not Choose one of the types for the router Please disable the unused link to get better performance Encryp Key If WEP is selected input 10 26 hexdecimal or 5 13 ascii as encrypt key If WEP or AES is selected input 8 64 characters as encrypt key 2 Bridge Mode ...

Страница 64: ...here are four types for security Disabled WEP TKIP and Key or Peer Mac Address field valid or not Choose one of the types for the router Please disable the unused link to get better performance Encryp Key If WEP is selected input 10 26 hexdecimal or 5 13 ascii as encrypt key If WEP or AES is selected input 8 64 characters as encrypt key AP MAC Address Four AP MAC Addresses are allowed to be entere...

Страница 65: ...get better performance Encryp Key If WEP is selected input 10 26 hexdecimal or 5 13 ascii as encrypt key If WEP or AES is selected input 8 64 characters as encrypt key AP MAC Address Four AP MAC Addresses are allowed to be entered on this page at one time 11 4 APSCAN 11 4 1 AP Scan AE208 Gateway can scan all regulatory channels and find working APs in the neighborhood Based on the scanning result ...

Страница 66: ...ay the wireless channel used for the AP that is scanned by this router Encryption Display the encryption mode for the scanned AP Authentication Display the authentication type that the scanned AP applied ReScan It is used to discover all the connected AP again Add selected BSSID to WDS Select the SSID of the Access Point that AE208 Gateway wants to connect to Bridge Repeater AE208 Gateway will con...

Страница 67: ...along with its status code The list shows the station information Index Index number MAC Address Display the MAC Address for the connecting client SSID Display the SSID that the wireless client connects to Authentication Display the authentication that the wireless client uses for connection with the AP Encryption Display the encryption mode used by the wireless client 11 5 2 Statistics ...

Страница 68: ...Solutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 68 of 114 This page displays all the wireless statistic information of AE208 Gateway ...

Страница 69: ...o the originating VoIP gateway through PSTN The originating VoIP gateway converts analog signals into digital signals and compresses them into voice packets that can be transmitted over the IP network The IP network transmits the voice packets to the terminating VoIP gateway which converts the voice packets back to recognizable analog signals and transmits them to the receiver This is a complete t...

Страница 70: ...n Setting 12 1 1 FXS Port Settings A foreign exchange station FXS interface uses a standard RJ 11 connector and a telephone cable to directly connect with an ordinary telephone or a fax machine An FXS interface accomplishes signaling exchange based on the level changes on the Tip Ring line and provides ring voltage and dial tone You can configure the Flash Time FXS Impedance and Jitter Buffer on t...

Страница 71: ...al Plan Settings The dial plan can be configured on this page Replace Prefix Code This can be set to on or off When it is on the Replace Rule will take effect Replace Rule The leading digits of an input number will be replaced if they match those specified in the Replace Rule There are some examples in the following a If the Replace Rule is 001 005 ...

Страница 72: ...n 0 If the leading three characters are 0 only these three characters will be dialed xx If the leading three characters are 00 01 or 99 only these three characters will be dialed xx If the leading three characters are 00 01 or 99 only these three characters will be dialed 10x If the leading three digits are 100 101 or 109 only these three digits will be dialed 11x If the leading three digits are 1...

Страница 73: ...will be dialed Digits Description 0 Ignore auto prefix if first digit is 0 1 Ignore auto prefix if first digit is 1 xxxx Ignore auto prefix if input number has 4 leading digits xxxxxx Ignore auto prefix if input number has 6 leading digits Auto Dial Time If the input number does not end with the number will be dialed after Auto Dial Time expires After all settings are completed click Apply to acti...

Страница 74: ...rty s handset DND Always All incoming calls will be blocked until this feature is disabled DND Period Set a time period during which incoming calls will be blocked If the From setting is greater than the To setting the To setting represents a time of the following day Call Waiting Enable or disable call waiting Call ID There are four settings of Caller ID Select an FSK based or DTMF based setting ...

Страница 75: ...red in the URL field the incoming calls will be forwarded to this speed dial number No Answer Forward If you do not answer the phone until the Time Out time expires the incoming call will be forwarded to a specified number If a speed dial number is entered in the URL field the incoming call will be forwarded to this speed dial number Also you have to set the Time Out rings for system to start to f...

Страница 76: ...e register password for the register name Domain Server Type the ISP s domain server IP address Proxy Server Type the ISP s proxy server IP address Outbound Proxy Type the ISP s outbound proxy IP address Leave this field blank if you do not have the information Subscribe for MWI Enable or disable the message waiting Indicator SIP Port Set up the SIP register port RTP Port Set up the RTP port Rport...

Страница 77: ...G 723 G 729 G 726 16 G 726 32 G 726 40 GSM and Not Used G 711 G 729 RTP Packet Length Select G 711 G 729 RTP packet length There are 9 options 10ms 20ms 30ms 40ms 50ms 60ms 70ms 80ms and 90ms G 723 RTP Packet Length Select G 711 G 729 RTP packet length There are 3 options 30ms 60ms and 90ms Codec ID Settings Set the codec ID s After all settings are completed click Apply to activate them 12 2 3 Ot...

Страница 78: ...STUN port After all settings are completed click Apply to activate them 12 3 Network Settings VoIP VLANs are configured specially for voice data stream By configuring VoIP VLANs and adding the ports with voice devices attached to VoIP VLANs you can perform QoS related configuration for voice data ensuring the transmission priority of voice data stream and voice quality Configuration Steps Step 1 E...

Страница 79: ...ot enabled you have to specify its IP address subnet mask route 1and route 2 If the Phone 1 SIP server can only be reached by a specified route type the next route IP address in Phone 1 Route field otherwise it will adopt default route to look for the Phone 1 SIP server And in Phone 2 Route field type the next route IP address of the Phone 2 SIP server ...

Страница 80: ...each Ethernet port 13 2 Port statistics This page shows the TxGoodPkts TxBadPkts RxGoodPkts RxBadPkts TxAbort Collision and DropPkt of each Ethernet port TxGoodPkts The total number of outgoing normal packets on the port including outgoing normal packets and normal pause frames TxBadPkts The total byte number of outgoing error frames RxGoodPkts The total number of incoming normal packets on the po...

Страница 81: ... the information of all VLANs including VID Name Type and member port type Tagged or Untagged Tagged lists all ports from which packets are sent tagged Untagged lists all ports from which packets are sent untagged 13 4 MAC Address Table This page shows information of unicast MAC address entries in the MAC address table including VID Unicast MAC Address Port and Type Type includes Dynamic Static an...

Страница 82: ...oup This page shows IGMP Snooping multicast group information including VID Multicast Group MAC Address and Member Ports Multicast Group is the IP address of a multicast group MAC Address is the address of a multicast MAC group and Member Ports include all ports belonging to this IGMP Snooping group ...

Страница 83: ...to establish a spanning tree BPDUs contain sufficient information for the network devices to complete spanning tree calculation In STP BPDUs have the following types Configuration BPDUs used for calculating a spanning tree and maintaining the spanning tree topology Topology change notification TCN BPDUs used for notifying the concerned devices of network topology changes if any 3 Basic Concepts in...

Страница 84: ...owing figure AP1 and AP2 BP1 and BP2 and CP1 and CP2 are ports on Device A Device B and Device C respectively If Device A forwards BPDUs to Device B through AP1 the designated bridge for Device B is Device A and the designated port of Device B is port AP1 on Device A Two devices are connected to the LAN Device B and Device C If Device B forwards BPDUs to the LAN the designated bridge for the LAN i...

Страница 85: ...rt to transit its state after the network topology is changed Forward Delay ranges from 4 to 30 seconds and is 15 by default When the STP regeneration caused by network malfunction occurs the STP structure will get some corresponding change However as the new configuration BPDUs cannot be spread in the whole network at once the temporal loop will occur if the port cannot transits its state immedia...

Страница 86: ...In order to allow the port to transit to forwarding state quickly enable the STP Port Fast feature which can immediately transit the port into STP forwarding state upon linkup This port still participates in STP In case that the port forms a loop it will transit into STP blocking state Root Protection It is disabled by default Due to configuration error or malicious attack the root bridge in a net...

Страница 87: ...d version of STP It achieves rapid network convergence by allowing a newly elected root port or designated port to enter the forwarding state much quicker under certain conditions than in STP Point to PointIndicates the link between two devices directly connected Protocol Migration When enable Protocol Migration on a specified port if RSTP is enabled on this port while the port on the peer device ...

Страница 88: ...an edge port it can directly transit to forwarding state if the designated port is connecting to a point to point link it can transit to forwarding state after getting response from the downstream device through handshake So it is suggested to configure the ports connected with terminals to be edge ports ...

Страница 89: ...l USM to secure SNMP communication You can configure authentication and privacy mechanisms to authenticate access and encrypt SNMP Note An NMS and an SNMP agent must use the same SNMP version to communicate with each other SNMP management frame includes three network elements SNMP Management Station SNMP Agent and MIB Management Information Base SNMP Management Station SNMP Management Station is t...

Страница 90: ...unt Select SNMP version v1 and v2c Type a community name it is a string of 3 to 16 characters Select the privilege RW and RO RO Specifies the community that has been created has read only permission to access MIB objects Communities of this type can only query MIBs for device information RW Specifies the community that has been created has read write permission to access MIB objects Communities of...

Страница 91: ...ion is performed via SHA Secure Hash Algorithm This authentication mode has a higher security than MD5 mode Auth Password Type the password for authentication It is a string of 9 to 15 characters in plain text or a 32 bit hexadecimal number in cipher text if MD5 algorithm is used or a 40 bit hexadecimal number in cipher text if SHA algorithm is used Privacy Algorithm Select the Privacy Algorithm f...

Страница 92: ...rap to send traps to NMS 15 2 1 Global Trap On this page you can enable or disable Trap globally 15 2 2 Trap Host IP This tab page specifies SNMP trap Host IP Host IP is the IPv4 address of the host to receive the traps The bottom part of this page lists all existing trap host IP addresses They can be deleted ...

Страница 93: ... 93 of 114 15 2 3 Trap Filter On this page you can decide to trigger traps in what situations You can enable or disable the trap and further set the threshold Port Link Trap If enable the port link trap function the device will send a trap in port link up or link down ...

Страница 94: ...rating temperature is higher than CATV Operating Temperature Threshold trap will be sent CATV Input Power Voltage CATV Input Power Voltage Max Threshold CATV Input Power Voltage Min Threshold If CATV Input Power Voltage is set as Enable when CATV input power Voltage is higher than CATV Input Power Voltage Max Threshold or lower than the CATV Input Power Voltage Min Threshold trap will be sent Hear...

Страница 95: ...orts the following four RMON Groups defined on the RMON standard RFC1757 History Group Event Group Statistic Group and Alarm Group RMON Group Function History Group After a history group is configured the device collects and records network statistics information periodically based on which the management station can monitor network effectively Event Group Event Group is used to define RMON events...

Страница 96: ...ackets MulticastPktsThe total number of the received good packets that are directed to a multicast address except the packets directed to the broadcast address CRC Align Errors The total number of the received packets that has a length excluding framing bits but including FCS octets of between 64 and 1518 octets both inclusive and has either a bad FCS with an integral number of octets FCS Error or...

Страница 97: ...nclusive excluding framing bits but including FCS octets including bad packets Pkts 128 to255 Octets The total number of received packets that are between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets including bad packets Pkts256 to 511 Octets The total number of packets including bad packets received that are between 256 and 511 octets in length inclusive...

Страница 98: ...ich data shall be saved in the part of the media specific table associated with this history control entry It shall be an integer ranging from 1 to 50 16 2 2 History List On this page one of the histories can be selected to show the related statistics The bottom part of this page shows the related statistic information Index DropEvents RxOctets RxPkts Broadcast Multicast CRCAlignErrors Undersize O...

Страница 99: ...the corresponding event which will be triggered if the sampled value is larger than the Rising Threshold Falling Threshold Type the falling counter value that triggers the Falling Threshold alarm Falling Event Index Select the index of the corresponding event which will be triggered if the sampled value is lower than the Falling Threshold Startup Alarm Specify the type of the alarm Rising Alarm Wh...

Страница 100: ...ied by this octet string Description A comment to describe this event entry Type The type of notification that the probe makes about this event in the case of log an entry is made in the log table for each event in the case of SNMP trap an SNMP trap is sent to one or more management Owner The entity that configured this entry and is therefore using the resources assigned to it The bottom part of t...

Страница 101: ...olutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 101 of 114 16 4 2 Event Log This page shows information about event log entries including Event Index Log Index Log Time and Description ...

Страница 102: ... IP DHCP Client can be enabled by checking the Enabled checkbox If static IP is used IP Address Subnet Mask and Gateway shall be specified 17 2 SNTP This page configures SNTP Simple Network Time Protocol SNTP Mode Select Server mode or Client mode Service IP address If you select Client mode you should set the device time through the SNTP server for time synchronization IP address of SNTP server ...

Страница 103: ...e system time can be set with year month day hour minute and second 17 3 SMTP This page sets SMTP Simple Message Transfer Protocol configuration When a pre defined event occurs an e mail will be sent to the following destination mail address Destination Mail The e mail address to receive the event information SMTP Service IP The IP address of SMTP server Source Account Name Source e mail account o...

Страница 104: ...vents 17 4 1 System Event This page sets the following system events Select Apply for an event to trigger e mail sending when this event occurs Onaccess cold start The device is booted up by turning on the power Onaccess warm start The device is restarted without turning off power Auth failure Fails to login to the device due to incorrect username or password RMON event log see chapter 12 of this ...

Страница 105: ...Down Traffic Overload It means that the port traffic exceeds Traffic Threshold during a statistics time of Traffic Duration Traffic Threshold The threshold for port traffic in percentage of the port speed Traffic Duration The statistics duration time for calculating port traffic Note Traffic Overload Traffic Threshold and Traffic Duration are interrelated When Traffic Overload is enabled Traffic T...

Страница 106: ...ntcomtec com Page 106 of 114 17 5 System Logs This page shows all of the system logs clicking Clear to clear all the records of the system logs And you can turn to the next page to go back to the previous page by clicking Next and Forward respectively ...

Страница 107: ...FoG and HFC www ascentcomtec com Page 107 of 114 17 6 Ping Diagnosis On this page you can ping an IP address to check the network connectivity and the reachability of a host If the device is reachable it will remind you as follows ...

Страница 108: ...ername it is a string of 3 to 16 characters Password Type the password it is a string of 1 to 16 characters Privilege It can be set as user or admin User cannot add or delete an account can neither use the TFTP service nor reset function while admin can check and modify the device configuration The bottom part of this page lists all accounts including Username and Privilege An account can be delet...

Страница 109: ...mance Before upgrading firmware make sure the device is connected to the TFTP server and the TFTP software is turned on and new firmware file exists on the server You can get the newest firmware from Ascent Communication Technology please contact your sales representative The device will begin to update firmware after clicking on Apply Please pay attention to the following reminds ...

Страница 110: ...re is turned off After upgrade you should reboot the system manually to make upgrade effective Caution please don t cut off the power supply during updating firmware uploading or downloading a configuration file 17 8 2 Backup Configuration This page sets a TFTP Server IP and File Name Before backing up configuration make sure the device is connected to the TFTP server The device configuration file...

Страница 111: ...guration make sure the device is connected to the TFTP server The device will download the file with the specified File Name and use it as the configuration file after clicking on Apply 17 9 Reboot On this page there are two buttons Save And Reboot and Reboot Without Save Save And Reboot Saves the current configuration and then reboot Reboot Without Save Directly reboots without saving the current...

Страница 112: ...wo tab pages Reset and Reset To Default Reset the device will be reset to the factory default setting except that the IP address and user accounts are kept unchanged Reset To Default the device will be reset to the factory default setting 17 11 Save Configuration This page saves current configurations ...

Страница 113: ...Solutions Provider for FTTx RFoG and HFC www ascentcomtec com Page 113 of 114 18 Logout Click Logout in the left menu to log out from the Web interface ...

Страница 114: ...INA HONG KONG 13 F Shum Tower 268 Des Voeux Road Central Hong Kong Phone China 86 139 0173 4382 Phone Hong Kong 852 5483 7156 Email sales ascentcomtec com USA 11B Goodwin St Stamford CT 06906 USA Phone 1 203 816 5188 Email sales ascentcomtec com Specifications and product availability are subject to change without notice Copyright 2011 Ascent Communication Technology Limited All rights reserved Ve...

Отзывы: