background image

VT2400/VT2500 Series Voice Gateway User Guide

105

Overview Installation Troubleshooting

Contact

FAQ

Specifications Glossary License

Configuration:   

Basic      Advanced      TCP/IP      Wireless 

Configuring a Wireless Client for WPA

If you enabled WPA and set a PSK Passphrase by “

Configuring WPA on the VT2500

”, you must configure the 

same passphrase (key) on each wireless client. The 

VT2500

 cannot authenticate a client if:

WPA is enabled on the 

VT2500

 but not on the client

The client passphrase does not match the 

VT2500

 PSK Passphrase

For information about the WPA support in Windows XP, visit:

You can download the Microsoft Windows XP Support Patch for WPA from 

http://www.microsoft.com/downloads/details.aspx?FamilyId=009D8425-CE2B-47A4-ABEC-274845DC9E91&disp
laylang=en

.

Configuring a Wireless Client for WEP

If you enabled WEP and set a key by 

If you need to restore the wireless defaults, click Reset Security Defaults.

,

you must configure the same WEP key on each wireless client. The 

VT2500

 cannot authenticate a client if:

Shared Key Authentication is enabled on the 

VT2500

 but not on the client

The client WEP key does not match the 

VT2500

 WEP key

On a WLAN client equipped with a Motorola wireless adapter, you can enter the WEP Passphrase you set when 
you configured the 

VT2500

. For all other wireless adapters, you must enter the 64-bit or 128-bit WEP key 

generated by the 

VT2500

.

Configuring a Wireless Client with the Network Name (ESSID)

To distinguish it from other nearby WLANs, you should identify your WLAN with a unique network name (also 
known as a network identifier or ESSID). As you configure a wireless client, you will be prompted for the network 
identifier, network name, or ESSID; type the same 

name

 that appears in the ESSID field on the 

Wireless > 

NETWORK

 page in the 

VT2500

 Setup Program (see 

Wireless > NETWORK

 for details). If the network name is 

not configured yet, see “

Configuring the Wireless Network Name on the VT2500

” to configure it.

After you specify the network name, many wireless cards or adapters automatically scan for an access point such
as the 

VT2500

 and the proper channel and data rate. If your card requires you to manually start scanning for an

access point, do so following the instructions in the documentation supplied with the card. 

WPA Wireless Security for Home Networks

http://www.microsoft.com/WindowsXP/expertzone/columns/ 
bowman/03july28.asp

Overview of the WPA Wireless Security Update in 
Windows XP

http://support.microsoft.com/?kbid=815485

Caution!

Never provide the PSK Passphrase to anyone who is not authorized to use your WLAN.

Caution!

Never provide the WEP key to anyone who is not authorized to use your WLAN.

Содержание VT2000

Страница 1: ...User Guide VT2500 VT2400 Voice Gateway ...

Страница 2: ...UIPMENT When using this device basic safety precautions should always be followed to reduce the risk of fire electric shock and injury to persons including the following Read all of the instructions listed here and or in the user manual before you operate this equipment Give particular attention to all safety precautions Retain the instructions for future reference This device must be installed an...

Страница 3: ...to perform safety checks to determine that the product is in safe operating condition Be sure that the outside cable system is grounded so as to provide some protection against voltage surges and built up static charges Article 820 20 of the NEC Section 54 Part I of the Canadian Electrical Code provides guidelines for proper grounding and in particular specifies the CATV cable ground shall be conn...

Страница 4: ...MB 003 du Canada FCC Certification This product contains a radio transmitter and accordingly has been certified as compliant with 47 CFR Part 15 of the FCC Rules for intentional radiators Products that contain a radio transmitter are labeled with FCC ID and the FCC logo Important VoIP Service Information Any services provided through this equipment Are not intended to replace or be a substitute fo...

Страница 5: ... that is installed outdoors is subject to licensing Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 This device must accept any interference received including interference that may cause undesired operation This device has been designed to operate with two antennae one is a detachable dipole antenna reverse SMA type Tx and RX that has a ...

Страница 6: ... warranties of merchantability and fitness for a particular purpose Motorola may make improvements or changes in the product s described in this manual at any time MOTOROLA and the Stylized M Logo are registered in the US Patent Trademark Office Microsoft Windows Windows Me Windows NT and Xbox are registered trademarks and Windows XP and Xbox Live are trademarks of Microsoft Corporation Microsoft ...

Страница 7: ... 9 Installation 10 Positioning Your Router for Optimal Wireless Performance VT2500 only 10 Hardware Setup 11 Antenna Installation VT2500 only 11 Physical Placement 12 Horizontal Installation 12 Vertical Installation 13 Wall Mount Installation 13 Electrical Connection 14 Connecting the VT2400 VT2500 to a Network 16 Setting Up a New Network 16 Adding the VT2500 VT2400 to an Existing Network 17 Confi...

Страница 8: ...g 38 Gateway LAN dhcp leases 40 Gateway LAN static leases 41 Gateway PORT FORWARDING status 43 Gateway PORT FORWARDING config 44 Gateway PORT TRIGGERS predefined 46 Gateway PORT TRIGGERS custom 48 Gateway DNS 50 Gateway LOG 51 System CONTROL 52 System CONFIGURATION backup 53 System CONFIGURATION restore 54 System CONFIGURATION reset 55 System LOG 56 Firewall FIREWALL basic 57 Firewall FIREWALL adv...

Страница 9: ...nfiguring WPA on the VT2500 96 Configuring WEP on the VT2500 98 Restricting Wireless LAN Access 100 Configuring the Wireless Network Name on the VT2500 101 Configuring a MAC Access Control List on the VT2500 103 Configuring the Wireless Clients 104 Configuring a Wireless Client for WPA 105 Configuring a Wireless Client for WEP 105 Configuring a Wireless Client with the Network Name ESSID 105 Wirel...

Страница 10: ... is directly connected to your broadband modem the it can prioritize voice calls over data traffic This helps ensure high quality phone service In addition it offers rich features for enhanced telephone service such as caller ID The voice gateway also provides a built in router VT2400 VT2500 and wireless access point VT2500 only for a home or small office network Models The VT2400 VT2500 Voice Gat...

Страница 11: ...n cable or DSL Plug and play installation Compact low profile design Easy Web based configuration Support for rich telephone service features such as caller ID call waiting three way calling call forwarding etc Firewall and parental controls Network Connection Types As shown in the following illustrations the VT2400 VT2500 Voice Gateway can be set up with a wired or wireless connection or a combin...

Страница 12: ...iple PCs without the need for a stand alone hub or router The VT2400 also includes a firewall to help protect your network against external attacks Sample Wireless Network for Home or Office VT2500 The VT2500 Wireless Voice Gateway offers all the features of the VT2400 with the added convenience of a built in 802 11b g wireless access point for wireless access to broadband services It eliminates t...

Страница 13: ... IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 4 Sample Combination Wired and Wireless Network for Home or Office VT2500 The VT2500 Wireless Voice Gateway allows you to set up a combination of wired and wireless PCs and other devices in your home or office network Either a cable or DSL modem can be used ...

Страница 14: ...ged in and operating normally Status Series of blinks indicates various voice gateway events see next table WLAN VT2500 only Green indicates activity on the wireless LAN WAN Indicates activity on the WAN Internet and link speed LAN 1 The devices on a single LAN port or LAN 1 are connected and operational LAN 2 The devices on LAN 2 are connected and operational LAN 3 The devices on LAN 3 are connec...

Страница 15: ...its network IP address N A Three blinks Downloading its configuration profile from your VoIP provider N A Continuous Downloading a firmware upgrade initiated by your VoIP provider Attempting to reregister with your VoIP provider after interruption in service PSTN failover see next table Solid N A Successfully registered with your VoIP provider LED Activity WAN LED Solid green If there is a 100Base...

Страница 16: ...N RJ 45 Ethernet connector to your broadband modem switch or hub WAN or wide area network refers here to the Internet LINE 1 RJ 11 Telephone line one LINE 2 RJ 11 Telephone line two PSTN failover RJ 11 Supports a live phone line from the public switched telephone network or land phone connected to plain old telephone service If there is a power failure phones connected to the voice terminal will s...

Страница 17: ...er installed in each computer to be wireless on the network refer to the instructions that came with your wireless adapter Optional You may need additional 10 100Base T category 3 or better straight through Ethernet cables with RJ 45 terminators to connect additional Ethernet devices PCs Plugging the power adapter into a surge protector is also recommended Signing Up for Service To activate voice ...

Страница 18: ...s arising from or related to the services provided through this equipment IMPORTANT You cannot make any calls using this VoIP device if your broadband connection is not functioning properly or if you lose electrical power Document Conventions Before you begin using the VT2400 VT2500 become familiar with the style conventions used in this manual Related Documentation The VT2400 VT2500 Series Voice ...

Страница 19: ...liances also might interfere with the router televisions radios microwave ovens or 2 4 GHz cordless telephones Therefore positioning the voice gateway where it encounters the least interference helps maintain a better connection The following table lists the expected wireless range of the router This table is only a guide and coverage varies due to local conditions To achieve the best wireless per...

Страница 20: ...ly physical placement horizontal vertical or mounted on the wall electrical connection connecting the power cord Antenna Installation VT2500 only When shipped the antenna for the router is not connected to the voice gateway To attach the antenna to the voice gateway 1 Locate the antenna port on the back of the voice gateway the threaded knob 2 Screw the antenna connector clockwise onto the threade...

Страница 21: ...teway User Guide 12 Physical Placement For desktop use the voice gateway can be installed either horizontally or vertically It can also be mounted on a wall Horizontal Installation 1 Place the voice gateway in the desired location as shown in the figure below 2 Follow the installation procedures for connecting and configuring the voice gateway to a network ...

Страница 22: ...tion the VT2400 VT2500 as specified by the local or national codes governing residential or business communications services Follow all local standards for installing a network interface router network interface device NIU NID If possible mount the VT2400 VT2500 to concrete masonry a wooden stud or other solid wall material Use anchors when necessary such as when you must mount the voice gateway o...

Страница 23: ...m 10 16 x 11 2 inch screws with a flat underside and maximum screw head diameter of 10 5 mm to mount the voice gateway 10 Using a screwdriver turn each screw until part of it protrudes from the wall as shown There must be 4 0 mm 16 inches between the wall and the underside of the screw head The maximum distance from the wall to the top of the screw head is 7 6 mm 3 in 11 Remove the two plastic fee...

Страница 24: ...vanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 15 1 Connect the power adapter to the voice gateway Power port found on the back of the unit 2 Plug the power adapter into a grounded and surge protected power outlet The Power LED on the front panel lights green when connected properly ...

Страница 25: ...tions if you have a single PC connected directly to the modem or no Internet connection until now 1 Be sure the modem and the PCs are turned off and the VT2400 VT2500 is unplugged 2 If you only have a single PC connected disconnect the Ethernet cable from the PC to the modem on the modem end only and connect it to a LAN port on the VT2400 VT2500 3 Connect up to three additional PCs using Ethernet ...

Страница 26: ...er you disconnect them from the wall jacks and connect them to the LINE 1 and LINE 2 ports on the VT2400 VT2500 Configuring the Voice Gateway to the Modem Most high speed Internet connections use a cable modem or a DSL modem The cable modem is connected to your cable television company coax cable The DSL modem is connected to a telephone company phone line Determine which modem you are using and g...

Страница 27: ...king you need to complete several basic configuration procedures Proceed to Basic Configuration on page 19 Modem Worksheet Cable Modem cable company DSL Modem phone company Service Name _______________________________ ________________________ Your User Name _______________________________ ________________________ Your Password _______________________________ ________________________ DHCP Is the IP...

Страница 28: ...setting up a LAN with one or more wireless clients Gaming Configuration Guidelines Help Rebooting Logging Out For more advanced configuration information see Advanced Configuration on page 31 For normal operation you do not need to change most default settings Caution To prevent unauthorized configuration change the default password immediately when you first configure the VT2400 VT2500 See Changi...

Страница 29: ... Web browser such as Internet Explorer or Netscape 2 In the Address or Location field type http 192 168 102 1 or http 192 168 0 1 and press ENTER to display the Log In window 3 In the User ID field type the user name The default is admin this field is case sensitive 4 In the Password field type the password The default is motorola this field is case sensitive Caution Run the voice gateway configur...

Страница 30: ...Click Log In to display the VT2400 VT2500 user configuration setup screens If you have difficulty starting the VT2400 VT2500 setup program see Troubleshooting for information After you edit the field and click Apply for some settings you are required to reboot the VT2400 VT2500 for the changes to take effect Rebooting takes 10 to 15 seconds After rebooting you must log in again ...

Страница 31: ...age click Launch Getting Started Wizard to display the Change Admin Password page 2 In the Old Password field type the old password The default password is motorola this field is case sensitive 3 In the New Password field type the new password 4 In the Retype Password field type the new password again 5 Click Apply to make your changes Caution To prevent unauthorized configuration change the defau...

Страница 32: ...Internet This section describes using the Policy POLICY config page to choose one of the predefined firewall policies provided with the voice gateway The predefined policies provide outbound Internet access for computers on the VT2400 VT2500 LAN The voice gateway firewall uses stateful inspection to allow inbound responses when there already is an outbound session running corresponding to the data...

Страница 33: ... VT2500 firewall to allow inbound packets without first establishing an outbound session You will also need to configure a port forwarding entry on the Gateway PORT FORWARDING config page or a DMZ client on the Gateway LAN static leases page High The safest firewall policy template that provides the highest security We recommend this setting Medium A firewall policy template that provides a common...

Страница 34: ...eck box is not selected on the Wireless NETWORK page Enabling Wireless Security for Wireless Devices Follow this procedure if you plan to have wireless devices in your network 1 On the Wireless NETWORK page select the Enable Wireless Interface check box 2 Change the ESSID name Type up to 32 alphanumeric case sensitive characters Caution 3 Click Save Changes 4 On the Wireless SECURITY advanced page...

Страница 35: ...rt Triggers Because the voice gateway has predefined port triggers for games using any of the following applications no user action is required to enable them DirectX 7 and DirectX 8 MSN Games by Zone com Battle net For a list of games supported by Battle net visit http www battle net You may need to create custom port triggers to enable other games to operate properly If you set custom port trigg...

Страница 36: ...orts required vary from game to game For these games we recommend configuring the gaming computer or device as a gaming DMZ device To configure a gaming DMZ device on the Gateway LAN static leases page 1 Reserve a private IP address for the computer or game device MAC address 2 Designate the device as a DMZ device You can reserve IP addresses for multiple devices but only one device can be designa...

Страница 37: ... VT2500 Series Voice Gateway User Guide 28 Help Use this page to obtain Help screens when using the VT2400 VT2500 graphical user interface For example Help page fields Field or Button Description HELP Generates a help window that contains a description and other information Note to reviewers is there a search optionon the Help button ...

Страница 38: ...c Advanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 29 Rebooting When you click Reboot this message appears Click OK to reboot the VT2400 VT2500 voice terminal The current configuration or changes you just made using the Apply buttons will be kept Click Cancel to cancel the reboot ...

Страница 39: ...ooting Contact FAQ Specifications Glossary License Configuration Basic Advanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 30 Logging Out When you click Log Out the VT2400 VT2500 Setup Program log in screen appears ...

Страница 40: ... leases Gateway PORT FORWARDING status Gateway PORT FORWARDING config Gateway PORT TRIGGERS predefined Gateway PORT TRIGGERS custom Gateway DNS Gateway LOG System CONTROL System CONFIGURATION backup System CONFIGURATION restore System CONFIGURATION reset System LOG Firewall FIREWALL basic Firewall FIREWALL advanced Firewall CONTENT FILTER status Firewall CONTENT FILTER config Firewall SCHEDULES st...

Страница 41: ...on any wizard screen to obtain a Help window which provides information to help you configure that particular field In the example shown if you click Enable Manual MTU the Help window displays information about Maximum Transmission Unit MTU To close the Help screen simply click the close button in the upper right corner When you finish the current screen click the next tab at the top of the graphi...

Страница 42: ...the status information for several gateway configuration parameters To view a definition of any field on the Status page click the underlined field A Help screen appears that displays the definition You may want to select the Launch Getting Started Wizard which takes you through the minimum screens you need to verify for any voice gateway network Refer to Using the Getting Started Wizard for more ...

Страница 43: ...default Use this page if you have a cable Internet provider that uses dynamic IP addressing which automatically obtains the public IP address subnet mask domain name and DNS server s DHCP Client is the default IP allocation method CONFIGURATION Request Lease Click this button to obtain a DHCP leased IP address Once the lease is acquired the assigned settings are displayed Up to 64 IP addresses can...

Страница 44: ...cquired the assigned settings are displayed User Name Type the user name you selected when you set up your user name in the basic configuration procedures Password Type the password you selected when you set up your password in the basic configuration procedures Disconnect After From the list select the amount of time before being disconnected from the Internet after a period of inactivity Note Th...

Страница 45: ...the worksheet to Is the IP address obtained dynamically CONFIGURATION IP Address Type the static IP address provided by the service provider in dotted decimal format The default is None Example 192 168 102 150 Subnet Mask Type the subnet mask associated with the static IP address in dotted decimal format The default is None Gateway Type the default gateway IP address on the WAN for the VT2400 VT25...

Страница 46: ...ddresses on the VT2500 LAN Use External Interface IP address Manually enter Enable STUN Enables a protocol for assisting devices behind a NAT firewall or router with their packet routing STUN allows applications to discover the presence and types of NATs and firewalls between them and the public Internet It provides applications with the ability to determine the public Internet Protocol IP address...

Страница 47: ...n to enable the DHCP server settings that follow IP Address Pool You can type the IP address of the VT2400 VT2500 for your private LAN The default is 192 168 102 1 When you change the LAN IP address the voice gateway automatically adjusts the address pool to match the new subnet invalidates any leases which conflict with the new IP address redirects the active Web logon session to the new address ...

Страница 48: ... dynamically Enable DNS Proxy Enables a server that sits between the client application such as a Web browser and a real server Its job is to improve performance as it intercepts all requests to the real server to see if it can fulfill the requests itself If not it forwards the request to the real server A company or household might use a proxy server to prevent its members from accessing a specif...

Страница 49: ...URRENT DHCP LEASES Displays all DHCP clients that have reserved IP addresses The table entries represent both reserved static leases added by the user and dynamic leases automatically assigned by the DHCP server IP Address Displays its reserved IP address Host Name Displays its host name MAC Address Displays the client MAC address Binding Type How the IP address is bound to the network Dynamic or ...

Страница 50: ...nt to reserve an IP address on your LAN for a particular server such as a private FTP server to ensure the designated server always receives the same private IP address MAC Address Type the MAC address of the DHCP client for which a reserved IP address is required The format is 16 hexadecimal numerals NOTE If the MAC Address you entered already has an IP Address assigned and is listed in the CURRE...

Страница 51: ...host is a computer with a reserved IP address designated as the default DMZ host Only one gaming DMZ host can be active at once The gaming DMZ host is not protected by the firewall It is open to communication or hacking from any computer on the Internet Consider carefully before configuring a computer to be in the DMZ The benefit of using a gaming DMZ host instead of a NAT passthrough host is that...

Страница 52: ...g Contact FAQ Specifications Glossary License Configuration Basic Advanced TCP IP Wireless Gateway PORT FORWARDING status Use this page to view the configured port forwarding entries for the VT2400 VT2500 LAN Refer to Gateway PORT FORWARDING config for complete definitions of each field ...

Страница 53: ...s to use the protocol as a unique identifier for example ftp Service Sets the LAN internal interface port or the start of a port range Inbound Internet connection requests are statically mapped to this port The voice gateway includes predefined port triggers enabled by default for many popular applications and protocols including DirectX MS zone com Battle net Quicktime Netmeeting H 323 Net2Phone ...

Страница 54: ...he address in the field provided Enable PAT Port Address Translation Select this box to enable the port forwarding entries to be accessed through network address translation NAT Notes The most common form of address translation between public and private IP addresses is NAT This represents a mapping of one public IP address to many private IP addresses Using NAT you can support up to 253 clients o...

Страница 55: ...ith your PC Because NAT does not normally allow these incoming connections the VT2400 VT2500 supports port triggering The VT2400 VT2500 is preconfigured with port triggering for common applications You can also configure additional port triggers if needed Configuring port triggers for an application requires The application transport protocol TCP or UDP The application port number You can use the ...

Страница 56: ...otocol name Enable Select this box to activate the port triggers for the predefined application Protocol Displays the transport protocol for the port trigger TCP or UDP Port Range Displays the port range From To for the port trigger Session Chaining Displays the session chaining selection for the port trigger Disable TCP or TCP UDP Session Interval Displays the session interval set for the port tr...

Страница 57: ... To Sets the port range for the port trigger Type the start of the range in the left field and the end in the right field Session Chaining Enable session chaining if the application needs to open one or more ports in different ranges to operate properly The options are Disable TCP or TCP UDP Session Interval Sets the session interval for the application If the port triggers detect traffic on the P...

Страница 58: ...ontact FAQ Specifications Glossary License Configuration Basic Advanced TCP IP Wireless Add Click to add the port trigger to the PORT TRIGGERS TABLE PORT TRIGGERS TABLE Lists all defined port triggers and their parameters Gateway PORT TRIGGERS custom page fields continued Field Description ...

Страница 59: ... DHCP server they will need to provide you with at least one DNS server IP address that you enter in the DNS IP Address fields You may manually enter two more Example 192 168 102 1 DNS Server 2 Type the IP address of a second DNS server as described above DNS Server 3 Type the IP address of a third DNS server as described above DNS Search Domain 1 Type the domain name of DNS Server 1 Example www e...

Страница 60: ...Clears the entries in the log Types of entries include DHCP server lease information wireless client associations and user interface access log in etc The log can hold up to xx entries Time The date and time of the event in the format yyyy mm dd hh mm ss Description The URL or Web page accessed Source Address The source IP address of the inbound or outbound message Destination Address The destinat...

Страница 61: ...t Filter Profiles Enable Global Logging Enable global logging to log gateway system events such as Use Port Forwarding for All Traffic Applies port forwarding rules to all traffic as defined on the Gateway PORT FORWARDING config page If this option is enabled the firewall allows incoming connections to any virtual servers using port forwarding rules even if firewall rules are configured to block t...

Страница 62: ...on Basic Advanced TCP IP Wireless System CONFIGURATION backup Use this page to back up the current system configuration System CONFIGURATION backup page fields Field Description BACK UP SYSTEM CONFIGURATION Apply button Click Apply to back up the current configuration When the Save dialog appears click Save to preserve the configuration file ...

Страница 63: ... restore page fields Field Description RESTORE SYSTEM CONFIGURATION Enter Filename Enter the path of the configuration file from which the configuration is to be restored Use the Browse button to select the path and file name Apply button Click Apply to restore the VT2400 VT2500 configuration to the settings in the file specified in the Enter filename field This message appears Device will be rebo...

Страница 64: ...tory default settings System CONFIGURATION reset page fields Field Description INITIALIZE SYSTEM CONFIGURATION When system configuration is reset all Gateway and Wireless feature settings shall not be reset to factory defaults Initialize button Click Initialize to restore the factory default configuration settings It is highly recommended that you back up the current configuration before restoring...

Страница 65: ...rce and destination addresses specify the source and destination of the packet The rule number shows the firewall rule number which resulted in the event Clear Log button Clears the entries in the log Types of entries include predefined or custom firewall profile changes or additions Time The date and time of the event in the format yyyy mm dd hh mm ss Description The URL or Web page accessed Sour...

Страница 66: ...these fields to select one of the predefined firewall profiles for all packets processed by the voice gateway firewall Name chgd The name of the firewall profile Predefined firewall profiles names include High Medium and Low High Provides the safest configuration and highest security Medium Provides the most common configuration with modest risk Low Provides minimum security and higher risk Custom...

Страница 67: ... Syn TCP FIN Scan TCP RESET Scan Back Orifice Scan Net Bus Scan IP Spoofing UDP Bomb XMAS Tree are these the same for medium Medium Medium is not addressed in the specification inbound outbound Denial of Service Intrusions High inbound PSEC IKE IPSEC ESP IPSEC AH ICMP messages RSVP messages native and UDP encapsulated Kerberos RTP RTCP MGCP SNMP outbound DHCP ICMP DNS FTP TFTP SMTP POP3 HTTP HTTPS...

Страница 68: ...t a firewall profile on the Firewall FIREWALL basic page Firewall FIREWALL advanced page fields Field Description ADD NEW FIREWALL PROFILE Use these fields to set up one or more custom firewalls if you have the expertise to do so The voice gateway s predefined firewall is enabled for the admin user See Firewall LOG to see which firewalls are enabled Profile Name The profile name Save Profile butto...

Страница 69: ...cted service to be allowed from WAN to LAN this check box must be selected Allow Outbound new Outbound direction indicates LAN to WAN If you want the selected service to be allowed from LAN to WAN this check box must be selected Buttons Add Adds the profile to the Firewall FIREWALL basic page Move Down Move to Bottom Allows you to prioritize rules by moving them up or down one at a time after you ...

Страница 70: ...ns See Predefined Firewall Template Definitions in Firewall FIREWALL basic section Medium A filter that provides a common configuration that has moderate risk High A filter that provides the highest security This setting is recommended Description Need Applied to Need URLs The Uniform Resource Locator URL names such as msn com which are protected under the content filter URLs identify the IP addre...

Страница 71: ...ally you must configure it In addition profiles must be defined for content filtering to work Otherwise all data passes through the firewall unprotected TRUE Firewall CONTENT FILTER config page fields Field Description ADD NEW CONTENT FILTER PROFILE Profile Name Enter a name for the Content Filter Profile Enter the url rules one by one and then click on Save Profile to save the profile If Save Pro...

Страница 72: ...you just created and then click Edit to continue configuring it Or click Delete to delete it RULE INFORMATION Enable Rule Select this check box to activate the rule If not selected the rule is still created but it won t be in effect Select Action Select the action Allow or Deny to be taken when this rule is applied You can select a particular URL to be allowed or denied Allow Allows access to the ...

Страница 73: ...edule Type the name of the schedule Schedule Entries Enter the days and time range for the schedule Edit button Select a schedule in the XXXXXXXXX list and click the Edit button Refer to Firewall SCHEDULES config for changing configuration information Delete button Select a schedule profile in the SCHEDULES IN THIS PROFILE list and click Delete The entire schedule profile is removed from xxxxxxxx ...

Страница 74: ...e Profile button to save the profile name which appears on the Firewall SCHEDULES status page Select the schedule name you just created and then click Edit to continue configuring it Or click Delete to delete it SCHEDULE ENTRY Specify Days Select the days for this schedule to be active Specify Time Always select for the schedule to be active 24 hours per day seven days a week Manual Time select to...

Страница 75: ... Configuration Basic Advanced TCP IP Wireless Schedule The schedule name Start Time The time the schedule begins End Time The time the schedule ends Delete button To delete a schedule from the profile select it in the SCHEDULES IN THIS PROFILE list and click Delete Firewall SCHEDULES config page fields continued Field Description ...

Страница 76: ...anced TCP IP Wireless Firewall LOG This page displays activity related to the firewall Firewall LOG page fields Field Description Firewall LOG Allows up to 250 entries Subsequent entries overwrite the oldest entries in the log Not sure if this definition is the same for the URL Log and the Log under USERS Clear Log button Clears all entries from the log ...

Страница 77: ...lossary License Configuration Basic Advanced TCP IP Wireless Voice STATUS Use this page to view the operational status of the voice gateway Voice STATUS page fields Field Description Parameter The voice feature such as line number caller ID call forwarding etc Status The status of the voice feature enabled disabled ...

Страница 78: ...IP DNS Server IP Address VOIP Proxy Server The IP address of the SIP Proxy Server assigned by your voice service provider PROVISIONING Server Address Enter the IP address of the TFTP server Server Directory Enter the directory of the TFTP server Primary DNS The Internet Service Provider Domain Name Server provides a primary name to IP address resolution If your ISP does not automatically assign yo...

Страница 79: ...your ISP does not automatically assign your DNS addresses from their DHCP server they will need to provide you with at least one DNS server IP address that you enter in the DNS IP Address fields Save Changes button Select to save your changes Restore Voice Factory Defaults button Select to restore factory defaults for VoIP Do not select this button unless your service provider advises you to do so...

Страница 80: ...lds Field Description USERS User Name Displays the names of all users User Group The user group to which the user belongs See Users USER GROUPS for more information about user groups Privilege The privileges assigned to this user See Users USERS config for more information about available privileges Edit button Edits the selected user in the USERS list See Users USERS config for more information a...

Страница 81: ...me Type the user name as it will be entered by the user to log on to the network Password Type at least four characters for the user s password Password retype Retype the user s password User Group Select a user group from the list The user is given all the privileges assigned to that group See Users USER GROUPS for more information about user groups Add button Click Add when you finish entering u...

Страница 82: ...GROUPS Use this page to configure user groups to which users belong NOTE page 25 of spec says the product supports VPN pass through for IPSEC PPTP and L2TP Users USER GROUPS page fields Field Description USER GROUPS Will this page include a way to create user groups User Group Help screens not provided Administration Login VPN Client Access Policy Authentication Content Filtering Bypass ...

Страница 83: ...ion USER LOG Clear Log button Clears all entries in the log Time The time frame that a user accessed a particular destination address Description The URL or Web page accessed Source Address The source IP address of the inbound or outbound message Destination Address The destination IP address of the inbound or outbound message Rule Number The firewall profile rule applicable to this user Refer to ...

Страница 84: ...ations Glossary License Configuration Basic Advanced TCP IP Wireless Wireless STATUS This page provides wireless status information Refer to Setting Up Your Wireless LAN WLAN for a description of each field or mouse over the underlined field name and right click to view a general description in a Help window ...

Страница 85: ...allows you to configure wireless network settings The default configuration parameters are set to permit IEEE 802 11 wireless network operation without additional changes Any 802 11 conforming device may operate on the network Refer to Setting Up Your Wireless LAN WLAN for a description of each field or mouse over the underlined field name and right click to view a general description in a Help wi...

Страница 86: ... IP Wireless Wireless SECURITY basic This page allows you to configure basic wireless security settings for WEP or WPA Refer to Configuring WPA on the VT2500 or Configuring WEP on the VT2500 under Setting Up Your Wireless LAN WLAN for a description of each field Or mouse over the underlined field name and right click to view a general description in a Help window ...

Страница 87: ...icense Configuration Basic Advanced TCP IP Wireless Wireless SECURITY advanced This page allows you to configure advanced wireless security settings Refer to Setting Up Your Wireless LAN WLAN for a description of each field or mouse over the underlined field name and right click to view a general description in a Help window ...

Страница 88: ...Glossary License Configuration Basic Advanced TCP IP Wireless Wireless STATISTICS This page provides information about wireless statistics Refer to Setting Up Your Wireless LAN WLAN for a description of each field or mouse over the underlined field name and right click to view a general description in a Help window ...

Страница 89: ...e Configuring TCP IP in Windows 2000 Configuring TCP IP in Windows XP Follow the instructions in your Macintosh or UNIX user manual After configuring TCP IP perform one of the following to verify the IP address Verifying the IP Address in Windows 95 Windows 98 or Windows Me Verifying the IP Address in Windows 2000 or Windows XP Follow the instructions in your Macintosh or UNIX user manual Configur...

Страница 90: ... Select the Configuration tab 5 Verify that TCP IP is installed for the adapter used to connect to the VT2500 If TCP IP is installed skip to step 10 If TCP IP is not installed for the adapter continue with step 6 6 Select the adapter to use for the VT2500 connection and click Add The Select Network Component Type window is displayed Although your VT model number may be different than in the images...

Страница 91: ...9 Click OK 10 Click TCP IP on the Network window If there is more than one TCP IP entry choose the one for the Ethernet card or USB port connected to the VT2500 11 Click Properties The TCP IP Properties window is displayed 12 Click the IP Address tab 13 Click Obtain an IP address automatically 14 Click OK to accept the TCP IP settings 15 Click OK to close the Network window 16 Click OK when prompt...

Страница 92: ...k Start 2 Select Settings and then Control Panel from the pop up menus to display the Control Panel window 3 Double click the Network and Dial up Connections icon to display the Network and Dial up Connections window In the steps that follow a connection number like 1 2 3 etc is a reference that is displayed on computers with multiple network interfaces Computers with only one network interface ma...

Страница 93: ...umber The value of number varies from system to system The Local Area Connection number Status window is displayed 5 Click Properties Information similar to the following window is displayed 6 If Internet Protocol TCP IP is in the list of components TCP IP is installed You can skip to step 10 If Internet Protocol TCP IP is not in the list click Install The Select Network Component Type window is d...

Страница 94: ...guration Basic Advanced TCP IP Wireless 7 Click Protocol on the Select Network Component Type window and click Add The Select Network Protocol window is displayed 8 Click Internet Protocol TCP IP 9 Click OK The Local Area Connection number Properties window is re displayed 10 Be sure the box next to Internet Protocol TCP IP is selected ...

Страница 95: ...IP Properties window is displayed 12 Be sure Obtain IP address automatically and Obtain DNS server address automatically are selected 13 Click OK to accept the TCP IP settings 14 Click Close to close the Local Area Connection number Properties window 15 Click OK when prompted to restart the computer and click OK again When you complete the TCP IP configuration go to Verifying the IP Address in Win...

Страница 96: ...on Basic Advanced TCP IP Wireless Configuring TCP IP in Windows XP 1 On the Windows desktop click Start to display the Start window 2 Click Control Panel to display the Control Panel window The display varies depending on the Windows XP view options If the display is a Category view as shown below continue with step 3 Otherwise skip to step 5 ...

Страница 97: ...vanced TCP IP Wireless 3 Click Network and Internet Connections to display the Network and Internet Connections window 4 Click Network Connections to display the LAN or High speed Internet connections Skip to step 7 5 If a classic view similar to below is displayed 6 Double click Network Connections to display the LAN or High speed Internet connections ...

Страница 98: ...vanced TCP IP Wireless 7 Right click on the network connection If more than one connection is displayed be sure to select the one for your network interface 8 Select Properties from the pop up menu to display the Local Area Connection Properties window 9 On the Local Area Connection Properties window select Internet Protocol TCP IP if it is not selected ...

Страница 99: ... IP Wireless 10 Click Properties to display the Internet Protocol TCP IP Properties window 11 Verify that the settings are correct as shown above 12 Click OK to close the TCP IP Properties window 13 Click OK to close the Local Area Connection Properties window When you complete the TCP IP configuration go to Verifying the IP Address in Windows 2000 or Windows XP ...

Страница 100: ...dow is displayed The Ethernet Adapter Information field will vary depending on the system as shown in the following examples The values for Adapter Address IP Address Subnet Mask and Default Gateway on the PC will be different than in the images In Windows 98 if Autoconfiguration is displayed before the IP Address as in the following image call your service provider 4 Select the adapter name the E...

Страница 101: ...cmd and click OK to display a command prompt window 4 Type ipconfig and press ENTER to display the IP configuration A display similar to the following indicates a normal configuration If an Autoconfiguration IP Address is displayed as in the following window there is an incorrect connection between the PC and the VT2500 or there are cable network problems Check the cable connections and determine ...

Страница 102: ...uration Basic Advanced TCP IP Wireless To renew the IP address 1 Type ipconfig renew and press ENTER If a valid IP address is displayed as shown Internet access should be available 2 Type exit and press ENTER to return to Windows If after performing this procedure the computer cannot access the Internet call your cable provider for help ...

Страница 103: ... For descriptions of all wireless configuration fields see Wireless Pages in the VT2500 Setup Program Another step to improve wireless security is to place wireless components away from windows This decreases the signal strength outside the intended area Caution To prevent unauthorized eavesdropping or access to WLAN data you must enable wireless security The default VT2500 settings provide no wir...

Страница 104: ... For new wireless LANs we recommend purchasing client adapters that support WPA such as the Motorola Wireless Notebook Adapter WN825G Wireless PCI Adapter WPCI810G and Wireless USB Adapter WU830G For more information about the benefits of WPA see the Wi Fi Protected Access Web page http www wifialliance org OpenSection protected_access asp Configure on the VT2500 Required On Each Wireless Client I...

Страница 105: ...ct WPA and click Apply 4 Under WPA CONFIGURATION choose one WPA Encryption type Because performance may be slow with TKIP we recommend choosing AES if your clients support AES TKIP Temporal Key Integrity Protocol provides data encryption including a per packet key mixing function message integrity check MIC initialization vector IV and re keying mechanism AES The Advanced Encryption Standard algor...

Страница 106: ...ation Local WPA PSK If you choose Pre Shared Key PSK local authentication if the passphrase on any client supporting WPA matches the PSK Passphrase set on the VT2500 the client can access the VT2500 WLAN To set the PSK Passphrase go to step 7 A local key is typically used in a home or small office Radius Port The port used for remote authentication through a RADIUS server It can be from 0 to 65535...

Страница 107: ...upport WPA To enable WEP and set the key on the VT2500 1 On the VT2500 Setup Program menu click Wireless 2 Click the SECURITY tab to display the Wireless SECURITY basic page 3 In the Security Mode field select WEP and click Apply 4 In the WEP Passphrase field type a passphrase containing from 8 to 31 ASCII characters For privacy your passphrase displays as dots 5 Click Generate WEP Keys The follow...

Страница 108: ... data privacy on the WLAN Open System Any WLAN client can transmit data to any other client without authentication It is the default if the Security Mode is set to WEP Shared Key The VT2500 authenticates and transfers data to and from all clients having shared key authentication enabled We recommend this setting Encryption Use a WEP key length that is compatible with your wireless client adapters ...

Страница 109: ...ess to your WLAN to a limited number of computers on the Wireless SECURITY advanced page You can configure one or both of Configure on the VT2500 Required On Each Wireless Client Perform Configuring the Wireless Network Name on the VT2500 to disable Extended Service Set Identifier ESSID broadcasting to enable closed network operation You must configure each wireless client with the VT2500 s ESSID ...

Страница 110: ...sed network operation is an enhancement of the IEEE 802 11b and IEEE 802 11g standards If you select Disable ESSID Broadcast you must also perform Configuring a Wireless Client with the Network Name ESSID on all WLAN clients stations Never provide your ESSID to anyone who is not authorized to use your WLAN To configure the ESSID on the VT2500 1 Start the VT2500 Setup Program as described in Starti...

Страница 111: ...anced TCP IP Wireless 6 To restrict WLAN access to clients configured with the same Network Name ESSID as the VT2500 click the SECURITY tab 7 Click advanced to display the Wireless SECURITY advanced page 8 Select ESSID Broadcast to restrict WLAN access to clients configured with the same Network Name ESSID as the VT2500 9 Click Apply to save your changes ...

Страница 112: ...MAC address To configure a MAC access control list 1 On the VT2500 Setup Program menu click Wireless 2 Click the SECURITY tab 3 Click advanced to display the Wireless SECURITY advanced page 4 To restrict wireless access to systems in the MAC access control list select Allow Only Listed Stations Access and click Apply 5 To add a wireless client type its MAC address in the format xx xx xx xx xx xx i...

Страница 113: ...orola wireless adapters are supplied with a client configuration program called Wireless Client Manager which is installed in the Windows Startup group On a PC with Wireless Client Manager installed the icon is displayed on the Windows task bar Double click the icon to launch the utility You may need to do the following to use a wireless client computer to surf the Internet If You Performed On Eac...

Страница 114: ...EP Passphrase you set when you configured the VT2500 For all other wireless adapters you must enter the 64 bit or 128 bit WEP key generated by the VT2500 Configuring a Wireless Client with the Network Name ESSID To distinguish it from other nearby WLANs you should identify your WLAN with a unique network name also known as a network identifier or ESSID As you configure a wireless client you will b...

Страница 115: ...0 Setup Program Use the Wireless pages to control and monitor the wireless interface Wireless STATUS page Wireless NETWORK page Wireless SECURITY basic page Wireless SECURITY advanced page Wireless STATISTICS page After you edit some fields and click Apply you are required to reboot your voice gateway for your changes to take effect Rebooting takes 10 to 15 seconds After rebooting you must log in ...

Страница 116: ...e ESSID set on the Wireless NETWORK page For more information see Configuring the Wireless Network Name on the VT2500 Never provide the ESSID to anyone who is not authorized to use your WLAN Channel Displays the radio channel for the access point If you encounter interference you can set a different channel on the Wireless NETWORK page RTS Threshold Displays the Request to Send Threshold set on th...

Страница 117: ...ccess see Configuring a MAC Access Control List on the VT2500 ESSID Broadcast If you disable ESSID broadcast the network name ESSID will not be transmitted in the 802 11 beacon frame This provides some additional protection for your network because only 802 11 stations that know your network name can be configured to associate with the SBG Note Disable ESSID broadcast operation is not part of the ...

Страница 118: ...vanced TCP IP Wireless Wireless NETWORK Use this page for Enabling the wireless interface Configuring the wireless network name also see Configuring the Wireless Network Name on the VT2500 Configuring other WLAN settings You can use the VT2500 to operate a WLAN without changing its default settings Wireless NETWORK page fields Field Description WIRELESS ...

Страница 119: ...e It is not supported by all IEEE 802 11g adapters ADVANCED SETUP Transmit Power Sets the VT2500 wireless transmission power 3 6 12 25 50 75 or 100 The default is 100 You can lower the Transmit Power to Decrease leakage into outside areas such as the street Improve performance if you usually position your computer or laptop close to your VT2500 Transmission power control is an optional IEEE 802 11...

Страница 120: ...sing this page review Encrypting Wireless LAN Transmissions in this section of the manual After you enable and configure WEP or WPA on the VT2500 by performing Configuring WPA on the VT2500 or Configuring WEP on the VT2500 all options on the Wireless SECURITY basic page are described in these procedures you must configure each WLAN client as described in the subsections under Configuring the Wirel...

Страница 121: ... can communicate with the VT2500 Closed network operation is a VT2500 enhancement to IEEE 802 11b The default is not selected off MAC ACCESS CONTROL LIST You can restrict wireless access to one to 32 wireless clients based on the client MAC address Allow Any Station Access If selected any wireless client can access the VT2500 WLAN Allow Only Listed Stations Access If selected only wireless clients...

Страница 122: ... control list select its Delete check box and click the Delete button ADD NEW STATIONS New Station now Station Type the MAC address of the wireless client to add to the MAC access control list Use the format xx xx xx xx xx xx The MAC access control list can contain one to 32 clients Add Station button Click to add the New Station to the MAC access control list Wireless Security ADVANCED page field...

Страница 123: ...with a multicast address in the address 1 field of type data or management Multicast Transmitted Fragment Count The number of transmitted fragments when the multicast bit is set in the destination MAC address of a successfully transmitted MAC service data unit MSDU When operating as a STA in an ESS where these frames are directed to the AP this implies having received an acknowledgment to all asso...

Страница 124: ...ages not received when expected from a data message transmission Received Fragment Count The number of successfully received MPDUs of type Data or Management Multicast Received Fragment Count The number of MSDUs received when the multicast bit was set in the destination MAC address Frame Check Sequence Error Count The number of FCS errors detected in a received MPDU Transmitted Frame Count The num...

Страница 125: ...Review your adapter s documentation for further instructions Be sure that your wireless adapter for your PC and the wireless router security settings are the same so that it will allow your computer to access the wireless network Also verify that the list of Restricted Wireless MAC Addresses on the WIRELESS Page of the Web based Configuration Utility is not configured to block your PC For details ...

Страница 126: ...mber Indicates acitivity on the WAN and link speed Green 100baseT Amber 10baseT LAN1 Green or Amber Indicates activity on the LAN port and link speed Green 100baseT Amber 10baseT LAN2 Green or Amber Indicates activity on the LAN port and link speed Green 100baseT Amber 10baseT LAN3 Green or Amber Indicates activity on the LAN port and link speed Green 100baseT Amber 10baseT LAN4 Green or Amber Ind...

Страница 127: ...he VT2400 VT2500 contact your cable provider For more information about customer service technical support or warranty claims see the Regulatory Safety Software License and Warranty Information card provided with the VT2400 VT2500 For answers to typical questions see Frequently Asked Questions on page 119 For more information about Motorola consumer cable products education and support visit http ...

Страница 128: ... transmitted through the VT2400 VT2500 the end user can specify ports and IP addresses on which to allow unsolicited messages The VT2400 VT2500 Voice Gateway enables the end user to set up virtual servers or a DMZ Q How does the end user configure the VT2400 VT2500 A Most end users who perform the appropriate installation procedure in Connecting the VT2400 VT2500 to a Network can send and receive ...

Страница 129: ... Glossary License Configuration Basic Advanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 120 Q What voice protocols and CODECs does the VT2400 VT2500 Voice Gateway support A Refer to Supported VoIP Protocols Codecs and Calling Features on page 1 ...

Страница 130: ...6 g 726 reverse nibble g 729ab g 729e g 723 1 g 728 Maximum line length one way 1000 ft maximum Wireless VT2500 CPE wireless interface 802 11b g WiFi certified Quality of service 802 11e WMM WME for wireless QOS Routing CPE network interface Ethernet 10 100Base T NAPT DMZ port forwarding VPN pass through Security Firewall with stateful packet inspection Dynamic port triggers parental controls Sess...

Страница 131: ...eshooting Contact FAQ Specifications Glossary License Configuration Basic Advanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 121 Storage humidity 95 R H Antennas LED Indicators Physical Dimensions width height ...

Страница 132: ...ontact FAQ Specifications Glossary License Configuration Basic Advanced TCP IP Wireless VT2400 VT2500 Series Voice Gateway User Guide 122 Wall Mounting Template Print out the template below to perform the wall mounting procedure in section 2 ...

Страница 133: ...ress Resolution Protocol broadcasts a datagram to obtain a response containing a MAC address corresponding to the host IP address When it is first connected to the network a client sends an ARP message The VT2500 responds with a message containing its MAC address Subsequently data sent by the computer uses the VT2500 MAC address as its destination ASCII The American Standard Code for Information I...

Страница 134: ...munications channel It is usually measured in bits per second bps BPKM Baseline Protocol Key Management encrypts data flows between a cable modem or gateway and the CMTS The encryption occurs after the cable modem or gateway registers to ensure data privacy across the RF network bps bits per second bridge An OSI layer 2 networking device that connects two LANs using similar protocols It filters fr...

Страница 135: ...return of the most recent incoming call call redial and selective forwarding and programming to permit distinctive ringing for incoming calls Class C network An IP network containing up to 253 hosts Class C IP addresses are in the form network network network host client In a client server architecture a client is a computer that requests files or services such as file transfer remote login or pri...

Страница 136: ...MZ A de militarized zone is one or more hosts logically located between a private LAN and the Internet A DMZ prevents direct access by outside users to private data The term comes from the geographic buffers located between some conflicting countries such as North and South Korea In a typical small DMZ configuration the DMZ host receives requests from private LAN users to access external web sites...

Страница 137: ...hat only an authorized user can unscramble it to view the information encrypt To encode data endpoint A VPN endpoint terminates the VPN at the router so that computers on the VT2500 LAN do not need VPN client software to tunnel through the Internet to the VPN server ESSID The Extended Service Set Identifier or network name is a unique identifier that wireless clients use to associate with an acces...

Страница 138: ... Qualified Domain Name A fully qualified domain name consists of a host and domain name including top level domain For example www motorola com is a fully qualified domain name www is the host motorola is the second level domain and com is the top level domain frame A unit of data transmitted between network nodes that contains addressing and protocol control data Some control frames contain no da...

Страница 139: ...ample a hop count of six means the packet has traversed six routers The packet hop count increases as the time to live TTL value decreases host In IP a host is any computer supporting end user applications or services with full two way network access Each host has a unique host number that combined with the network number forms its IP address Host also can mean A computer running a web server that...

Страница 140: ...cal transients such as voltage spikes electric motors turning on and lightning or switching equipment that bleed over to the cable ingress noise Noise typically caused by discrete frequencies picked up by the cable plant from radio broadcasts or an improperly grounded or shielded home appliance such as a hair dryer Ingress is the major source of cable system noise Internet A worldwide collection o...

Страница 141: ... bodies from approximately 140 countries ISO is a non governmental organization established in 1947 to promote the development of standardization and related activities in the world with a view to facilitating the international exchange of goods and services and to developing cooperation in the spheres of intellectual scientific technological and economic activity ISP Internet Service Provider ITS...

Страница 142: ...th connection over a limited area such as a building or campus Ethernet is the most widely used LAN standard layer In networks layers are software protocol levels Each layer performs functions for the layers above it OSI is a reference model having seven functional layers LCP Link Control Protocol establishes configures and tests data link connections used by PPP latency The time required for a si...

Страница 143: ...U The Maximum Transmission Unit is the largest amount of data that can be transmitted in one discrete message on a given physical network The MTU places an upper bound on the size of a message that can be transferred by the network in a single frame Messages exceeding the MTU must be fragmented before transmission and reassembled at the destination multicast A data transmission sent from one sende...

Страница 144: ...manently saved in its ROM node On a LAN a generic term for any network device On an HFC network the interface between the fiber optic trunk and coaxial cable feeders to subscriber locations A node is typically located in the subscriber neighborhood noise Random spurts of electrical energy or interface May produce a salt and pepper pattern on a television picture ohm A unit of electrical resistance...

Страница 145: ...otocol data unit is a message containing operational instructions used for SNMP The basic SNMP V2 PDU types are get request get next request get bulk request response set request inform request and trap Peer to peer network A network in which each computer is independent and can serve the others or act as a workstation Peripherals connected to any computer networked in this fashion are available t...

Страница 146: ...net See also public IP address protocol A formal set of rules and conventions for exchanging data Different computer types for example PC UNIX or mainframe can communicate if they support common protocols provisioning The process of autodiscovery or manually configuring a cable modem on the CMTS PSTN The public switched telephone network is the traditional circuit switched voice oriented telephone...

Страница 147: ... for transmission across the cable network RFC Request for Comments published on the IETF or other websites Many RFCs become international standards RJ 11 The most common type of connector for household or office phones RJ 45 An 8 pin modular connector the most common connector type for 10Base T or 100Base T Ethernet networks ROM read only memory router On IP networks a device connecting at least ...

Страница 148: ...tocol is a standard Internet protocol for transferring e mail SNMP Simple Network Management Protocol is a standard to monitor and manage networks and network devices Data is exchanged using PDU messages SOHO small office home office spectrum A specified range of frequencies used for transmission of electromagnetic signals spectrum allocation An allocation of portions of the available electromagne...

Страница 149: ...ubnet When subnetting is used the host portion of the IP address is divided into a subnet and host number Hosts and routers use the subnet mask to identify the bits used for the network and subnet number switch On an Ethernet network a switch filters frames based on the MAC address in a manner similar to a bridge A switch is more advanced because it can connect more than two segments symbol rate A...

Страница 150: ... Trivial File Transfer Protocol is a very simple protocol used to transfer files THDD Telephony Hardware Device Driver TKIP Temporal Key Integrity Protocol transparent bridging A method to enable all hosts on the wired Ethernet LAN WLAN and USB connection to communicate as if they were all connected to the same physical network transport layer Layer of the OSI concerned with protocols for error re...

Страница 151: ...col telephone service VPN A virtual private network is a private network that uses virtual connections tunnels routed over a public network usually the Internet to provide a secure and fast connection usually to users working remotely at home or in small branch offices A VPN connection provides security and performance similar to a dedicated link for example a leased line but at much lower cost WA...

Страница 152: ...ld wide web An interface to the Internet that you use to navigate and hyperlink to information WPA Wi Fi Protected Access WPA encryption as described on the Wi Fi Alliance Wi Fi Protected Access web page http www wifialliance org OpenSection protected_access asp It is a far more robust form of encryption than WEP We recommend using WPA if all of your client hardware supports WPA ...

Страница 153: ...must at the same time transfer the Product and all copies of the Software if applicable to the same person or destroy any copies not transferred TERMINATE this License by destroying the original and all copies of the Software if applicable in whatever form You may not 1 Loan distribute rent lease give sublicense or otherwise transfer the Software in whole or in part to any other person except as p...

Страница 154: ...UTOMATICALLY if you fail to comply with the terms of this License Motorola is not responsible for any 3rd party software provided as a bundled application or otherwise with the Software U S GOVERNMENT RESTRICTED RIGHTS The Product and documentation is provided with RESTRICTED RIGHTS The use duplication or disclosure by the Government is subject to restrictions as set forth in subdivision c 1 ii of...

Страница 155: ...521569 001 7 05 MGBI Visit our website at www motorola com ...

Отзывы: