ZyXEL Communications eir F1000 Скачать руководство пользователя страница 80

80

 

eir F1000 Modem U

ser’s Guide 

Chapter 5 Wireless 

 

 

 

 

 

 

 
 

Table 19   

Network Setting > Wireless > More AP > Edit (continued) 

 

LABEL

 

DESCRIPTION

 

Max clients

 

Specify the maximum number of clients that can connect to this network at the same time.

 

Hide SSID

 

Select this check box to hide the SSID in the outgoing beacon frame so a station cannot 
obtain the SSID through scanning using a site survey tool.

 

Enhanced 
Multicast 
Forwarding

 

Select this check box to allow the Device to convert wireless multicast traffic into wireless 
unicast traffic.

 

Guest WLAN

 

Select this to create Guest WLANs for home and external clients. Select the WLAN type in 
the 

Access Scenario 

field.

 

Access 
Scenario

 

If you select 

Guest Home

, clients can connect to each other directly. A 

Home Guest 

screen appears. A graphic shows whether the wireless clients can access other clients in the 
same wireless network and in other networks. Click 

Apply 

to save the change before closing 

the screen. Click 

Cancel 

to close the screen without saving the change. 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

If you select 

External Guest

, clients are blocked from connecting to each other directly. A 

External Guest 

screen appears. A graphic shows whether the wireless clients can access 

other clients in the same wireless network and in other networks. Click 

Apply 

to save the 

change before closing the screen. Click 

Cancel 

to close the screen without saving the 

change.

 

Max. Upstream 
Bandwidth

 

Specify the maximum rate for upstream wireless traffic to the WAN from this WLAN in 
kilobits per second (Kbps).

 

Max. 
Downstream 
Bandwidth

 

Specify the maximum rate for downstream wireless traffic to this WLAN from the WAN in 
kilobits per second (Kbps).

 

Содержание eir F1000

Страница 1: ...igabit IAD Version 1 00 Edition 1 6 2013 User s Guide Default Login Details LAN IP Address http 192 168 1 254 Login admin Password Default password is the wireless key printed on the back of the Devic...

Страница 2: ...THIS GUIDE FOR FUTURE REFERENCE Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system Every effort...

Страница 3: ...etwork Address Translation NAT 153 Dynamic DNS Setup 171 Interface Group 175 USB Service 181 Firewall 187 MAC Filter 195 Parental Control 197 Scheduler Rule 201 Certificates 203 VPN 211 Log 225 Traffi...

Страница 4: ...4 eir F1000 Modem User s Guide Contents Overview Diagnostic 273 Troubleshooting 279...

Страница 5: ...8 1 4 2 Device s USB Support 19 1 5 LEDs Lights 20 1 6 The RESET Button 22 1 7 Wireless Access 22 1 7 1 Using the Wi Fi and WPS Buttons 22 1 8 Wall mounting Instructions 23 Chapter 2 The Web Configura...

Страница 6: ...view 69 5 1 1 What You Can Do in this Chapter 69 5 1 2 What You Need to Know 70 5 2 The General Screen 70 5 2 1 No Security 73 5 2 2 Basic WEP Encryption 73 5 2 3 More Secure WPA 2 PSK 75 5 2 4 WPA 2...

Страница 7: ...ID Screen 121 6 9 The 5th Ethernet Port Screen 121 6 10 The LAN VLAN Screen 122 6 11 The Wake on LAN Screen 123 6 12 Technical Reference 124 6 12 1 LANs WANs and the Device 124 6 12 2 DHCP Setup 124...

Страница 8: ...warding 156 9 3 The Applications Screen 157 9 3 1 Add New Application 158 9 4 The Port Triggering Screen 159 9 4 1 Add Edit Port Triggering Rule 160 9 5 The DMZ Screen 161 9 6 The ALG Screen 162 9 7 T...

Страница 9: ...nter Server 184 12 4 1 Before You Begin 185 12 4 2 The Printer Server Screen 185 Chapter 13 Firewall 187 13 1 Overview 187 13 1 1 What You Can Do in this Chapter 187 13 1 2 What You Need to Know 188 1...

Страница 10: ...er 18 VPN 211 18 1 Overview 211 18 2 The IPSec VPN General Screen 211 18 3 The IPSec VPN Add Edit Screen 212 18 4 The IPSec VPN Monitor Screen 218 18 5 Technical Reference 218 18 5 1 IPSec Architectur...

Страница 11: ...35 22 2 ARP Table Screen 235 Chapter 23 Routing Table 237 23 1 Overview 237 23 2 The Routing Table Screen 237 Chapter 24 IGMP MLD Status 239 24 1 Overview 239 24 2 The IGMP MLD Group Status Screen 239...

Страница 12: ...verview 257 31 2 The Time Screen 257 Chapter 32 E mail Notification 261 32 1 Overview 261 32 2 The Email Notification Screen 261 32 2 1 Email Notification Edit 262 Chapter 33 Log Setting 263 33 1 Over...

Страница 13: ...ing 279 37 1 Power Hardware Connections and LEDs 279 37 2 Device Access and Login 280 37 3 Internet Access 282 37 4 Wireless Internet Access 283 37 5 USB Device Connection 284 37 6 UPnP 284 Appendix A...

Страница 14: ...14 eir F1000 Modem User s Guide Table of Contents...

Страница 15: ...PART I User s Guide 15...

Страница 16: ...16...

Страница 17: ...thods to manage the Device Web Configurator This is recommended for everyday management of the Device using a supported web browser TR 069 This is an auto configuration server used to remotely configu...

Страница 18: ...N layer 2 interfaces that you configure in the Device Refer to Section 4 2 on page 45 for the Network Setting Broadband screen Computers can connect to the Device s LAN ports or wirelessly Figure 1 De...

Страница 19: ...emory stick or a USB hard drive B You can connect one USB hard drive to the Device at a time Use FTP to access the files on the USB device Figure 2 USB File Sharing Application B A Media Server You ca...

Страница 20: ...e following graphic displays the labels of the LEDs Figure 5 LEDs on the Device 2 4G None of the LEDs are on if the Device is not receiving power Table 1 LED Descriptions LED COLOR STATUS DESCRIPTION...

Страница 21: ...he Device is sending or receiving data to from the LAN at 1000 Mbps Off The Device does not have an Ethernet connection with the LAN WiFi 2 4G Green On The 2 4 GHz wireless network is activated Blinki...

Страница 22: ...defaults have been restored and the device restarts 1 7 Wireless Access The Device is a wireless Access Point AP for wireless clients such as notebook computers or PDAs and iPads It allows them to con...

Страница 23: ...e Wi Fi button for one to five seconds The WiFi 2 4G LED turns off when the wireless network is off 1 8 Wall mounting Instructions Do the following to hang your Device on a wall 1 Locate a high positi...

Страница 24: ...1 Introducing the Device 5 Push the bracket up to tightly attach it to the Device 6 Mount the Device on the screws which are already installed on the wall Make sure that the Device is firmly attached...

Страница 25: ...cking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default Java permissions enabled by default See Appendix C on page 315 if you need to make sure these functions are al...

Страница 26: ...ype it to confirm and click Apply alternatively click Skip to proceed to the main menu if you do not want to change the password now Figure 8 Change Password Screen The following screen displays and a...

Страница 27: ...27 eir F1000 Modem User s Guide Chapter 2 The Web Configurator Figure 10 Connection Status...

Страница 28: ...ded into these parts A title bar B main window C navigation panel 2 2 1 Title Bar The title bar shows the following icons in the upper right corner Click the Help icon to get support on eir s website...

Страница 29: ...navigation panel to open screens to configure Device features The following tables describe each menu item Table 2 Navigation Panel Summary LINK TAB FUNCTION Connection Status This screen shows the De...

Страница 30: ...UPnP and UPnP NAT T on or off Additional Subnet Use this screen to configure IP alias and public static IP STB Vendor ID Use this screen to have the Device automatically create static DHCP entries fo...

Страница 31: ...print server on the Device and get the model name of the associated printer Security Settings Firewall General Use this screen to configure the security level of your firewall Protocol Use this screen...

Страница 32: ...specific traffic directions for network services TR 064 Use this screen to enable management via TR 064 on the LAN SNMP Use this screen to configure SNMP Simple Network Management Protocol settings T...

Страница 33: ...PART II Technical Reference 33...

Страница 34: ...34...

Страница 35: ...reen to look at the current status of the Device system resources and interfaces LAN WAN and WLAN Use the Network Map screen to view the network connection status of the Device and clients connected t...

Страница 36: ...advertisements IPv6 Link Local Address This is the link local address the Device generated itself for the WAN interface Encapsulation This field displays the current encapsulation method LAN Informat...

Страница 37: ...start the device See Section 35 2 on page 269 or turn off the device unplug the power for a few seconds NAT Session Usage This field displays what percentage of the Device supported NAT sessions are c...

Страница 38: ...on 3 3 1 on page 39 for more information Figure 14 Network Map Icon View Mode By clicking a client s name you can do the following Click Info to view information about the client Select Add device int...

Страница 39: ...ange the name or icon of the client If you prefer to view the status in a list click List View in the Viewing mode selection box You can configure how often you want the Device to update this screen i...

Страница 40: ...gure 16 Diagnostic Screen No DSL Connection This screen appears when your WAN connection is up but the Device fails to connect to the Internet Figure 17 Diagnostic Screen Internet Connection Is Not Wo...

Страница 41: ...rs in other locations Figure 19 LAN and WAN WAN 3G third generation standards for the sending and receiving of voice video and data in a mobile environment You can attach a 3G wireless adapter to the...

Страница 42: ...and MTU Bridge N A ATM PVC configuration and QoS EtherWAN N A Routing PPPoE PPP user name and password WAN IPv4 IPv6 IP address routing feature DNS server VLAN QoS and MTU IPoE WAN IPv4 IPv6 IP addre...

Страница 43: ...ides broadband Internet access to mobile devices IPv6 Introduction IPv6 Internet Protocol version 6 is designed to enhance IP address size and features The increase in IPv6 address size to 128 bits fr...

Страница 44: ...4 packets to cross eir s IPv4 network The Device generates a global IPv6 prefix from its IPv4 WAN address and tunnels IPv6 traffic to eir s Border Relay router BR in the figure to connect to the nativ...

Страница 45: ...Network Setting Broadband from the menu The summary table shows you the configured WAN services connections on the Device Figure 23 Network Setting Broadband The following table describes the labels i...

Страница 46: ...he Device act as an IGMP proxy on this connection NAT This shows whether NAT is activated or not for this connection Default Gateway This shows whether the Device use the WAN interface of this connect...

Страница 47: ...nt The following example screen displays when you select the ADSL VDSL over ATM connection type Routing mode and PPPoE encapsulation The screen varies when you select other interface type encapsulatio...

Страница 48: ...one RFC 1483 routing connection over a PVC Encapsulation Mode Select the method of multiplexing used by your ISP from the drop down list box Choices are LLC SNAP BRIDGING In LCC encapsulation bridged...

Страница 49: ...automatically disconnects from the PPPoE server This field is not configurable if you select Auto Connect in the PPP Triger Type field PPPoE Service Name Enter the name of your PPPoE service here PPPo...

Страница 50: ...s IP Address Select this option and enter the IP address of the computer on the LAN whose MAC you are cloning It is advisable to clone the MAC address from a computer on your LAN even if your ISP does...

Страница 51: ...stinations IPv6 Routing Feature This is available only when you select IPv6 IPv4 DualStack or IPv6 Only in the IPv6 IPv4 Mode field You can enable IPv6 routing features in the following section MLD Pr...

Страница 52: ...ect ADSL VDSL over PTM as the interface type the following screen appears Figure 25 Network Setting Broadband Add New WAN Interface Edit Bridge Mode The following table describes the fields in this sc...

Страница 53: ...n QoS Rate Limit Enter the rate limit for the connection This is the maximum transmission rate allowed for traffic on this connection Apply Click Apply to save your changes Cancel Click Cancel to exit...

Страница 54: ...it VC To transport multiple protocols the Device needs separate VCs There is a binding between a VC and the type of the network protocol carried on the VC This reduces payload overhead since there is...

Страница 55: ...ving 4 3 The 3G Backup Screen The USB ports at the left side panel of the Device allow you to attach a 3G dongle to wirelessly connect to a 3G network for Internet access You can have the Device use t...

Страница 56: ...ant the Device to ping check the connection status of your WAN You can configure the frequency of the ping check and number of consecutive failures before triggering 3G backup Check Cycle Enter the fr...

Страница 57: ...do not want the connection to time out Select on Demand if you do not want the connection up all the time and specify an idle time out in the Max Idle Timeout field Max Idle Timeout This value specifi...

Страница 58: ...it on the total traffic in both directions Select Download to set a limit on the downstream traffic from the ISPto the Device Select Upload to set a limit on the upstream traffic from the Device to th...

Страница 59: ...Advanced Screen Use the Advanced screen to enable or disable ADSL over PTM Annex M DSL PhyR and SRA Seamless Rate Adaption functions The Device supports the PhyR retransmission scheme PhyR is a retran...

Страница 60: ...work Setting Broadband 802 1x The following table describes the labels in this screen Table 11 Network Setting Network Setting 802 1x LABEL DESCRIPTION This is the index number of the entry Status Thi...

Страница 61: ...ace to which the authentication applies EAP Identity Enter the EAP identity of the authentication EAP method This is the EAP method used for this authentication Enable Bidirectional Authentication Sel...

Страница 62: ...ionality in a manner similar to dial up services using PPP PPPoE is an IETF standard RFC 2516 specifying how a personal computer PC interacts with a broadband modem DSL cable wireless etc connection F...

Страница 63: ...er and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network This agreement helps eliminate congestion which is important for transmission of real time...

Страница 64: ...RT or non real time VBR nRT connections The VBR RT real time Variable Bit Rate type is used with bursty connections that require closely controlled delay and delay variation It also provides a fixed...

Страница 65: ...a specific broadcast domain Introduction to IEEE 802 1Q Tagged VLAN A tagged VLAN uses an explicit tag VLAN ID in the MAC header to identify the VLAN membership of a frame across bridges they are not...

Страница 66: ...S to map a domain name to its corresponding IP address and vice versa for instance the IP address of www zyxel com is 204 217 0 2 The DNS server is extremely important because without it you must know...

Страница 67: ...em User s Guide Chapter 4 Broadband compose the network address The prefix length is written as x where x is a number For example 2001 db8 1a2b 15 1a2f 0 32 means that the first 32 bits 2001 db8 is th...

Страница 68: ...68 eir F1000 Modem User s Guide Chapter 4 Broadband...

Страница 69: ...ation screen to allow or deny wireless clients based on their MAC addresses from connecting to the Device Section 5 4 on page 81 Use the WPS screen to enable or disable WPS view or generate a security...

Страница 70: ...quire a license to use However wireless networking is different from that of most traditional radio communications in that there a number of wireless networking standards available with different meth...

Страница 71: ...following table describes the general wireless LAN labels in this screen Table 13 Network Setting Wireless General LABEL DESCRIPTION Wireless Network Setup Wireless You can Enable or Disable the wirel...

Страница 72: ...have the Device generate a password the setting in this field determines how the Device generates the password Select None to set the Device s password generation to not be based on a passphrase Selec...

Страница 73: ...ption or authentication Note If you do not enable any wireless security on your Device your network is accessible to any wireless networking device that is within range Figure 34 Wireless General No S...

Страница 74: ...automatically generate a password The password field will not be configurable when you select this option Password 1 The password WEP key is used to encrypt data Both the Device and the wireless stati...

Страница 75: ...n Table 16 Wireless General More Secure WPA 2 PSK LABEL DESCRIPTION Security Level Select More Secure to enable WPA 2 PSK data encryption Security Mode Select WPA PSK or WPA2 PSK from the drop down li...

Страница 76: ...is a full implementation the security protocol Use this security option for maximum protection of your network However it is the least backwards compatible with older devices The WPA security mode is...

Страница 77: ...Select the encryption type TKIP AES or TKIP AES for data encryption Select TKIP if your wireless clients can all use TKIP Select AES if your wireless clients can all use AES Select TKIP AES to allow t...

Страница 78: ...ier identifies the Service Set with which a wireless device is associated This field displays the name of the wireless profile on the network When a wireless client scans for an AP to associate with t...

Страница 79: ...Setting Wireless More AP Edit LABEL DESCRIPTION Wireless Network Setup Wireless You can Enable or Disable the wireless LAN in this field Passphrase Type Passphrase type cannot be changed The default i...

Страница 80: ...each other directly A Home Guest screen appears A graphic shows whether the wireless clients can access other clients in the same wireless network and in other networks Click Apply to save the change...

Страница 81: ...de specific devices from accessing the ZyXEL Device Deny Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hex...

Страница 82: ...lick Apply to save your changes Cancel Click Cancel to exit this screen without saving 5 5 The WPS Screen Use this screen to configure WiFi Protected Setup WPS on your Device WPS allows you to quickly...

Страница 83: ...k You can find the PIN either on the outside of the device or by checking the device s settings Note You must also activate WPS on that device within two minutes to have it present its PIN to the Devi...

Страница 84: ...g data Note Note This works only if the wireless device to which the Device is connected also supports this feature Apply Click Apply to save your changes Cancel Click Cancel to restore your previousl...

Страница 85: ...lable only when you set operating mode to Access Point Select Enabled to turn on WDS and enter the peer device s MAC address manually in the table below Select Disable to turn off WDS Remote Bridge MA...

Страница 86: ...els in this screen Table 24 WDS Scan LABEL DESCRIPTION Wireless Bridge Scan Setup Refresh Click Refresh to update the table This is the index number of the entry SSID This shows the SSID of the availa...

Страница 87: ...channel Enter 0 to disable the periodical scan Output Power Set the output power of the Device If there is a high density of APs in an area decrease the output power to reduce interference with other...

Страница 88: ...vices transmit data after a RTS CTS handshake This helps improve IEEE 802 11g performance Select Off to disable 802 11 protection The transmission rate of your Device might be reduced in a mixed mode...

Страница 89: ...Technical Reference This section discusses wireless LANs in depth For more information see Appendix D on page 325 5 10 1 Wireless Network Overview Wireless networks consist of wireless clients access...

Страница 90: ...the AP Every wireless network must follow these basic guidelines Every device in the same wireless network must use the same SSID The SSID is the name of the wireless network It stands for Service Set...

Страница 91: ...er threshold provides faster performance if the network is not very busy 5 10 3 Wireless Security Overview By their nature radio communications are simple to intercept For wireless data networks this...

Страница 92: ...00A0C5000002 or 00 A0 C5 00 00 02 To get the MAC address for each device in the wireless network see the device s User s Guide or other documentation You can use the MAC address filter to tell the Dev...

Страница 93: ...etwork has two devices Device A only supports WEP and device B supports WEP and WPA Therefore you should set up Static WEP in the wireless network Note It is recommended that wireless networks use WPA...

Страница 94: ...unicate with each other When Intra BSS traffic blocking is enabled wireless station A and B can still access the wired network but cannot communicate with each other Figure 48 Basic Service set 5 10 6...

Страница 95: ...preamble when all wireless devices on the network support it otherwise the Device uses long preamble Note The wireless devices MUST use the same preamble mode in order to communicate 5 10 8 Wireless...

Страница 96: ...the Device see Section 5 6 on page 83 3 Press the button on one of the devices it doesn t matter which For the Device you must press the WPS button for more than three seconds 4 Within two minutes pr...

Страница 97: ...N in the AP s configuration interface 5 If the client device s configuration interface has an area for entering another device s PIN you can either enter the client s PIN in the AP or enter the AP s P...

Страница 98: ...WPS enabled devices connect each device must assume a specific role One device acts as the registrar the device that supplies network and security settings and the other device acts as the enrollee th...

Страница 99: ...can be a registrar and so can some WPS enabled wireless clients By default a WPS devices is unconfigured This means that it is not part of an existing network and can act as either enrollee or registr...

Страница 100: ...step 2 you add another wireless client to the network You know that Client 1 supports registrar mode but it is better to use AP1 for the WPS handshake with the new client since you must connect to th...

Страница 101: ...ces simultaneously you must enroll one after the other For instance if you have two enrollees and one registrar you must set up the first enrollee by pressing the WPS button on the registrar and the f...

Страница 102: ...if this has happened WPS works between only two devices simultaneously so if another device has enrolled your device will be unable to enroll and will not have access to the network If this happens op...

Страница 103: ...ters based on their MAC Addresses Section 6 3 on page 109 Use the UPnP screen to enable UPnP and UPnP NAT traversal on the Device Section 6 4 on page 110 Use the Additional Subnet screen to configure...

Страница 104: ...you can access it RADVD Router Advertisement Daemon When an IPv6 host sends a Router Solicitation RS request to discover the available routers RADVD with Router Advertisement RA messages in response t...

Страница 105: ...achieved UPnP certification from the Universal Plug and Play Forum UPnP Implementers Corp UIC ZyXEL s UPnP implementation supports Internet Gateway Device IGD 1 0 See Section 6 5 on page 111 for examp...

Страница 106: ...e 255 255 255 0 factory default Your Device automatically computes the subnet mask based on the IP Address you enter so do not change this field unless you are instructed to do so IGMP Snooping Status...

Страница 107: ...s only available when you select Enable in the DHCP field DNS Select the type of service that you are registered for from your Dynamic DNS service provider Select Dynamic if you have the Dynamic DNS s...

Страница 108: ...v6 DNS Assign Setup Select how the Device provide DNS server and domain name information to the clients From Router Advertisement The Device provides DNS information through router advertisements From...

Страница 109: ...to add a new static DHCP entry This is the index number of the entry Status This field displays whether the static DHCP is active or not A yellow bulb signifies that this static DHCP is active A gray...

Страница 110: ...put to manually enter a device s MAC address and IP address in the following fields MAC Address If you select Manual Input enter the MAC address of a computer on your LAN IP Address If you select Manu...

Страница 111: ...e by using NAT traversal UPnP applications automatically reserve a NAT forwarding port in order to communicate with another UPnP enabled device this eliminates the need to manually configure port forw...

Страница 112: ...Networking 112 eir F1000 Modem User s Guide 1 Click Start and Control Panel Double click Add Remove Programs 2 Click on the Windows Setup tab and select Communication in the Components selection box...

Страница 113: ...OK to go back to the Add Remove Programs Properties window and click Next 5 Restart the computer when prompted Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP 1...

Страница 114: ...x and click Details 5 In the Networking Services window select the Universal Plug and Play check box 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next 6 6...

Страница 115: ...mputer and the Device Auto discover Your UPnP enabled Network Device 1 Click Start and Control Panel Double click Network Connections An icon displays under Internet Gateway 2 Right click the icon and...

Страница 116: ...he port mappings or click Add to manually add port mappings 5 When the UPnP enabled device is disconnected from your computer all port mappings will be deleted automatically 6 Select Show icon in noti...

Страница 117: ...Configurator Easy Access With UPnP you can access the web based configurator on the Device without finding out the IP address of the Device first This comes helpful if you do not know the IP address...

Страница 118: ...er s Guide 3 Select My Network Places under Other Places 4 An icon with the description for each UPnP enabled device displays under Local Network 5 Right click on the icon for your Device and select I...

Страница 119: ...Chapter 6 Home Networking 119 eir F1000 Modem User s Guide 6 Right click on the icon for your Device and select Properties A properties window displays with basic information about the Device...

Страница 120: ...ting Home Networking Additional Subnet The following table describes the labels in this screen Table 32 Network Setting Home Networking Additional Subnet LABEL DESCRIPTION IP Alias Setup Group Name Se...

Страница 121: ...n IP address that gets assigned to another device Use this screen to list the Vendor IDs of connected STBs to have the Device automatically create static DHCP entries for them when they request IP add...

Страница 122: ...tworking 5th Ethernet Port LABEL DESCRIPTION State Select Enable to use the Ethernet WAN port as a LAN port on the Device Apply Click Apply to save your changes Cancel Click Cancel to exit this screen...

Страница 123: ...this LAN port s downstream traffic specify the VLAN ID from 0 to 4094 to use here Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without saving 6 11 The Wake on LAN Scr...

Страница 124: ...service off you must have another DHCP server on your LAN or else the computer must be manually configured IP Pool Setup The Device is pre configured with a pool of IP addresses for the DHCP clients D...

Страница 125: ...onnection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255 0 and you must enable the Network Address Translation NAT feature of the...

Страница 126: ...e Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Note Regardl...

Страница 127: ...e static routes For example the next figure shows a computer A connected to the Device s LAN interface The Device routes most traffic from A to the Internet through the Device s default gateway R1 You...

Страница 128: ...t this route is not active Click the bulb to enable disable the static route Name This is the name that describes or identifies this route Destination IP This parameter specifies the IP network addres...

Страница 129: ...e IP Type Select whether your IP type is IPv4 or IPv6 Destination IP Address Enter the IPv4 or IPv6 network address of the final destination IP Subnet Mask If you are using IPv4 and need to specify a...

Страница 130: ...add a new DNS route This is the index number of a DNS route Domain Name This is the host name or domain name of the DNS route entry Interface This is the WAN connection through which the Device forwa...

Страница 131: ...the network administrator Policy based routing is applied to outgoing packets prior to the normal routing You can use source based policy forwarding to direct traffic from different users through diff...

Страница 132: ...red information for a policy route Figure 71 Policy Forwarding Add Edit The following table describes the labels in this screen Table 42 Policy Forwarding Add Edit LABEL DESCRIPTION Policy Name Enter...

Страница 133: ...ls the format and the broadcasting method of the RIP packets that the Device sends it recognizes both formats when receiving RIP version 1 is universally supported but RIP version 2 carries more infor...

Страница 134: ...134 eir F1000 Modem User s Guide Chapter 7 Routing...

Страница 135: ...on allowing time sensitive applications to flow more smoothly Time sensitive applications include both those that require a low level of latency delay and a low level of jitter variations in delay suc...

Страница 136: ...vide specific treatment or service based on the tag or marker Traffic Shaping Bursty traffic may cause network congestion Traffic shaping regulates packets to be transmitted with a pre configured data...

Страница 137: ...m Bandwidth Enter the amount of upstream bandwidth for the WAN interfaces that you want to allocate using QoS The recommendation is to set this speed to match the interfaces actual transmission speed...

Страница 138: ...ssigns priorities to various upstream traffic flows None Disables auto priority mapping and has the Device put packets into the queues according to your classification rules Traffic which does not mat...

Страница 139: ...ight of this queue Buffer Management This shows the queue management algorithm used for this queue Queue management algorithms determine how the Device should handle packets when it receives too many...

Страница 140: ...ecify the maximum transmission rate in Kbps allowed for traffic on this queue OK Click OK to save your changes Cancel Click Cancel to exit this screen without saving 8 5 The Class Setup Screen Use thi...

Страница 141: ...Criteria This shows criteria specified in this classifier for example the interface from which traffic of this class should come DSCP Mark This is the DSCP number added to traffic of this classifier...

Страница 142: ...User s Guide Chapter 8 Quality of Service QoS 8 5 1 Add Edit QoS Class Click Add new Classifier in the Class Setup screen or the Edit icon next to a classifier to open the following screen Figure 77 C...

Страница 143: ...Type the mask for the specified MAC address to determine which bits a packet s MAC address should match Enter f for each bit of the specified source MAC address that the traffic s MAC address should...

Страница 144: ...his field is available only when you select 802 1Q in the Ether Type field Select this option and select a priority level between 0 and 7 from the drop down list box 0 is the lowest priority level and...

Страница 145: ...Click this to create a new entry This is the index number of the entry Status This field displays whether the policer is active or not A yellow bulb signifies that this policer is active A gray bulb s...

Страница 146: ...lso the bucket size The Single Rate Three Color Marker srTCM is based on the token bucket filter and identifies packets by comparing them to the Committed Information Rate CIR the Committed Burst Size...

Страница 147: ...ped if there is congestion on the network Available Class Selected Class Select a QoS classifier to apply this QoS policer to traffic that matches the QoS classifier Highlight a QoS classifier in the...

Страница 148: ...he IEEE 802 1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges A VLAN tag includes the 12 bit VLAN ID and 3 bit user priority The VLAN...

Страница 149: ...fic is going DSCP and Per Hop Behavior DiffServ defines a new Differentiated Services DS field to replace the Type of Service TOS field in the IP header The DS field contains a 2 bit unused field and...

Страница 150: ...10 010100 010010 010000 5 5 3 011110 011100 011010 011000 250 6 6 4 100110 100100 100010 100000 5 101110 101000 7 7 6 110000 111000 7 Token Bucket The token bucket algorithm uses tokens in a bucket to...

Страница 151: ...el is referred to as red medium is referred to as yellow and low is referred to as green The srTCM is based on the token bucket filter and has two token buckets CBS and EBS Tokens are generated and ad...

Страница 152: ...PIR respectively All packets are evaluated against the PIR If a packet exceeds the PIR it is marked red Otherwise it is evaluated against the CIR If it exceeds the CIR then it is marked yellow Finally...

Страница 153: ...tion 9 4 on page 159 Use the DMZ screen to configure a default server Section 9 5 on page 161 Use the ALG screen to enable and disable the NAT and SIP VoIP ALG in the Device Section 9 6 on page 162 Us...

Страница 154: ...port number or a range of port numbers to be forwarded and the local IP address of the desired server The port number identifies a service for example web service is on port 80 and FTP on port 21 In...

Страница 155: ...ng NAT Port Forwarding LABEL DESCRIPTION Add new rule Click this to add a new rule This is the index number of the entry Status This field displays whether the NAT rule is active or not A yellow bulb...

Страница 156: ...the following screen Figure 83 Port Forwarding Add Edit The following table describes the labels in this screen Table 55 Port Forwarding Add Edit LABEL DESCRIPTION Active Clear the checkbox to disable...

Страница 157: ...of the range to which you want the incoming ports translated Translation End Port This shows the last port of the translated port range Server IP Address Enter the inside IP address of the virtual se...

Страница 158: ...ation rules Click Add new application in the Applications screen to open the following screen Figure 85 Applications Add The following table describes the labels in this screen Table 57 Applications A...

Страница 159: ...ber and protocol open port the Device forwards the traffic to the LAN IP address of the computer that sent the request After that computer s connection for that service closes another computer on the...

Страница 160: ...traffic to a server on the WAN This is the first port number that identifies a service Trigger End Port This is the last port number that identifies a service Trigger Proto This is the trigger transp...

Страница 161: ...port number in a range of port numbers Trigger Protocol Select the transport layer protocol from TCP UDP or TCP UDP Open Start Port The open port is a port or a range of ports that a server on the WA...

Страница 162: ...ister server the SIP ALG translates the Device s private IP address inside the SIP data stream to a public IP address You do not need to use STUN or an outbound proxy if your Device is behind a SIP AL...

Страница 163: ...the Local End IP address This field is blank for One to One mapping types Global Start IP This is the starting Inside Global IP Address IGA Enter 0 0 0 0 here if you have a dynamic IP address from yo...

Страница 164: ...evice s Single User Account feature that previous routers supported only Many to Many This mode maps multiple local IP addresses to shared global IP addresses Local Start IP Enter the starting Inside...

Страница 165: ...peer to peer application use lower this number to ensure no single client uses too many of the available NAT sessions Apply Click this to save your changes on this screen Cancel Click this to exit thi...

Страница 166: ...hat NAT Does In the simplest form NAT changes the source IP address in a packet received from a subscriber the inside local address to another the inside global address before forwarding the packet to...

Страница 167: ...ired for communication with hosts on other networks It replaces the original IP source address and TCP or UDP source port numbers for Many to One and Many to Many Overload NAT mapping in each packet a...

Страница 168: ...rs are shown in the following table Please refer to RFC 1700 for further information about port numbers Please also refer to the Supporting CD for more examples and details on port forwarding and NAT...

Страница 169: ...port 80 to another B in the example and assign a default server IP address of 192 168 1 35 to a third C in the example You assign the LAN IP addresses and the ISP assigns the WAN IP address The NAT ne...

Страница 170: ...170 eir F1000 Modem User s Guide Chapter 9 Network Address Translation NAT...

Страница 171: ...g table Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you in NetMeeting CU SeeMe etc You can also access...

Страница 172: ...Dynamic DNS 10 2 The DNS Entry Screen Use this screen to view and configure DNS routes on the Device Click Network Setting DNS to open the DNS Entry screen Figure 97 Network Setting DNS DNS Entry The...

Страница 173: ...DNS Entry Add Edit The following table describes the labels in this screen Table 68 DNS Entry Add Edit LABEL DESCRIPTION Host Name Enter the host name of the DNS entry IPv4 Address Enter the IPv4 IP...

Страница 174: ...ovider You can specify up to two host names in the field separated by a comma Username Type your user name Password Type the password assigned to you Dynamic DNS Status User Authentication Result This...

Страница 175: ...te multiple networks on the Device Section 11 2 on page 175 11 2 The Interface Group Screen You can manually add a LAN interface to a new group Alternatively you can have the Device automatically add...

Страница 176: ...k Setting Interface Group The following table describes the fields in this screen Table 70 Network Setting Interface Group LABEL DESCRIPTION Add New Interface Group Click this button to create a new i...

Страница 177: ...e LAN Interfaces Select one or more LAN interfaces Ethernet LAN HPNA or wireless LAN in the Available LAN Interfaces list and use the left arrow to move them to the Grouped LAN Interfaces list to add...

Страница 178: ...ibes the fields in this screen Table 72 Interface Grouping Criteria LABEL DESCRIPTION Source MAC Address Enter the source MAC address of the packet DHCP Option 60 Select this option and enter the Vend...

Страница 179: ...n the following fields Select Other to enter any string that identifies the device in the DUID field DHCP Option 125 Select this and enter vendor specific information of the matched traffic Enterprise...

Страница 180: ...Chapter 11 Interface Group 180 eir F1000 Modem User s Guide...

Страница 181: ...not be able to join the workgroup if your local area network has restrictions set up that do not allow devices to join a workgroup In this case contact your network administrator 12 1 1 What You Can...

Страница 182: ...File System The Device uses Common Internet File System CIFS protocol for its file sharing functions CIFS compatible computers can access the USB file storage devices connected to the Device CIFS pro...

Страница 183: ...that comes with an external power supply make sure it is connected to an appropriate power source that is on Note If your USB device cannot be detected by the Device see the troubleshooting for sugge...

Страница 184: ...a server is enabled by default with the video photo and music shares published To change your Device s media server settings click Network Setting USB Service Media Server The screen appears as shown...

Страница 185: ...rinter to your computer Connect your printer to the Device instead 12 4 2 The Printer Server Screen Use this screen to enable or disable sharing of a USB printer via your Device To access this screen...

Страница 186: ...186 eir F1000 Modem User s Guide Chapter 12 USB Service...

Страница 187: ...e an IM Instant Messaging session from the LAN to the WAN 1 Return traffic for this session is also allowed 2 However other traffic initiated from the WAN is blocked 3 and 4 Figure 108 Default Firewal...

Страница 188: ...resources The ZyXEL Device is pre configured to automatically detect and thwart all known DoS attacks DDoS A DDoS attack is one in which multiple compromised systems attack a single target thereby ca...

Страница 189: ...wall Select Enable to activate the firewall feature on the Device Easy Select Easy to allow LAN to WAN and WAN to LAN packet directions Medium Select Medium to allow LAN to WAN but deny WAN to LAN pac...

Страница 190: ...zed service Ports Protocol Number This shows the IP protocol TCP UDP ICMP or TCP UDP and the port number or range of ports that defines your customized service Other and the protocol number displays i...

Страница 191: ...This is the IP port TCP UDP ICMP or Other that defines your customized port Ports Protocol Number For TCP UDP ICMP or TCP UDP protocol rules this shows the port number or range that defines the custom...

Страница 192: ...nd the direction of traffic to which this rule applies Action This field displays whether the rule silently discards packets DROP discards packets and sends a TCP reset packet or an ICMP destination u...

Страница 193: ...ct Specific Service Protocol This field is displayed only when you select Specific Protocol in Select Protocol Choose the IP port TCP UDP TCP UDP ICMP or ICMPv6 that defines your customized port from...

Страница 194: ...creen to activate protection against DoS attacks Click Security Firewall DoS to display the following screen Figure 114 Security Firewall DoS The following table describes the labels in this screen Ta...

Страница 195: ...screen 14 2 The MAC Filter Screen Use this screen to allow wireless and LAN clients access to the Device Click Security MAC Filter The screen appears as shown Figure 115 Security MAC Filter The follow...

Страница 196: ...MAC addresses of the wireless or LAN clients that are allowed access to the Device in these address fields Enter the MAC addresses in a valid MAC address format that is six hexadecimal character pair...

Страница 197: ...een Figure 116 Security Parental Control The following table describes the fields in this screen Table 83 Security Parental Control LABEL DESCRIPTION Parental Control Select Enable to activate parenta...

Страница 198: ...shown Modify Click the Edit icon to go to the screen where you can edit the rule Click the Delete icon to delete an existing rule Apply Click Apply to save your changes Cancel Click Cancel to restore...

Страница 199: ...ting If you select Block the Device prohibits the users from viewing the Web sites with the URLs listed below If you select Allow the Device blocks access to all URLs except ones listed below Add new...

Страница 200: ...200 eir F1000 Modem User s Guide Chapter 15 Parental Control...

Страница 201: ...Scheduler Rule The following table describes the fields in this screen Table 85 Security Scheduler Rule LABEL DESCRIPTION Add new rule Click this to create a new rule This is the index number of the...

Страница 202: ...he fields in this screen Table 86 Scheduler Rule Add Edit LABEL DESCRIPTION Rule Name Enter a name up to 31 printable English keyboard characters not including spaces for this schedule Day Select chec...

Страница 203: ...erms and concepts may help as you read through this chapter Certification Authority A Certification Authority CA issues certificates and guarantees the identity of each certificate owner There are com...

Страница 204: ...mended that each certificate have unique subject information Issuer This field displays identifying information about the certificate s issuing certification authority such as a common name organizati...

Страница 205: ...he Device drops trailing spaces State Province Name Type up to 32 characters to identify the state or province where the certificate owner is located You may use any character including spaces but the...

Страница 206: ...signed certificate Certificate Copy and paste the signed certificate into the text box to store it on the Device Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without...

Страница 207: ...This field displays the name used to identify this certificate Subject This field displays information that identifies the owner of the certificate such as Common Name CN OU Organizational Unit or dep...

Страница 208: ...the certificate ca means that a Certification Authority signed the certificate Subject This field displays information that identifies the owner of the certificate such as Common Name CN Organization...

Страница 209: ...Table 92 Trusted CA Import Certificate LABEL DESCRIPTION Certificate File Path Type in the location of the certificate you want to upload in this field or click Browse to find it Enable Trusted CA fo...

Страница 210: ...210 eir F1000 Modem User s Guide Chapter 17 Certificates...

Страница 211: ...ta integrity and authentication This chapter shows you how to configure the Device s VPN settings 18 2 The IPSec VPN General Screen Use this screen to view and manage your VPN tunnel policies The foll...

Страница 212: ...of the VPN policy Remote Gateway This is the IP address of the remote IPSec router in the IKE SA Local Addresses This displays the IP address es on the LAN behind your Device Remote Addresses This dis...

Страница 213: ...ON Active Select this to activate this VPN policy IPSec Connection Name Enter the name of the VPN policy Remote IPSec Gateway Address Enter the IP address of the remote IPSec router in the IKE SA Tunn...

Страница 214: ...ESP increase processing requirements and latency delay The Device and remote IPSec router must use the same active protocol Key Exchange Method Select the key exchange method Auto IKE Select this to...

Страница 215: ...ds on the remote ID type For IP type the IP address of the computer with which you will make the VPN connection If you configure this field to 0 0 0 0 or leave it blank the Device will use the address...

Страница 216: ...o the longer it takes to encrypt and decrypt information Both routers must use the same DH key group Key Life Time Define the length of time before an IPSec SA automatically renegotiates in this field...

Страница 217: ...e temporarily disconnected The following fields are available if you select Manual in the Key Exchange Method field Encryption Algorithm Select which key size and encryption algorithm to use in the IK...

Страница 218: ...screen Status This displays a green line between two hosts if the VPN tunnel has been established successfully Otherwise it displays a red line in between Connection Name This displays the name of the...

Страница 219: ...ion techniques such as DES Data Encryption Standard and Triple DES algorithms The Authentication Algorithms HMAC MD5 RFC 2403 and HMAC SHA 1 RFC 2404 provide an authentication mechanism for the AH and...

Страница 220: ...ginal IP header in the hashing process Tunnel Mode Tunnel mode encapsulates the entire IP packet to transmit it securely A Tunnel mode is required for gateway services to provide access to internal sy...

Страница 221: ...public key cryptography key group Set the IPSec SA lifetime This field allows you to determine how long the IPSec SA should stay up before it times out The Device automatically renegotiates the IPSec...

Страница 222: ...psulates the entire original packet including headers in a new IP packet The new IP packet s source address is the outbound address of the sending VPN gateway and its destination address is the inboun...

Страница 223: ...table Table 97 VPN and NAT SECURITY PROTOCOL MODE NAT AH Transport N AH Tunnel N ESP Transport Y ESP Tunnel Y Y This is supported in the Device if you enable NAT traversal 18 5 7 ID Type and Content...

Страница 224: ...D type E mail Remote ID content 1 1 1 2 Remote ID content tom yourcompany com The two Devices in this example cannot complete their negotiation because Device B s Local ID Type is IP but Device A s Re...

Страница 225: ...st of both logs and alerts You may differentiate them by their color in the View Log screen Alerts display in red and logs display in black Syslog Overview The syslog protocol allows devices to send e...

Страница 226: ...ty level you have selected When you select a severity the Device searches through all logs of that severity or higher Category Select the type of logs to display Clear Log Click this to delete all the...

Страница 227: ...ugh all logs of that severity or higher Category Select the type of logs to display Clear Log Click this to delete all the logs Refresh Click this to renew the log screen Export Log Click this to expo...

Страница 228: ...Chapter 19 Log 228 eir F1000 Modem User s Guide...

Страница 229: ...iew the WAN traffic statistics Section 20 2 on page 229 Use the LAN screen to view the LAN traffic statistics Section 20 3 on page 231 Use the NAT screen to view the NAT status of the Device s client...

Страница 230: ...indicates the number of frames with errors received on this interface Drop This indicates the number of received packets dropped on this interface more hide more Click more to show more information C...

Страница 231: ...cates the number of bytes transmitted on this interface Bytes Received This indicates the number of bytes received on this interface more hide more Click more to show more information Click hide more...

Страница 232: ...reen Table 106 System Monitor Traffic Status NAT LABEL DESCRIPTION Refresh Interval Select how often you want the Device to update this screen Device Name This displays the name of the connected host...

Страница 233: ...in the Device Registration This field displays the current registration status of the SIP account You can change this in the Status screen Registered The SIP account is registered with a SIP server No...

Страница 234: ...tatus This field displays the current state of the phone call Idle There are no current VoIP calls incoming calls or outgoing calls being made Dial The callee s phone is ringing Ring The phone is ring...

Страница 235: ...found for the IP address ARP broadcasts the request to all the devices on the LAN The device fills in its own MAC and IP address in the sender address fields and puts the known IP address of the targ...

Страница 236: ...ABEL DESCRIPTION This is the ARP table entry number IPv4 IPv6 Address This is the learned IPv4 or IPv6 IP address of a device connected to a port MAC Address This is the MAC address of the device with...

Страница 237: ...een Figure 142 System Monitor Routing Table The following table describes the labels in this screen Table 109 System Monitor Routing Table LABEL DESCRIPTION IPv4 IPv6 Routing Table Destination This in...

Страница 238: ...ed by a routing daemon or redirect M Modified redirect The route is modified from a routing daemon or redirect Metric The metric represents the cost of transmission A router determines the best route...

Страница 239: ...h ports have joined it To open this screen click System Monitor IGMP MLD Group Status Figure 143 System Monitor IGMP MLD Group Status The following table describes the labels in this screen Table 110...

Страница 240: ...y the IP addresses in the Source List get to receive the multicast group s traffic EXCLUDE means that the IP addresses in the Source List are not allowed to receive the multicast group s traffic but o...

Страница 241: ...User s Guide 25 xDSL Statistics 25 1 The xDSL Statistics Screen Use this screen to view detailed DSL statistics Click System Monitor xDSL Statistics to open the following screen Figure 144 System Moni...

Страница 242: ...displays the current state of setting up the DSL connection Mode This displays the ITU standard used for this connection Traffic Type This displays the type of traffic the DSL port is sending and rece...

Страница 243: ...service provider is receiving from the port Downstream is how much power the port is receiving from the service provider Actual INP Sudden spikes in the line s level of external noise impulse noise c...

Страница 244: ...5 xDSL Statistics 244 eir F1000 Modem User s Guide Table 111 Status xDSL Statistics continued LABEL DESCRIPTION LOF This is the number of Loss Of Frame seconds LOM This is the number of Loss of Margin...

Страница 245: ...describes the labels in this screen Table 112 System Monitor 3G Statistics LABEL DESCRIPTION Refresh Interval Select how often you want the Device to update this screen Select No Refresh to stop refre...

Страница 246: ...nnection Uptime This field displays the time the connection has been up 3G Card Manufacturer This field displays the manufacturer of the 3G card 3G Card Model This field displays the model name of the...

Страница 247: ...Type the default password or the existing password you use to access the system in this field New Password Type your new system password 6 to 256 characters At least one numeric character and one let...

Страница 248: ...248 eir F1000 Modem User s Guide Chapter 27 User Account...

Страница 249: ...lowing table describes the fields in this screen Table 114 Maintenance Remote MGMT LABEL DESCRIPTION WAN Interface used for services Select Any WAN to have the Device automatically activate the remote...

Страница 250: ...restore your previously saved settings 28 3 The Trust Domain Screen Use this screen to view a list of public IP addresses which are allowed to access the Device through the services configured in the...

Страница 251: ...en to open the following screen Figure 149 Maintenance Remote MGMT Trust Domain Add Trust Domain The following table describes the fields in this screen Table 116 Maintenance Remote MGMT Trust Domain...

Страница 252: ...Chapter 28 Remote Management 252 eir F1000 Modem User s Guide...

Страница 253: ...4 compliant CPE management application on their computers from the LAN to discover the CPE and configure user specific parameters such as the username and password Click Maintenance TR 064 to open the...

Страница 254: ...254 eir F1000 Modem User s Guide Chapter 29 TR 064...

Страница 255: ...Management Model An SNMP managed network consists of two main types of component agents and a manager An agent is a management software module that resides in a managed device the Device An agent tra...

Страница 256: ...s Click Maintenance SNMP to open the following screen Use this screen to configure the Device SNMP settings Figure 152 Maintenance SNMP The following table describes the fields in this screen Table 11...

Страница 257: ...ated settings such as system time password name the domain name and the inactivity timeout interval 31 2 The Time Screen To change your Device s time and date click Maintenance Time The screen appears...

Страница 258: ...United States on the second Sunday of March Each time zone in the United States starts using Daylight Saving Time at 2 A M local time So in the United States set the day to Second Sunday the month to...

Страница 259: ...eir F1000 Modem User s Guide Chapter 31 Time Settings Table 119 Maintenance Time continued LABEL DESCRIPTION Apply Click Apply to save your changes Cancel Click Cancel to exit this screen without sav...

Страница 260: ...Chapter 31 Time Settings 260 eir F1000 Modem User s Guide...

Страница 261: ...and add mail server information on the Device Figure 154 Maintenance Email Notification The following table describes the labels in this screen Table 120 Maintenance Email Notification LABEL DESCRIPT...

Страница 262: ...If this field is left blank reports logs or notifications will not be sent via e mail Authentication Username Enter the user name up to 32 characters This is usually the user name of a mail account yo...

Страница 263: ...gure where the Device sends logs and which logs and or immediate alerts the Device records in the Log Setting screen 33 2 The Log Settings Screen To change your Device s log settings click Maintenance...

Страница 264: ...s logs to the e mail address specified in this field If this field is left blank the Device does not send logs via E mail Send Alarm to Alerts are real time notifications that are sent as soon as an e...

Страница 265: ...m 192 168 1 131 To 192 168 1 255 default policy forward 09 54 17 UDP src port 00520 dest port 00520 1 00 3 Apr 7 00 From 192 168 1 6 To 10 10 10 10 match forward 09 54 19 UDP src port 03516 dest port...

Страница 266: ...Chapter 33 Log Setting 266 eir F1000 Modem User s Guide...

Страница 267: ...and may take up to two minutes After a successful upload the system will reboot Do NOT turn off the Device while firmware upload is in progress Figure 158 Maintenance Firmware Upgrade The following ta...

Страница 268: ...ly restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 160 Network Temporarily Disconnected After two minutes l...

Страница 269: ...configuration appears in this screen as shown next Figure 162 Maintenance Configuration Backup Configuration Backup Configuration allows you to back up save the Device s current configuration to a fi...

Страница 270: ...uration file upload is in progress After the Device configuration has been restored successfully the login screen appears Login again to restart the Device The Device automatically restarts in this ti...

Страница 271: ...Process Message You can also press the RESET button on the rear panel to reset the factory defaults of your Device Refer to Section 1 6 on page 22 for more information on the RESET button 35 3 The Reb...

Страница 272: ...Chapter 35 Configuration 272 eir F1000 Modem User s Guide...

Страница 273: ...Ping screen lets you send an ATM OAM Operation Administration and Maintenance packet to verify the connectivity of a specific PVC Section 36 5 on page 276 36 2 What You Need to Know The following term...

Страница 274: ...s the fields in this screen Table 125 Maintenance Diagnostic Ping TraceRoute NsLookup LABEL DESCRIPTION URL or IP Address Type the IP address of a computer that you want to perform ping traceroute or...

Страница 275: ...Device performs a CFM loopback test 802 1Q VLAN ID Type a VLAN ID 0 4095 for this MA VDSL Traffic Type This shows whether the VDSL traffic is activated Loopback Message LBM This shows how many Loop Ba...

Страница 276: ...tifies a channel within a virtual path A series of virtual paths make up a virtual circuit F4 cells operate at the virtual path VP level while F5 cells operate at the virtual channel VC level F4 cells...

Страница 277: ...s this to perform an OAM F4 segment loopback test F4 end end Press this to perform an OAM F4 end to end loopback test F5 segment Press this to perform an OAM F5 segment loopback test F5 end end Press...

Страница 278: ...Chapter 36 Diagnostic 278 eir F1000 Modem User s Guide...

Страница 279: ...1 Make sure the Device is turned on 2 Make sure you are using the power adaptor or cord included with the Device 3 Make sure the power adaptor or cord is connected to the Device and plugged in to an...

Страница 280: ...orgot the password 1 The default admin password is the wireless key printed on the back of the Device 2 If this does not work you have to reset the device to its factory defaults See Section 1 6 on pa...

Страница 281: ...Device 1 Make sure you have entered the password correctly The default admin password is the wireless key printed on the back of the Device The field is case sensitive so make sure Caps Lock is not on...

Страница 282: ...ave the DSL WAN port connected to a telephone jack or the DSL or modem jack on a splitter if you have one 2 Make sure you configured a proper DSL WAN interface Network Setting Broadband screen with th...

Страница 283: ...quality of your wireless connection you can Move your wireless device closer to the AP if the signal strength is low Reduce wireless interference that may be caused by other wireless networks or surro...

Страница 284: ...e connect your USB device to the Device 37 6 UPnP When using UPnP and the Device reboots my computer cannot detect UPnP and refresh My Network Places Local Network 1 Disconnect the Ethernet cable from...

Страница 285: ...pplication package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure t...

Страница 286: ...ow click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If you need Client for Microsof...

Страница 287: ...P Address and Subnet Mask fields Figure 174 Windows 95 98 Me TCP IP Properties IP Address 3 Click the DNS Configuration tab If you do not know your DNS information select Disable DNS If you know your...

Страница 288: ...close the Network window Insert the Windows CD if prompted 7 Turn on your Device and restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 In the Run window type winipcfg...

Страница 289: ...ress 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 177 Windows XP Control Panel 3 Right click Local Area Connection and then click P...

Страница 290: ...ck Properties Figure 179 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP If you have a dynamic IP address click Obtain...

Страница 291: ...IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure...

Страница 292: ...perties 7 In the Internet Protocol TCP IP Properties window the General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know you...

Страница 293: ...se the Local Area Connection Properties window 10 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 11 Turn on your Device and restart your computer if prompted V...

Страница 294: ...er s IP Address 1 Click the Start icon Control Panel Figure 183 Windows Vista Start Menu 2 In the Control Panel double click Network and Internet Figure 184 Windows Vista Control Panel 3 Click Network...

Страница 295: ...connections Figure 186 Windows Vista Network and Sharing Center 5 Right click Local Area Connection and then click Properties Note During this procedure click Continue whenever Windows displays a scr...

Страница 296: ...Figure 188 Windows Vista Local Area Connection Properties 7 The Internet Protocol Version 4 TCP IPv4 Properties window opens the General tab If you have a dynamic IP address click Obtain an IP addres...

Страница 297: ...tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Con...

Страница 298: ...Properties 9 In the Internet Protocol Version 4 TCP IPv4 Properties window the General tab Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know yo...

Страница 299: ...net Protocol Version 4 TCP IPv4 Properties window 11 Click Close to close the Local Area Connection Properties window 12 Close the Network Connections window 13 Turn on your Device and restart your co...

Страница 300: ...dem User s Guide Appendix A Setting up Your Computer s IP Address Macintosh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel Figure 192 Macintosh OS...

Страница 301: ...IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your Device in the Router address box 5 Close the TCP IP Control Panel 6 Click Save if prompted to save changes to yo...

Страница 302: ...5 Macintosh OS X Network 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask...

Страница 303: ...le location may vary depending on your Linux distribution and release version Note Make sure you are logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to c...

Страница 304: ...tain IP address settings with and select dhcp from the drop down list If you have a static IP address click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address...

Страница 305: ...h0 is the name of the Ethernet card Open the configuration file with any plain text editor If you have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure shows an example Figu...

Страница 306: ...t 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 OK Shutting down loopback interface OK Setting network parameters OK Bringing up loopback interface OK Br...

Страница 307: ...nd the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house numbe...

Страница 308: ...32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is...

Страница 309: ...work number bits the smaller the number of remaining host ID bits An IP address with host IDs of all zeros is the IP address of the network 192 168 1 0 with a 24 bit subnet mask for example An IP addr...

Страница 310: ...s In the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons In this example the company network...

Страница 311: ...2 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask t...

Страница 312: ...s 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address...

Страница 313: ...255 255 224 27 8 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 6 255 255 255 252 30 64 2 7 255 255 255 254 31 128 1 The following table is a summary for subnet planning on a network with a...

Страница 314: ...Your Device will compute the subnet mask automatically based on the IP address that you entered You don t need to change the subnet mask computed by the Device unless you are instructed to do otherwis...

Страница 315: ...rnet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking...

Страница 316: ...of the screen This disables any web pop up blockers you may have enabled Figure 209 Internet Options Privacy 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if...

Страница 317: ...cripts and Java Permissions 2 Select Settings to open the Pop up Blocker Settings screen Figure 210 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to h...

Страница 318: ...k Add to move the IP address to the list of Allowed sites Figure 211 Pop up Blocker Settings 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of th...

Страница 319: ...plorer click Tools Internet Options and then the Security tab Figure 212 Internet Options Security 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that En...

Страница 320: ...ick OK to close the window Figure 213 Security Settings Java Scripting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button...

Страница 321: ...ws JavaScripts and Java Permissions 5 Click OK to close the window Figure 214 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sur...

Страница 322: ...ck OK to close the window Figure 215 Java Sun Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary You can enable Java Javascripts and pop ups in one screen Cl...

Страница 323: ...odem User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions Click Content to show the screen below Select the check boxes as shown in the following screen Figure 217 Mozilla Firefox C...

Страница 324: ...324 eir F1000 Modem User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions...

Страница 325: ...commonly referred to as an ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an ad hoc wireless LAN Fig...

Страница 326: ...t ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution S...

Страница 327: ...duce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interf...

Страница 328: ...rves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Se...

Страница 329: ...ial Quadrature Phase Shift Keying 5 5 11 CCK Complementary Code Keying 6 9 12 18 24 36 48 54 OFDM Orthogonal Frequency Division Multiplexing Wireless Security Overview Wireless security is vital to yo...

Страница 330: ...and the server is the RADIUS server The RADIUS server handles the following tasks Authentication Determines the identity of the users Authorization Determines the network services available to authent...

Страница 331: ...and a CA issues certificates and guarantees the identity of each certificate owner EAP MD5 Message Digest Algorithm 5 MD5 authentication is the simplest one way authentication method The authenticati...

Страница 332: ...e The AP maps a unique key that is generated with the RADIUS server This key expires when the wireless connection times out disconnects or reauthentication times out A new WEP key is generated each ti...

Страница 333: ...ributed by the authentication server AES Advanced Encryption Standard is a block cipher that uses a 256 bit mathematical algorithm called Rijndael They both include a per packet key mixing function a...

Страница 334: ...tion process again Pre authentication enables fast roaming by allowing the wireless client already connecting to an AP to perform IEEE 802 1x authentication with another AP before connecting to it Wir...

Страница 335: ...passwords into the AP and all wireless clients The Pre Shared Key PSK must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters including spaces and symbols 2 The AP checks each...

Страница 336: ...able WPA2 PSK TKIP AES Yes Disable Antenna Overview An antenna couples RF signals onto air A transmitter within a wireless device sends an RF signal to the antenna which propagates the signal through...

Страница 337: ...ible to make circular overlapping coverage areas with multiple access points Directional antennas concentrate the RF signal in a beam like a flashlight does with the light from its bulb The angle of t...

Страница 338: ...338 eir F1000 Modem User s Guide Appendix D Wireless LANs...

Страница 339: ...0 0000 0015 can be written as 2001 0db8 1a2f 0000 0000 0015 2001 0db8 0000 0000 1a2f 0015 2001 db8 1a2f 0 0 15 or 2001 db8 0 0 1a2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6 uses...

Страница 340: ...sts in a multicast group Multicast scope allows you to determine the size of the multicast group A multicast address has a predefined prefix of ff00 8 The following table describes some of the predefi...

Страница 341: ...byte Ethernet MAC address as shown next EUI 64 inserts the hex digits fffe between the third and fourth bytes of the MAC address and complements the seventh bit of the first byte of the MAC address Se...

Страница 342: ...the Relay Reply message and sends it to the relay agent The interface ID should not change even after the relay agent restarts Prefix Delegation Prefix delegation enables an IPv6 router to use the IP...

Страница 343: ...irectly without passing through a router If the address is unlink the address is considered as the next hop Otherwise the Device determines the next hop from the default router list or routing table O...

Страница 344: ...dows Vista Use the ipconfig command to check your automatic configured IPv6 address as well You should see at least one IPv6 address available for the interface on your computer Example Enabling DHCPv...

Страница 345: ...from a DHCPv6 server Example Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer To enable IPv6 in Windows 7 1 Select Cont...

Страница 346: ...r dynamic IPv6 address This example shows a global address 2001 b021 2d 1000 obtained from a DHCP server C ipconfig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific...

Страница 347: ...f IP protocol used by the service If this is TCP UDP then the service uses the same port number with TCP and UDP If this is USER DEFINED the Port s is the IP protocol number not the port number Port s...

Страница 348: ...l a program to enable fast transfer of files including large files that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client ser...

Страница 349: ...nsfer of data over public networks This is the control channel PPTP_TUNNEL GRE User Defined 47 PPTP Point to Point Tunneling Protocol enables secure transfer of data over public networks This is the d...

Страница 350: ...Play UPnP SSH TCP UDP 22 Secure Shell Remote Login Program STRM WORKS UDP 1558 Stream Works Protocol SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server TACACS UDP 49 Login Host Prot...

Страница 351: ...anship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to r...

Страница 352: ...hat no one will step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect...

Страница 353: ...26 B backup configuration 269 Basic Service Set See BSS 325 Basic Service Set see BSS blinking LEDs 20 Broadband 41 broadcast 66 BSS 94 325 example 94 C CA 203 331 Canonical Format Indicator See CFI...

Страница 354: ...n Name System see DNS Domain Name System See DNS DoS 188 DS field 149 DS dee differentiated services DSCP 149 dynamic DNS 171 wildcard 172 Dynamic Host Configuration Protocol see DHCP dynamic WEP key...

Страница 355: ...te 125 WAN 42 IP Address Assignment 65 IP alias NAT applications 168 IPSec algorithms 219 architecture 218 NAT 222 IPSec VPN 211 IPv6 43 339 addressing 43 66 339 EUI 64 341 global address 340 interfac...

Страница 356: ...example 167 global 166 IGA 166 ILA 166 inside 166 IPSec 222 local 166 outside 166 port forwarding 154 port number 168 services 168 SIP ALG 162 activation 162 traversal 222 NAT example 169 negotiation...

Страница 357: ...P RTS Request To Send 328 threshold 327 328 RTS threshold 87 91 S security wireless LAN 91 Security Log 227 Security Parameter Index see SPI service access control 249 250 251 Service Set 72 79 Servic...

Страница 358: ...Universal Plug and Play see UPnP upgrading firmware 267 UPnP 110 cautions 105 example 111 installation 111 NAT traversal 104 USB features 19 V VID Virtual Circuit VC 63 Virtual Local Area Network See...

Страница 359: ...9 limitations 101 PIN 96 push button 22 96 wireless security 329 WLAN interference 327 security parameters 336 WPA 93 333 key caching 334 pre authentication 334 user authentication 334 vs WPA PSK 333...

Отзывы: