ARRIS 2247N8 ADSL2+ Router User Manual Administrator s Handbook V9 0 1

ARRIS Group, Inc. ADSL2+ Router Administrator s Handbook V9 0 1

Users Manual

 Administrator’s Handbook Motorola Netopia ®  Embedded Software Version 9.0.1 Motorola Netopia ®  GatewaysSeptember 2010
 Administrator’s Handbook Copyright Copyright © 2010 by Motorola, Inc.All rights reserved. No part of this publication may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation or adaptation) without written permission from Motorola, Inc.Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Motorola to provide notification of such revision or change. Motorola provides this guide without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Motorola may make improvements or changes in the product(s) described in this manual at any time. MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Microsoft, Windows, Windows Me, and Windows NT are either trademarks or registered trademarks of Microsoft Corporation in the U.S and/or other countries. Macintosh is a registered trademark of Apple, Inc. Firefox is a registered trademark of the Mozilla Foundation. All other product or service names are the property of their respective owners.Motorola, Inc. 1303 East Algonquin RoadSchaumburg, Illinois 60196USA Part Number 580780-001-00 rev aV9.0.1-sku 1
 Table of Contents Table of Contents CHAPTER 1  Setting up Your Motorola Netopia ®  Modem or Gateway  7 Important Safety Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . .  8 POWER SUPPLY INSTALLATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8TELECOMMUNICATION INSTALLATION . . . . . . . . . . . . . . . . . . . . . . . 8PRODUCT VENTILATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Wichtige Sicherheitshinweise  . . . . . . . . . . . . . . . . . . . . . . . . . .  9 NETZTEIL INSTALLIEREN  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9INSTALLATION DER TELEKOMMUNIKATION . . . . . . . . . . . . . . . . . . . 9 Set up your Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10 Configure Your PC for Dynamic Addressing  . . . . . . . . . . . . . .  11 Motorola Netopia ®  Gateway Quickstart . . . . . . . . . . . . . . . . . .  14 CHAPTER 2  Web-based Device Management   . . . . . . . . . . . . . . . . . . . . . . .  17 The Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18 Home Page Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Links Bar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  19 Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  20 Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23More IP Subnets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25NAT  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Router Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Time Zone  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  35 DSL  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36LAN  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36System Log  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Firewall Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  39 Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Restart Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Reset Router  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Update Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  44 CHAPTER 3  Basic Troubleshooting  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  45 Status Indicator Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  46 LED Function Summary Matrix  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
 Administrator’s Handbook Factory Reset Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  49 CHAPTER 4  Command Line Interface   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  52 Starting and Ending a CLI Session  . . . . . . . . . . . . . . . . . . . . .  54 Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54Ending a CLI Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 Using the CLI Help Facility  . . . . . . . . . . . . . . . . . . . . . . . . . . .  54 About SHELL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .  55 SHELL Prompt  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55SHELL Command Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 SHELL Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  56 Common Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56WAN Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 About CONFIG Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .  64 CONFIG Mode Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64Navigating the CONFIG Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . .64Entering Commands in CONFIG Mode. . . . . . . . . . . . . . . . . . . . . . . . .64Guidelines: CONFIG Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65Displaying Current Gateway Settings . . . . . . . . . . . . . . . . . . . . . . . . . .65Step Mode: A CLI Configuration Technique. . . . . . . . . . . . . . . . . . . . . .65Validating Your Configuration  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66 CONFIG Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  67 Connection commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67IP DNS commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68IP IGMP commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69NTP commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71IP Gateway commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71Application Layer Gateway (ALG) commands  . . . . . . . . . . . . . . . . . . .72Link commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72Management commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73Physical interfaces commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74PPPoE relay commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76NAT Pinhole commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77System commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 CHAPTER 5  Technical Specifications and Safety Information   . . . . .81 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  81 Power requirements  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81Environment  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81Software and protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Agency approvals  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  82 Regulatory notices  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Manufacturer’s Declaration of Conformance . . . . . . . . . . . . . .  83 Important Safety Instructions . . . . . . . . . . . . . . . . . . . . . . . . . .  85 47 CFR Part 68 Information . . . . . . . . . . . . . . . . . . . . . . . . . . .  86 FCC Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86FCC Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
 Table of Contents Electrical Safety Advisory  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  87 Warranty Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  88 Software License, Limited Warranty and Limitation of Remedies  . . . . 88Software License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88Warranty Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Copyright Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . .  91 Caring for the Environment by Recycling  . . . . . . . . . . . . . . .  103 Beskyttelse af miljøet med genbrug . . . . . . . . . . . . . . . . . . . . . . . . . . 103Umweltschutz durch Recycling  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Cuidar el medio ambiente mediante el reciclaje  . . . . . . . . . . . . . . . . 103Recyclage pour le respect de l'environnement  . . . . . . . . . . . . . . . . . 103Milieubewust recycleren. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104Dba∏oÊç o Êrodowisko - recykling . . . . . . . . . . . . . . . . . . . . . . . . . . 104Cuidando do meio ambiente através da reciclagem  . . . . . . . . . . . . . 104Var rädd om miljön genom återvinning. . . . . . . . . . . . . . . . . . . . . . . . 104 Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  107
 Administrator’s Handbook
 7 CHAPTER 1 Setting up Your Motorola Netopia ®  Modem or Gateway This Administrator’s Handbook covers the advanced features of the Motorola Netopia ®  Modem and Gateway fam-ilies.Your Motorola Netopia ®  equipment offers advanced configuration features accessed through the Web-based interface screens and the Command Line Interface (CLI). This Administrator’s Handbook documents the advanced features, including advanced testing, security, monitoring, and configuration. This Administrator’s Hand-book should be used as a companion to the User Manual. You should read the User Manual before reading this Administrator’s Handbook.This guide is targeted primarily to residential service subscribers.Expert Mode sections and the Command Line Interface may also be of use to the support staffs of broadband ser-vice providers and advanced residential service subscribers. (See  “Expert Mode” on page 43 ” and  “Command Line Interface” on page 51 .”)Most users will find that the basic Quickstart configuration is all that they ever need to use. This section may be all that you ever need to configure and use your Motorola Netopia ®  Gateway. The following instructions cover instal-lation in Router Mode. ◆ “Important Safety Instructions” on page 8“Wichtige Sicherheitshinweise” on page 9 ◆ “Set up your Gateway” on page 10 ◆ “Configure Your PC for Dynamic Addressing” on page 11 ◆ “Motorola Netopia® Gateway Quickstart” on page 14
 Administrator’s Handbook 8 Important Safety Instructions POWER SUPPLY INSTALLATION Connect the power supply cord to the power jack on the Motorola Netopia ®  Gateway. Plug the power supply into an appropriate electrical outlet. ☛   WARNING:The power supply must be connected to a mains outlet with a protective earth connection. Do not defeat the protective earth connection.CAUTION:  Depending on the power supply provided with the product, either the direct plug-in power supply blades, power supply cord plug or the appliance coupler serves as the mains power disconnect. It is important that the direct plug-in power supply, socket-outlet or appliance coupler be located so it is readily accessible. (Sweden)  Apparaten skall anslutas till jordat uttag när den ansluts till ett nätverk (Norway)  Apparatet må kun tilkoples jordet stikkontakt. USB-powered models:  For Use with Listed I.T.E. Only TELECOMMUNICATION INSTALLATION When using your telephone equipment, basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons, including the following: ◆ Do not use this product near water, for example, near a bathtub, wash bowl, kitchen sink or laundry tub, in a wet basement or near a swimming pool. ◆ Avoid using a telephone (other than a cordless type) during an electrical storm. There may be a remote risk of electrical shock from lightning. ◆ Do not use the telephone to report a gas leak in the vicinity of the leak. ◆ CAUTION: The external phone should be UL Listed and the connections should be made in accordance with Article 800 of the NEC. PRODUCT VENTILATION The Motorola Netopia ®  Gateway is intended for use in a consumer's home. Ambient temperatures around this product should not exceed 104°F (40°C).  It should not be used in locations exposed to outside heat radiation or trapping of its own heat. The product should have at least one inch of clearance on all sides except the bottom when properly installed and should not be placed inside tightly enclosed spaces unless proper ventilation is pro-vided. SAVE THESE  INSTRUCTIONS
 9 Wichtige Sicherheitshinweise NETZTEIL INSTALLIEREN Verbinden Sie das Kabel vom Netzteil mit dem Power-Anschluss an dem Motorola Netopia ®  Gateway. Stecken Sie dann das Netzteil in eine Netzsteckdose. ☛   Warnung:Das Netzteil muss an eine Steckdose, die mit einem Schutzleiter verbunden ist, angeschlos-sen werden.  Die Schutzleiterverbindung darf in keinem Fall unterbrochen werden.Achtung: Abhängig von dem mit dem Produkt gelieferten Netzteil, entweder die direkten Steckernetzgeräte, Stecker vom Netzkabel oder der Gerätekoppler dienen als Hauptspannungsunterbrechung. Es ist wichtig, dass das Steckernetzgerät, Steckdose oder Gerätekoppler frei zugänglich sind. (Sweden)  Apparaten skall anslutas till jordat uttag när den ansluts till ett nätverk (Norway)  Apparatet må kun tilkoples jordet stikkontakt. USB-powered models:  For Use with Listed I.T.E. Only INSTALLATION DER TELEKOMMUNIKATION Wenn Ihre Telefonausrüstung verwendet wird, sollten grundlegende Sicherheitsanweisungen immer befolgt wer-den, um die Gefahr eines Feuers, eines elektrischen Schlages und die Verletzung von Personen, zu verringern. Beachten Sie diese weiteren Hinweise: ◆ Benutzen Sie dieses Produkt nicht in Wassernähe wie z.B. nahe einer Badewanne, Waschschüssel, Küchenspüle, in einem nassen Keller oder an einem Swimmingpool.  ◆ Vermeiden Sie das Telefonieren (gilt nicht für schnurlose Telefone) während eines Gewitters. Es besteht die Gefahr eines elektrischen Schlages durch einen Blitz.  ◆ Nicht das Telefon benutzen um eine Gasleckstelle zu Melden, wenn Sie sich in der Nähe der Leckstelle befin-den. Bewahren Sie diese Anweisungen auf
 Administrator’s Handbook 10 Set up your Gateway Refer to your User Manual for instructions on how to connect your Motorola Netopia ®  Gateway to your power source, PC or local area network, and your Internet access point, whether it is a dedicated DSL outlet or a DSL or cable modem. Different Motorola Netopia ®  Gateway models are supplied for any of these connections. Be sure to enable Dynamic Addressing on your PC. See “ Configure Your PC for Dynamic Addressing ”.
 11 Configure Your PC for Dynamic Addressing The following instructions assume that you want to use the automatic configuration and address sharing features of the Gateway to provide IP information to devices on your Local Area Network. To connect additional computers that will use the Gateway’s address sharing feature repeat these steps for each computer. Microsoft Windows: 1. Navigate to the TCP/IP Properties Control Panel.  Then go to Step 2. 2. Select Obtain an IP address automatically.3. Select Obtain DNS server address automatically, if available.4. Remove any previously configured gateways, if applicable.5. Click the OK button. Restart if prompted.Proceed to the next section “Motorola Netopia® Gateway Quickstart” on page 14.a. Some Win-dows versions follow a path like this:Start menu -> Settings -> Control Panel -> Network (or Network and Dial-up Connections -> Local Area Connection -> Properties) -> TCP/IP [your_network_card] or Internet Pro-tocol [TCP/IP] -> Propertiesb. Some Win-dows versions follow a path like this:Start menu -> Control Panel -> Network and Internet Connec-tions -> Network Connections -> Local Area Connection -> Proper-ties -> Internet Protocol [TCP/IP] -> Properties
Administrator’s Handbook12c. Windows Vista and Windows 7 are set to obtain an IP address automatically by default. You may not need to configure them at all.To check, open the Networking Control Panel and select Internet Protocol Version 4 (TCP/IPv4). Click the Properties button.The Internet Protocol Version 4 (TCP/IPv4) Properties window should appear as shown.If not, select the radio buttons shown above, and click the OK button.
13Macintosh MacOS 9.2 and higher or Mac OS X 10.1.5 or higher:1. Access the TCP/IP or Network control panel. Then go to Step 2.2. Select Built-in Ethernet3. Select Configure IPv4: Using DHCP4. Close and Save, if prompted.Proceed to the next section “Motorola Netopia® Gateway Quickstart” on page 14.a. MacOS fol-lows a path like this:Apple Menu -> Control Pan-els -> TCP/IP Control Panelb. Mac OS X follows a path like this:Apple Menu -> Sys-tem Preferences -> Network -> Configure
Administrator’s Handbook14Motorola Netopia® Gateway Quickstart1. Run a Web browser, such as Mozilla Firefox or Microsoft Internet Explorer.Enter http://192.168.1.254 in the URL Address text box.  Press Return.(If your ISP’s Configuration Worksheet tells you to use an IP address other than 192.168.1.254 to log in, enter http://< ip-address>.)2. The browser displays the Welcome page.◆You can choose Unrestricted LAN Access.If you choose Unrestricted LAN Access, any user connected to your network can access and administer the Motorola Netopia® Gateway’s configuration pages.Or,◆For security, you may create and enter an Administrative password for accessing the Motorola Netopia® Gate-way.• The administrative User name is admin.• The initial Password can be whatever you choose, from one to 32 characters long.This user name and password are separate from the user name and password you might use to access the Internet. You may change them later. You will be challenged for this Admin username and password any time that you attempt to access the Motorola Netopia® Gateway’s configuration pages.
15If you have chosen to create an Administrative password, when you connect to your Gateway as an Adminis-trator, you enter “admin” as the UserName and the Password you just created.3. Click OK.Congratulations! Your installation is complete. You can now surf to your favorite Web sites by typing an URL in your browser’s location box or by selecting one of your favorite Internet bookmarks. Optional services that you may have contracted with your provider are also available.If you have any questions or encounter problems with your Motorola Netopia® Gateway, refer to “Basic Trouble-shooting” on page 45, the context-sensitive help in your Gateway’s web pages, or contact your service pro-vider’s technical support helpdesk.Answers to many frequently asked product-related questions are also available on-line at:http://broadband.motorola.com/consumers/support/default.asp?supportSection=blankIf you click the Back button on your web browser, the browser displays the Basic Home Page.
Administrator’s Handbook16
17CHAPTER 2 Web-based Device ManagementUsing the Web-based user interface for the Motorola Netopia® Gateway you can configure, troubleshoot, and monitor the status of your Gateway.◆“The Home Page” on page 18◆“Links Bar” on page 19◆“Configure” on page 20◆“Status” on page 35◆“Utilities” on page 39◆“Help” on page 44
Administrator’s Handbook18The Home PageHome Page for a Wi-Fi modelHome Page InformationThe Home page displays information about the following categories:◆Connection Information◆Router Information◆Local Network◆Restart Connection – For a PPPoE connection, clicking this button will bring down any PPPoE WAN connec-tion that is up and resend your current PPPoE login credentials and reestablish your Internet connection.For a DHCP connection, clicking this button will release and renew the DHCP lease from your service pro-vider’s DHCP server, which assigns your local WAN IP address.◆Connect – Only displays if you are not connected. For a PPPoE connection, clicking this button will allow you to attempt to login using a different User ID and Password.◆Disconnect – Only for a PPPoE connection, clicking this button will disconnect you from the Internet until you choose to reestablish your connection manually.Click the Help link in the left-hand column of links to display a page of explanatory information. Help is available for every page in the Web interface. See “Help” on page 44.
19Links BarThe links in the left-hand column of the Home page access a series of pages to allow you to monitor, diagnose, and update your Gateway. The following sections give brief descriptions of these pages.◆“The Home Page” on page 18◆“Configure” on page 20◆“Status” on page 35◆“Utilities” on page 39◆“Help” on page 44
Administrator’s Handbook20ConfigureWhen you click Configure in the left hand column of links, the links bar expands.◆“Connection” on page 21◆“DHCP Server” on page 23◆“More IP Subnets” on page 24◆“Wireless” on page 25◆“NAT” on page 31◆“Router Password” on page 33◆“Time Zone” on page 34
21ConnectionWhen you click Connection, the Connection Configuration page appears. This screen’s appearance will vary depending on your type of connection to the Internet.Here is an example.Here you can set up or change the way you connect to your ISP. You should only change these settings at your ISP's direction, or by agreement with your ISP.◆DSL Auto Modulation: provides automatic rate adaptation which tries to sync at the fastest possible modula-tion.◆DSL Transport: Select ATM (Asynchronous Transfer Mode), PTM (Packet Transfer Mode), AUTO, or NONE from the pull-down menu. These modes depend on the equipment used by your ISP. Many providers now sup-port dual mode IP DSLAM line cards that default to PTM, with ATM as a fallback. The default AUTO allows the best compatibility.◆Auto Detection VPI/VCI: If this checkbox is checked, your Gateway will attempt to detect the virtual circuit pairs in use by trying the most common ones in succession until one is found. Thereafter, the Gateway will always attempt to use that pair. If it cannot detect the VPI/VCI set in use, you can uncheck the checkbox, and enter the values manually.◆VPI/VCI: These values depend on the way your ISP's equipment is configured. 0/35 and 8/35 are the most common virtual circuit pairs, but others are also used.◆Encapsulation: The authentication and encapsulation protocol is determined by your ISP by the type of account that you have signed up for and the model of your Motorola device. Choose from the pull-down menu:pppoe-llc, pppoe-vcmux, ether-llc, ip-llc, pppoa-llc, or pppoa-vcmux◆Bridging: Your Gateway can be turned into a simple bridge, if desired. Select Enabled from the pull-down menu. However, it will no longer provide routing or security features in this mode.◆Use Static IP Addressing: Your service provider may tell you that the WAN IP Address for your Gateway is static. In this case, check the checkbox.
Administrator’s Handbook22◆The screen expands to allow you to enter the Static IP Address and Netmask from your Service Provider in the appropriate fields.◆IP Gateway: The IP Address of the default gateway, or peer address if using PPP. This is normally set to 0.0.0.0 for PPP connections. ◆Primary DNS Server: The IP Address of the Primary Domain Name Server ◆Secondary DNS Server: The IP Address of the backup Domain Name Server When all of your entries are made, click the Apply Changes button.
23DHCP ServerWhen you click DHCP Server, the DHCP Server Configuration page appears.The Server configuration determines the functionality of your DHCP Settings. This functionality enables the Gate-way to assign your LAN computer(s) a “private” IP address and other parameters that allow network communica-tion. This feature simplifies network administration because the Gateway maintains a list of IP address assignments. Additional computers can be added to your LAN without the hassle of configuring an IP address. This is the default mode for your Gateway. ◆Router IP Address: Specifies the IP address of the Gateway itself.◆Subnet Mask: Specifies the subnet for DHCP clients on the LAN side of the gateway. Defaults to the common Class C subnet.◆DHCP Server Enable: Uncheck this setting if you already have a DHCP server on your LAN. This enables the DHCP server in this Gateway. ◆DHCP Start Address: Specifies the first address in the DHCP address range. You can reserve a sequence of up to 253 IP addresses within a subnet, beginning with the specified address, for dynamic assignment. ◆DHCP End Address: Specifies the last address in the DHCP address range.◆DHCP Lease: Specifies the default length for DHCP leases issued by the Gateway. Enter lease time in dd:hh:mm:ss (days/hours/minutes/seconds) format.
Administrator’s Handbook24More IP SubnetsWhen you click the More IP Subnets link, the Additional IP Subnets screen appears.One subnet is preconfigured by default. The Additional IP Subnets screen allows you to configure up to seven secondary subnets and their DHCP ranges, by entering IP address/subnet mask pairs:☛  Note: You need not use this screen if you have only a single Ethernet IP subnet.◆To add an IP subnet, enter the Gateway’s IP address on the subnet in the IP Address field and the subnet mask for the subnet in the Netmask field.◆Enter the DHCP Start Address and End Address of the subnet range in their respective fields.Ranges cannot overlap and there may be only one range per subnet.If DHCP Server (see “DHCP Server” on page 23) is not enabled, the DHCP Start Address and DHCP End Address fields do not appear.◆Click the Add this IP Subnet button. Your entries will be added to the IP Subnet List.To Edit or Remove a configured subnet, click the respective icon in the list item. When you are finished, click the Apply Changes button.
25Wireless(supported models)When you click the Wireless link in the links bar, the menu expands.Wireless ConfigurationWhen you click the Base Settings link, the Wireless Base Settings page appears.◆The wireless function is automatically enabled by default. If you uncheck the Enabled checkbox, the wireless options are disabled, and the Gateway will not provide or broadcast its wireless LAN services.◆The pull-down menu allows you to select and lock the Gateway into the wireless transmission mode you want:For compatibility with clients using 802.11b (up to 11 Mbps transmission), 802.11g (up to 20+ Mbps), 802.11a (up to 54 Mbit/s using the 5 GHz band), or 802.11n (from 54 Mbit/s to 600 Mbit/s with the use of four spatial streams at a channel width of 40 MHz), select B/G/N. To limit your wireless LAN to one mode or the other, select G-only, N-only, A-only, or B-only, or some combination that applies to your setup.B/G B-onlyG-only B/G/NN-only A/NA-only
Administrator’s Handbook26☛  NOTE:If you choose to limit the operating mode to  G-only, N-only, A-only, or B-only, clients using the mode(s) you excluded will not be able to connect.◆Channel – (1 through 11, for North America) on which the network will broadcast. This is a frequency range within the 2.4Ghz band. Channel selection depends on government regulated radio frequencies that vary from region to region. The widest range available is from 1 to 14. Europe, France, Spain and Japan differ. Channel selection can have a significant impact on performance, depending on other wireless activity close to this Router. Channel selection is not necessary at the client computers; the clients will scan the available channels seeking access points using the same SSID as the client.◆Wireless Protected Setup (WPS) is a not a new security protocol. It is simply an easier way to use existing protocols to provide greater security for your wireless network connections.By default, Privacy is set to Wireless Protected Access (WPA-PSK). WPS allows you to automatically generate a new strong WPA key for your Gateway and any client devices on your wireless network.☛  Note:Not all client wireless devices support WPS. Refer to their documentation.Wireless SecurityWhen you click the Security link, the Wireless Security page appears.YOU ARE STRONGLY ENCOURAGED TO IMPLEMENT SOME FORM OF PRIVACY ON YOUR WIRELESS LAN. You can specify the Privacy mode for each SSID that you define. Options from the pull-down menu are:◆OFF– No Privacy◆WEP–Manual - see “WEP Manual” on page 27◆WPA-PSK - see “WPA-PSK” on page 28Hide SSID. If you check this checkbox, the Gateway hides the wireless network from the scanning features of wireless client computers. Unless both the wireless clients and the Gateway share the same Wireless ID in this mode, the Gateway’s wireless LAN will not appear as an available network when scanned for by wireless-enabled computers. Members of this “Closed System” WLAN must log onto the Gateway’s wireless network with the iden-tical SSID as that configured in the router.Closed System mode is an ideal way to increase wireless security and to prevent casual detection by unwanted neighbors, office users, or malicious users such as hackers.If you do not enable this mode, it is more convenient, but potentially less secure, for clients to access your WLAN by scanning available access points. You must decide based on your own network requirements.
27Enabling Closed System Mode on your wireless Gateway provides another level of security, since your wireless LAN will no longer appear as an available access point to client PCs that are casually scanning for one.Your own wireless network clients, however, must log into the wireless LAN by using the exact SSID of the Motor-ola Netopia® Gateway.In addition, if you have enabled WEP or WPA encryption on the Motorola Netopia® Gateway, your network clients must also have WEP or WPA encryption enabled, and must have the same WEP or WPA encryption key as the Motorola Netopia® Gateway.Once the Motorola Netopia® Gateway is located by a client computer, by setting the client to a matching SSID, the client can connect immediately if WEP or WPA is not enabled. If WEP or WPA is enabled then the client must also have WEP or WPA enabled and a matching WEP or WPA key. Wireless client cards from different manufacturers and different operating systems accomplish connecting to a wireless LAN and enabling WEP or WPA in a variety of ways. Consult the documentation for your particular wire-less card and/or operating system. Block Wireless Bridging. Check the checkbox to block wireless clients from communicating with other wire-less clients on the LAN side of the Gateway.WEP ManualWEP (Wired Equivalent Privacy) Security is a Privacy option that is based on encryption between the Router and any PCs (“clients”) you have with wireless cards. If you are not using WPA-PSK Privacy, you can use WEP encryption instead. For this encryption to work, both your Router and each client must share the same Wireless ID, and both must be using the same encryption keys.You can provide a level of data security by enabling WEP (Wired Equivalent Privacy) for encryption of network data. You can enable 40-, 128-, or 256-bit WEP Encryption (depending on the capability of your client wireless card) for IP traffic on your LAN.WEP - Manual allows you to enter your own encryption keys manually. This is a difficult process, but only needs to be done once. Avoid the temptation to enter all the same characters.◆Key Length: Selects the length of each encryption key. The longer the key, the stronger the encryption and the more difficult it is to break the encryption.◆Key: The encryption keys. You enter keys using hexadecimal digits. For 40/64bit encryption, you need ten dig-its; 26 digits for 128bit WEP. Hexadecimal characters are 0 – 9, and a – f. Examples:• 40bit: 02468ACE02• 128bit: 0123456789ABCDEF0123456789Click the click Apply Changes button.
Administrator’s Handbook28Any WEP-enabled client must have an identical key of the same length as the Gateway, in order to successfully receive and decrypt the traffic. Similarly, the client also has a ‘default’ key that it uses to encrypt its transmissions. In order for the Gateway to receive the client’s data, it must likewise have the identical key of the same length.WPA-PSKOne of the easiest ways to enable Privacy on your Wireless network is by selecting WPA-PSK (Wi-Fi Protected Access) from the pull-down menu.◆Enter a Passphrase. The key can be between 8 and 63 characters, but for best security it should be at least 20 characters. ◆You also have the choice of applying Both WPA Version 1 and 2, WPA Version 1 Only, or WPA Version 2 Only from the pull-down menu. These can be applied to each SSID individually.When you have finished, click the Apply Changes button.Wireless Multiple SSIDsThis feature allows you to add additional network identifiers (SSIDs or Network Names) for your wireless network. To enable Multiple SSIDs, click the Multiple SSID link. The Wireless Multiple IDs screen appears to allow you to add up to three additional Wireless IDs.◆When the Multiple Wireless SSIDs screen appears, check the SSID Enable checkbox for each SSID you want to enable.◆The screen allows you to name each additional Wireless ID.When you have finished, click the Apply Changes button.
29Wireless Multi-media ConfigurationWireless Multi-media is an advanced feature that allows you to prioritize various types of data travelling over the wireless network. Certain types of data that are sensitive to delays, such as voice or video, must be prioritized ahead of other, less delay-sensitive types, such as email. Wireless Multi-media currently implements wireless Quality of Service (QoS) by transmitting data depending on Diffserv priority settings. These priorities are mapped into four Access Categories (AC), in increasing order of pri-ority: ◆Background (BK), ◆Best Effort (BE), ◆Video (VI), and ◆Voice (VO). It requires WiFi Multimedia (WMM)-capable clients, usually a separate feature enabled at the client network set-tings, and client PC software that makes use of Differentiated Services (Diffserv). Refer to your operating system instructions for enabling Diffserv QoS.When you click the WiFi Multimedia link the Wireless Multi-media Configuration page appears.Check the Enabled checkbox and click the Apply Changes button.Wireless MAC FilteringWhen you click the MAC Filtering link the Wireless MAC Filtering page appears.MAC Filtering allows you to specify which client PCs are allowed to join the wireless LAN by unique hardware (MAC) address.◆To enable this feature, select either whitelist or blacklist from the MAC Filtering Type pull-down menu.
Administrator’s Handbook30◆You add wireless clients that you want to either authorize or exclude for your wireless LAN by entering the MAC addresses in the MAC Address field provided.Click the Add this MAC button.Your entries will be added to a client MAC Filter List.Click the Apply Changes button.You can Add more entries or Remove any of your entries later by returning to this page.
31NATWhen you click NAT, the NAT Configuration page appears.◆NAT Configuration allows you to host internet applications when NAT is enabled. You can host different games and software on different PCs.◆Pinhole Entry allows you to transparently route selected types of network traffic, such as FTP requests or HTTP (Web) connections, to a specific host behind the Gateway. Creating a pinhole allows access traffic orig-inating from a remote connection (WAN) to be sent to the internal computer (LAN) that is specified in the Pin-hole page.Pinholes are common for applications like multiplayer online games. Refer to software manufacturer applica-tion documentation for specific traffic types and port numbers.◆Determine if any of the service applications that you want to provide on your LAN stations use TCP or UDP protocols. If an application does, then you must configure a pinhole to implement port forwarding.• Protocol: UDP or TCP• External Port Range: This is the range of ports on which you expect incoming traffic to be received.• Internal Address: This is the internal host IP address to which you want the traffic to be directed.• Internal Start Port: This is the port number at the start of the port range that you want your Gateway to use when forwarding traffic of the type(s) you have selected to the internal IP address.
Administrator’s Handbook32The following example shows three pinholes:◆a web server (using TCP on port 80, the standard HTTP protocol web port) on a host at the internal IP address 192.168.1.1◆a mail server (using TCP on port 25, the standard SMTP protocol email port) at the internal IP address 192.168.1.2◆a games server (using UDP on a port range 1100 – 1200) at the internal IP address 192.168.1.3You can edit or delete any of your entries from the Pinhole List by clicking the Edit or Remove icons.You can add more entries to the Pinhole List by clicking the Add this pinhole button.When you are finished, click the Apply Changes button.
33Router PasswordWhen you click Router Password, the Router Password page appears.Here you can change the administrative password that you use when logging onto the Gateway as admin. Pass-words are case sensitive fields, and must be 1 to 32 characters long. Store your password in a safe place. Enter your new password, and confirm it.◆You can choose Unrestricted LAN Access.If you choose Unrestricted LAN Access, any user connected to your network can access and administer the Motorola Netopia® Gateway’s configuration pages.Or,◆For security, you may create and enter an Administrative password for accessing the Motorola Netopia® Gate-way.• The administrative User name is admin.• The Password can be whatever you choose, from one to 32 characters long.You will be challenged for this Admin username and password any time that you attempt to access the Motor-ola Netopia® Gateway’s configuration pages.Click the Apply Changes button.
Administrator’s Handbook34Time ZoneWhen you click the Time Zone link, the Time Zone page appears.You can set your local time zone by selecting your time zone from the pull-down menu. This allows you to set the time zone for general time stamp purposes.Click the Apply Changes button.Changes are saved immediately.
35StatusWhen you click Status in the left hand column of links, the links bar expands.Available Status links vary by platform.DSLWhen you click DSL, the DSL Statistics page appears.The DSL Statistics page displays information about the Gateway's WAN connection to the Internet. ◆Line State: May be Up (connected) or Down (disconnected). ◆Modulation: Method of regulating the DSL signal. DMT (Discrete MultiTone) allows connections to work better when certain radio transmitters are present. ◆Data Path: Type of path used by the device's processor. Downstream and Upstream statistics◆Max Allowed Speed (kbps): Your maximum speeds for downloading (receiving) and uploading (sending) data on the DSL line, in kilobits per second. ◆SN Margin (db): Signal to noise margin, in decibels. Reflects the amount of unwanted “noise” on the DSL line. ◆Line Attenuation: Amount of reduction in signal strength on the DSL line, in decibels. ◆CRC Errors: Number of times data packets have had to be resent due to errors in transmission or reception. WANWhen you click WAN, the WAN Statistics page appears.The WAN Statistics page:◆displays detailed statistics about your WAN data traffic, upstream and downstream.◆displays the Server MAC address for the PPPoE session (if applicable)This information is useful for troubleshooting and when seeking technical support.
Administrator’s Handbook36EthernetWhen you click Ethernet, the Ethernet Statistics page appears.The Ethernet Statistics page:◆displays your Gateway's unique hardware (MAC) address. ◆displays detailed statistics about your LAN data traffic, upstream and downstream.WirelessWhen you click Wireless, the Wireless Statistics page appears.◆Wireless Status: displays the enabled wireless SSIDs and their security (privacy) settings◆Wireless Statistics: displays both bytes and packets received and transmitted.IPWhen you click IP, the IP Statistics page appears. The IP Statistics page displays the IP interfaces and routing table information about your network. General◆IP WAN Address: The public IP address of your Gateway, whether dynamically or statically assigned. ◆IP Gateway: Your ISP's gateway Gateway IP address ◆Primary DNS: The IP address of the Primary Domain Name Server ◆Primary DNS name: The name of the Primary Domain Name Server ◆Secondary DNS: The IP address of the backup Domain Name Server (if any) ◆Secondary DNS name: The name of the backup Domain Name Server IP interfaces◆Address: Your Gateway's IP address as seen from your internal network (LAN), and from the public Internet (WAN) ◆Netmask: The subnet mask for the respective IP interfaces (LAN and WAN) ◆Name: The name of each IP interface (example:Eth0, WAN2) Network Routing Table and Host Routing TableThe Routing tables display all of the IP routes currently known to your GatewayLANWhen you click LAN, the LAN Statistics page appears.The LAN Statistics page displays detailed information about your LAN IP configuration and names and IP addresses of devices on your LAN. ◆Gateway IP Address: The IP address of your Gateway as seen from the LAN ◆DHCP Netmask: Subnet mask of your LAN ◆DHCP Start Address: First IP address in the range being served to your LAN by the Gateway's DHCP server ◆DHCP End Address: Last IP address in the range being served to your LAN by the Gateway's DHCP server ◆DHCP Server Status: May be On or Off ◆DNS Server: The IP address of the default DNS server Devices on LANDisplays the IP Address, MAC (hardware) Address, and network Name for each device on your LAN connected to the Gateway.
37System LogWhen you click System Log, the System Log page appears.The current status of the Gateway is displayed for all logs. ◆You can clear all log entries by clicking the Clear Log button.◆You can save logs to a text (.TXT) file by clicking the Save to File button. This will download the file to your browser’s default download location on your hard drive. The file can be opened with your favorite text editor.☛  Note: Some browsers, such as Internet Explorer for Windows XP, require that you specify the Motorola Netopia® Gateway’s URL as a “Trusted site” in “Internet Options: Security”. This is necessary to allow the “download” of the log text file to the PC.
Administrator’s Handbook38Firewall LogWhen you click Firewall Log, the Firewall Log page appears.The Gateway detects security related events including common types of malicious attacks and writes them to a dedicated Firewall log file. You view this log file from either:◆Motorola Netopia® Web interface ◆Text-based command line interface using telnetThe log provides information useful in identifying a specific type of attack and tracing its origin. The log maintains 100 entries, and requires a manual reset once full. This preserves for troubleshooting purposes the acquired infor-mation about specific attacks, their frequency and tracing information.
39UtilitiesWhen you click the Utilities link, the linksbar expands to display the Gateway’s diagnostic and update utilities.◆“Diagnostics” on page 40◆“Restart Router” on page 42◆“Reset Router” on page 42◆“Update Router” on page 43
Administrator’s Handbook40DiagnosticsWhen you click Diagnostics, the Diagnostics page appears.This automated multi-layer test examines the functionality of the Gateway from the physical connections to the data traffic being sent by users through the Gateway. The Run Full Diagnostics section tests a number of different things at the same time, including the DSL line, the Ethernet interface and the PPPoE session.This sequence of tests takes approximately one minute to generate results. Please wait for the test to run to com-pletion.
41Test Web AccessYou enter a web address URL or an IP address in the Web Address field and click the Test button. Results will be displayed in the Progress Window as they are generated.Example:Each test generates one of the following result codes:Result Meaning* PASS: The test was successful.* FAIL: The test was unsuccessful.* SKIPPED: The test was skipped because a test on which it depended failed.* PENDING: The test timed out without producing a result. Try running Diagnostics again.* WARNING: The test was unsuccessful. The Service Provider equipment your Gateway connects to may not support this test.==== Checking LAN InterfacesCheck Ethernet LAN connect                             : PASS Check IP connect to Ethernet (LAN)                    : PASS  Pinging Gateway                                      : PASS Check MAC-Bridge connect to Ethernet  (LAN)           : PASS==== Checking DSL (WAN) InterfacesCheck DSL Synchronization                              : PASS Check ATM Cell-Delineation                            : PASS  ATM OAM Segment Ping through  (vcc1)                 : WARNING    *** Don't worry, your service provider may not support this test  ATM OAM End-To-End Ping through  (vcc1)              : WARNING    *** Don't worry, your service provider may not support this test  Check Ethernet connect to AAL5  (vcc1)               : PASS   Check PPPOE connect to Ethernet (vcc1)              : PASS    Check PPP connect to PPPOE (vcc1)                  : PASS     Check IP connect to PPP (vcc1)                    : PASS      Pinging Gateway                                  : PASS==== Checking MiscellaneousCheck DNS- Query for netopia.com                       : SKIPPEDPing DNS Server Primary IP Address                     : SKIPPEDTEST DONE
Administrator’s Handbook42Restart RouterWhen the Gateway is restarted, it will disconnect all users, initialize all its interfaces, and copy the Operating Sys-tem Software from its internal storage.When you make configuration changes, you must restart for the changes to take effect.Reset RouterYou might need to reset your Gateway to its factory default state, and clear all of your previous settings. The Reset Router link allows you to do that. When you click the link, you will be challenged to confirm that this is what you want to do.If you want to clear your settings, click the Yes, reset to factory settings button. The Gateway configuration will be reset to the factory default. Any configuration information you have entered will be lost and will have to be re-entered. The Gateway will automatically restart.
43Update RouterWhen you click Update Router, the Software Upgrade page appears.Operating System Software is what makes your Gateway run and occasionally it needs to be updated. Your Cur-rent Software Version is displayed at the top of the page.To update your software from a file on your PC, you must first download the software.1. Click the Click here to download link. You will be taken to the Motorola website for software upgrades.2. If an upgrade exists, download it to your computer.3. Browse your computer for the operating system file you downloaded.4. Click the Update Software from PC button.5. The install may take a few minutes; wait for it to complete.6. Restart your Gateway and your new operating system will be running.
Administrator’s Handbook44HelpClick the Help link in the left-hand column of links to display a page of explanatory information. Help is available for every page in the Web interface.Here is an example:
45CHAPTER 3 Basic TroubleshootingThis section gives some simple suggestions for troubleshooting problems with your Gateway’s initial configura-tion.Before troubleshooting, make sure you have◆read the User Manual;◆plugged in all the necessary cables; and◆set your PC’s TCP/IP controls to obtain an IP address automatically.
Administrator’s Handbook46Status Indicator LightsThe first step in troubleshooting is to check the status indicator lights (LEDs) in the order outlined in the following section.Motorola Netopia® Gateway 2247-N8 status indicator lightsLED BehaviorPower Green when power is on. Red if device malfunctions; flashes red when updating embedded software.Ethernet 1, 2, 3, 4Solid green when connected. Flash green when there is activity on the LAN.Wireless Flashes green when there is activity on the wireless LAN.WPS Solid green when WPS is successful.USB Not currently used.DSL Flashes green when training. Solid green when trained.Internet Green when device is connected. Flashes green for activity on WAN port.Activity Off = The device is not powered or the broadband connection is not present;Flashing green = Inbound Internet activity seen from the broadband connectionPower Ethernet 1, 2, 3, 4Front ViewWirelessInternet DSL WPS USB Activity
47LED Function Summary MatrixIf a status indicator light does not look correct, look for these possible problems:Power DSL InternetUnlit No power No signal Not connectedSolid Green Power on DSL line synched with the DSLAMConnected to the InternetFlashing Green N/A Activity on the DSL cable Transmitting or receiving data on the WAN portSolid Red System malfunction N/A N/AFlashing Red Updating embedded soft-wareN/A N/AEthernet 1, 2, 3, 4  WPS WirelessUnlit No signal No wireless signal No wireless signalSolid Green Synched with Ethernet cardWPS exchange with client is successfulN/AFlashing Green Activity on the Ethernet cableN/A Activity on the wireless LANSolid Red N/A N/A N/AFlashing Red N/A N/A N/AIf LED is not Lit Possible problemsPower◆Make sure the power switch is in the ON position.◆Make sure the power adapter is plugged into the DSL Gateway properly.◆Try a known good wall outlet.◆Replace the power supply and/or unit.DSL◆Make sure that any telephone has a microfilter installed.◆Make sure that you are using the correct cable. The DSL cable is the thinner stan-dard telephone cable.◆Make sure the DSL cable is plugged into the correct wall jack.◆Make sure the DSL cable is plugged into the DSL port on the DSL Gateway.◆Make sure the DSL line has been activated at the central office DSLAM.◆Make sure the DSL Gateway is not plugged into a micro filter.
Administrator’s Handbook48Ethernet◆Make sure the you are using the Ethernet cable, not the DSL cable. The Ethernet cable is thicker than the standard telephone cable.◆Make sure the Ethernet cable is securely plugged into the Ethernet jack on the PC.◆Make sure the Ethernet cable is securely plugged into the Ethernet port on the DSL Gateway.◆Try another Ethernet cable if you have one available.◆Make sure you have Ethernet drivers installed on the PC.◆Make sure the PC’s TCP/IP Properties for the Ethernet Network Control Panel is set to obtain an IP address via DHCP.◆Make sure the PC has obtained an address in the 192.168.1.x range. (You may have changed the subnet addressing.)◆Make sure the PC is configured to access the Internet over a LAN.◆Disable any installed network devices (Ethernet, HomePNA, wireless) that are not being used to connect to the DSL Gateway.
49Factory Reset SwitchLose your password? This section shows how to reset the Motorola Netopia® so that you can access the configu-ration screens once again.☛  NOTE: Keep in mind that all of your settings will need to be reconfigured.If you don't have a password, the only way to access the Motorola Netopia® is the following: 1. Referring to the following diagram, find the round Reset Switch opening. 2. Carefully insert the point of a pen or an unwound paperclip into the opening.• If you press the factory default button for less than 1/2 a second, the unit will continue to run as normal.• If you press the factory default button for 1 – 3 seconds, when you release it, the Gateway will perform a fac-tory reset, clear all settings and configurations, and reboot. Do not hold the button down too long (5 – 10 sec-onds). This will destroy any saved default settings as well.Factory Reset Switch
Administrator’s Handbook50
51CHAPTER 4 Command Line InterfaceThe Motorola Netopia® Gateway operating software includes a command line interface (CLI) that lets you access your Motorola Netopia® Gateway over a telnet connection. You can use the command line interface to enter and update the unit’s configuration settings, monitor its performance, and restart it.This chapter covers the following topics:◆“Overview” on page 52◆“Starting and Ending a CLI Session” on page 54◆“Using the CLI Help Facility” on page 54◆“About SHELL Commands” on page 55◆“SHELL Commands” on page 56◆“About CONFIG Commands” on page 64◆“CONFIG Commands” on page 67CONFIG Commands“Connection commands” on page 67“IP DNS commands” on page 68“IP IGMP commands” on page 69“NTP commands” on page 71“IP Gateway commands” on page 71“Application Layer Gateway (ALG) commands” on page 72“Link commands” on page 72“Management commands” on page 73“Physical interfaces commands” on page 74“PPPoE relay commands” on page 76“NAT Pinhole commands” on page 77“System commands” on page 78
Administrator’s Handbook52OverviewThe CLI has two major command modes: SHELL and CONFIG. Summary tables that list the commands are pro-vided below. Details of the entire command set follow in this section.SHELL CommandsCommand Status and/or Descriptionarp to send ARP requestatmping to send ATM OAM loopbackclear to erase all stored configuration informationclear_certificate to remove an SSL certificate that has been installedclear_log to erase all stored log info in flash memoryconfigure to configure unit's optionsdiagnose to run self-testdownload to download config fileexit to quit this shellhelp to get more: “help all” or “help help”install to download and program an image into flashlog to add a message to the diagnostic logloglevel to report or change diagnostic log levelnetstat to show IP informationnslookup to send DNS query for hostping to send ICMP Echo requestquit to quit this shellreset to reset subsystemsrestart to restart unitshow to show system informationstart to start subsystemstatus to show basic status of unittelnet to telnet to a remote hosttraceroute to send traceroute probesupload to upload config fileview to show configuration informationwho to show who is using the shell
53CONFIG CommandsCommand Verbs Status and/or Descriptiondelete Delete configuration list datahelp Help command optionsave Save configuration data script Print configuration dataset Set configuration datavalidate Validate configuration settingsview View configuration dataKeywordsconn Connection optionsip TCP/IP protocol optionsdns Domain Name System optionsigmp IGMP configuration optionsntp Network Time Protocol optionsgateway Gateway optionslink WAN link optionsmgmt System management optionsphy Physical interface optionsdsl DSL configuration optionsenet Ethernet optionspinhole Pinhole optionssystem Gateway’s system optionslog System activity logging optionsCommand Utilitiestop  Go to top level of configuration modequit Exit from configuration mode; return to shell modeexit Exit from configuration mode; return to shell mode
Administrator’s Handbook54Starting and Ending a CLI SessionOpen a telnet connection from a workstation on your network.You initiate a telnet connection by issuing the following command from an IP host that supports telnet, for exam-ple, a personal computer running a telnet application such as NCSA Telnet.telnet <ip_address>You must know the IP address of the Motorola Netopia® Gateway before you can make a telnet connection to it. By default, your Motorola Netopia® Gateway uses 192.168.1.254 as the IP address for its LAN interface. You can use a Web browser to configure the Motorola Netopia® Gateway IP address.Logging InThe command line interface log-in process emulates the log-in process for a UNIX host. To logon, enter the user-name and your password.Entering the administrator password lets you display and update all Motorola Netopia® Gateway settings. When you have logged in successfully, the command line interface lists the username and the security level asso-ciated with the password you entered in the diagnostic log.Ending a CLI SessionYou end a command line interface session by typing quit from the SHELL node of the command line interface hierarchy.Using the CLI Help FacilityThe help command lets you display on-line help for SHELL and CONFIG commands. To display a list of the com-mands available to you from your current location within the command line interface hierarchy, enter help or type a question mark (?).To obtain help for a specific CLI command, type help <command>. You can truncate the help command to h or a question mark when you request help for a CLI command.
55About SHELL CommandsYou begin in SHELL mode when you start a CLI session. SHELL mode lets you perform the following tasks with your Motorola Netopia® Gateway: ◆Monitor its performance ◆Display and reset Gateway statistics◆Issue administrative commands to restart Motorola Netopia® Gateway functions SHELL PromptWhen you are in SHELL mode, the CLI prompt is the name of the Motorola Netopia® Gateway followed by a right angle bracket (>). For example, if you open a CLI connection to the Motorola Netopia® Gateway named “Netopia-3000/9437188,” you would see Netopia-3000/9437188> as your CLI prompt.SHELL Command ShortcutsYou can truncate most commands in the CLI to their shortest unique string. For example, you can use the trun-cated command q in place of the full quit command to exit the CLI. However, you would need to enter rese for the reset command, since the first characters of reset are common to the restart command.The only commands you cannot truncate are restart and clear. To prevent accidental interruption of communi-cations, you must enter the restart and clear commands in their entirety.You can use the Up and Down arrow keys to scroll backward and forward through recent commands you have entered. Alternatively, you can use the !! command to repeat the last command you entered.
Administrator’s Handbook56SHELL CommandsCommon Commandsarp nnn.nnn.nnn.nnnSends an Address Resolution Protocol (ARP) request to match the nnn.nnn.nnn.nnn IP address to an Ethernet hardware address.clear [ yes ]Clears the configuration settings in a Motorola Netopia® Gateway. You are prompted to confirm the clear com-mand by entering yes.clear_certificateRemoves an SSL certificate that has been installed.configurePuts the command line interface into Configure mode, which lets you configure your Motorola Netopia® Gateway with Config commands. Config commands are described starting on page 67. download [ server_address ] [ filename ] [ confirm ]This command installs a file of configuration parameters into the Motorola Netopia® Gateway from a TFTP (Trivial File Transfer Protocol) server. The TFTP server must be accessible on your Ethernet network.You can include one or more of the following arguments with the download command. If you omit arguments, the console prompts you for this information.◆The server_address argument identifies the IP address of the TFTP server from which you want to copy the Motorola Netopia® Gateway configuration file. ◆The filename argument identifies the path and name of the configuration file on the TFTP server. ◆If you include the optional confirm keyword, the download begins as soon as all information is entered.You can also download an SSL certificate file from a trusted Certification Authority (CA), on platforms that support SSL, as follows:download [-cert] [server_address ] [filename] [confirm]install [ server_address ] [ filename ] [ confirm ]Downloads a new version of the Motorola Netopia® Gateway operating software from a TFTP (Trivial File Transfer Protocol) server, validates the software image, and programs the image into the Motorola Netopia® Gateway memory. After you install new operating software, you must restart the Motorola Netopia® Gateway.The server_address argument identifies the IP address of the TFTP server on which your Motorola Neto-pia® Gateway operating software is stored. The filename argument identifies the path and name of the operat-ing software file on the TFTP server.If you include the optional keyword confirm, you will not be prompted to confirm whether or not you want to per-form the operation.
57log message_stringAdds the message in the message_string argument to the Motorola Netopia® Gateway diagnostic log.loglevel [ level ] Displays or modifies the types of log messages you want the Motorola Netopia® Gateway to record. If you enter the loglevel command without the optional level argument, the command line interface displays the cur-rent log level setting. You can enter the loglevel command with the level argument to specify the types of diagnostic messages you want to record. All messages with a level number equal to or greater than the level you specify are recorded. For example, if you specify loglevel 3, the diagnostic log will retain high-level informational messages (level 3), warnings (level 4), and failure messages (level 5).Use the following values for the level argument:◆1 or low – Low-level informational messages or greater; includes trivial status messages.◆2 or medium – Medium-level informational messages or greater; includes status messages that can help monitor network traffic.◆3 or high – High-level informational messages or greater; includes status messages that may be significant but do not constitute errors.◆4 or warning – Warnings or greater; includes recoverable error conditions and useful operator informa-tion.◆5 or failure – Failures; includes messages describing error conditions that may not be recoverable. netstat -i Displays the IP interfaces for your Motorola Netopia® Gateway.netstat -r Displays the IP routes stored in your Motorola Netopia® Gateway.nslookup [ hostname | ip_address ]Performs a domain name system lookup for a specified host.◆The hostname argument is the name of the host for which you want DNS information; for example, nslookup klaatu.◆The ip_address argument is the IP address, in dotted decimal notation, of the device for which you want DNS information.ping [-s size] [-c count ] [ hostname | ip_address ]Causes the Motorola Netopia® Gateway to issue a series of ICMP Echo requests for the device with the specified name or IP address. ◆The hostname argument is the name of the device you want to ping; for example, ping ftp.motorola.com.◆The ip_address argument is the IP address, in dotted decimal notation, of the device you want to locate. If a host using the specified name or IP address is active, it returns one or more ICMP Echo replies, confirming that it is accessible from your network.◆The -s size argument lets you specify the size of the ICMP packet.◆The -c count argument lets you specify the number of ICMP packets generated for the ping request. Values greater than 250 are truncated to 250.
Administrator’s Handbook58You can use the ping command to determine whether a hostname or IP address is already in use on your net-work. You cannot use the ping command to ping the Motorola Netopia® Gateway’s own IP address.quit Exits the Motorola Netopia® Gateway command line interface.reset arp Clears the Address Resolution Protocol (ARP) cache on your unit.reset crash Clears crash-dump information, which identifies the contents of the Motorola Netopia® Gateway registers at the point of system malfunction.reset dhcp serverClears the DHCP lease table in the Motorola Netopia® Gateway.reset enet [ all ]Resets Ethernet statistics to zero. Resets individual LAN switch port statistics as well as wireless and WAN Ether-net statistics (where applicable).reset firewall-logRewinds the firewall log to the first entry.reset ipmapClears the IPMap table (NAT).reset logRewinds the diagnostic log display to the top of the existing Motorola Netopia® Gateway diagnostic log. The reset log command does not clear the diagnostic log. The next show log command will display information from the beginning of the log file.reset wanThis function resets WAN interface statistics.reset wepkeysThis function allows you to force your wireless WEP key settings back to the default values, if there are default val-ues. For example, on some models, the WEP keys are based on the serial number. This allows you to get back those default settings if you have changed them without the need to reset the entire configuration of the unit.restart [ seconds ]Restarts your Motorola Netopia® Gateway. If you include the optional seconds argument, your Motorola Neto-pia® Gateway will restart when the specified number of seconds have elapsed. You must enter the complete restart command to initiate a restart.
59show all-infoDisplays all settings currently configured in the Motorola Netopia® Gateway.show bridge interfacesDisplays bridge interfaces maintained by the Motorola Netopia® Gateway.show bridge tableDisplays the bridging table maintained by the Motorola Netopia® Gateway.show configDumps the Motorola Netopia® Gateway’s configuration script just as the script command does in config mode.show crashDisplays the most recent crash information, if any, for your Motorola Netopia® Gateway.show daylight-savingsDisplays the auto-daylight savings time settings information.show dhcp agentDisplays DHCP relay-agent leases.show dhcp server leasesDisplays the DHCP leases stored in RAM by your Motorola Netopia® Gateway.show diffservDisplays the Differentiated Services and QoS values configured in the Motorola Netopia® Gateway.show dslf device-associationDisplays LAN devices that conform with the TR111 Gateway requirement. It displays - IP Address, Manufacture OUI and Serial number.show enet [ all ]Displays Ethernet interface statistics maintained by the Motorola Netopia® Gateway. Supports display of individ-ual LAN switch port statistics as well as WAN Ethernet statistics (where applicable).Example:Ethernet driver full statistics - 10/100 EthernetPort Status:  Link upType: 100BASET  Duplex: FullGeneral: Transmit OK           : 434
Administrator’s Handbook60 Receive OK            : 267 Tx Errors             : 0 Rx Errors             : 0Receiver: Incompl Packet Errors : 0 No RBD's For Packet   : 0 Carrier Sense Lost    : 0 Deferred Replen       : 0Transmitter: TX Retries            : 0 Single Collisions     : 0 No Buf For Packet     : 0Upper Layers: Rx No Handler         : 0 Rx No Message         : 0 Rx Octets             : 30773 Rx Unicast Pkts       : 267 Rx Multicast Pkts     : 0 Tx Discards           : 0 Tx Octets             : 31692 10/100 Ethernet phy.enet.portPort Status:  Link upDuplex:  Full-duplex active Speed:  100BASE-T Transmit OK           : 434 Transmit unicastpkts  : NA Receive  OK           : 267 Receive unicastpkts   : 267show group-mgmtDisplays the IGMP Snooping Table. See “IP IGMP commands” on page 69 for detailed explanation.show ip arpDisplays the Ethernet address resolution table stored in your Motorola Netopia® Gateway.show ip igmpDisplays the contents of the IGMP Group Address table and the IGMP Report table maintained by your Motorola Netopia® Gateway.show ip interfacesDisplays the IP interfaces for your Motorola Netopia® Gateway.show ip firewallDisplays firewall statistics.
61show ip lan-discoveryDisplays the LAN Host Discovery Table of hosts on the wired or wireless LAN, and whether or not they are cur-rently online.show ip routesDisplays the IP routes stored in your Motorola Netopia® Gateway.show ipmapDisplays IPMap table (NAT).show logDisplays blocks of information from the Motorola Netopia® Gateway diagnostic log. To see the entire log, you can repeat the show log command or you can enter show log all.show memory [ all ]Displays memory usage information for your Motorola Netopia® Gateway. If you include the optional all argu-ment, your Motorola Netopia® Gateway will display a more detailed set of memory statistics.show pppoeDisplays status information for each PPPoE socket, such as the socket state, service names, and host ID values.show rootcert [ all | supplicant | openssl ]Dumps the Subject line for the list of all the trusted root certificates for the supplicant, which is currently a superset of the OpenSSL trusted root certificates.This syntax is for the 802.1x-supplicant-supported builds only. The openssl trust list is used in all TLS/SSL situa-tions except the 802.1X supplicant.The default, if you don't append a qualifier, is all. all will show both 802.1x supplicant and openssl trust list root certs; supplicant will show the supplicant trust list root certs; openssl will show openssl trust list root certsshow rtspDisplays RTSP ALG session activity data.show statusDisplays the current status of a Motorola Netopia® Gateway, the device's hardware and software revision levels, a summary of errors encountered, and the length of time the Motorola Netopia® Gateway has been running since it was last restarted. Identical to the status command.show summaryDisplays a summary of WAN, LAN, and Gateway information.show vlanDisplays detail of VLAN status and statistics.
Administrator’s Handbook62show wireless [ all ]Shows wireless status and statistics.show wireless clients [ MAC_address ]Displays details on connected clients, or more details on a particular client if the MAC address is added as an argument.telnet [ hostname | ip_address ] [ port ]Lets you open a telnet connection to the specified host through your Motorola Netopia® Gateway.◆The hostname argument is the name of the device to which you want to connect; for example, telnet ftp.netopia.com.◆The ip_address argument is the IP address, in dotted decimal notation, of the device to which you want to connect.◆The port argument is the number of t he port over which you want to open a telnet session.traceroute ( ip_address | hostname )Traces the routing path to an IP destination.upload [ server_address ] [ filename ] [ confirm ]Copies the current configuration settings of the Motorola Netopia® Gateway to a TFTP (Trivial File Transfer Proto-col) server. The TFTP server must be accessible on your Ethernet network. The server_address argument identifies the IP address of the TFTP server on which you want to store the Motorola Netopia® Gateway settings. The filename argument identifies the path and name of the configuration file on the TFTP server. If you include the optional confirm keyword, you will not be prompted to confirm whether or not you want to perform the operation.view configDumps the Motorola Netopia® Gateway’s configuration just as the view command does in config mode.who Displays the names of the current shell and PPP users. WAN Commandsatmping vccn [ segment | end-to-end ]Lets you check the ATM connection reachability and network connectivity. This command sends five Operations, Administration, and Maintenance (OAM) loopback calls to the specified vpi/vci destination. There is a five second total timeout interval.Use the segment argument to ping a neighbor switch.Use the end-to-end argument to ping a remote end node.reset dhcp client release [ vcc-id ]Releases the DHCP lease the Motorola Netopia® Gateway is currently using to acquire the IP settings for the specified DSL port. The vcc-id identifier is an “index” letter in the range B-I, and does not directly map to the
63VCC in use. Enter the reset dhcp client release command without the variable to see the letter assigned to each virtual circuit.reset dhcp client renew [ vcc-id ]Renews the DHCP lease the Motorola Netopia® Gateway is currently using to acquire the IP settings for the spec-ified DSL port. The vcc-id identifier is an “index” letter in the range B-I, and does not directly map to the VCC in use. Enter the reset dhcp client release without the variable to see the letter assigned to each virtual circuit.reset dslResets any open DSL connection.reset ppp vccnResets the point-to-point connection over the specified virtual circuit. This command only applies to virtual circuits that use PPP framing.show atm [all]Displays ATM statistics for the Motorola Netopia® Gateway. The optional all argument displays a more detailed set of ATM statistics.show dsl [ all ]Displays DSL port statistics, such as upstream and downstream connection rates and noise levels. show ppp [{ stats | lcp | ipcp }]Displays information about open PPP links. You can display a subset of the PPP statistics by including an optional stats, lcp, or ipcp argument for the show ppp command.start ppp vccnOpens a PPP link on the specified virtual circuit.
Administrator’s Handbook64About CONFIG CommandsYou reach the configuration mode of the command line interface by typing configure (or any truncation of con-figure, such as con or config) at the CLI SHELL prompt.CONFIG Mode PromptWhen you are in CONFIG mode, the CLI prompt consists of the name of the Motorola Netopia® Gateway followed by your current node in the hierarchy and two right angle brackets (>>). For example, when you enter CONFIG mode (by typing config at the SHELL prompt), the Netopia-3000/9437188 (top)>> prompt reminds you that you are at the top of the CONFIG hierarchy. If you move to the ip node in the CONFIG hierar-chy (by typing ip at the CONFIG prompt), the prompt changes to Netopia-3000/9437188 (ip)>> to identify your current location.Some CLI commands are not available until certain conditions are met. For example, you must enable IP for an interface before you can enter IP settings for that interface.Navigating the CONFIG Hierarchy◆Moving from CONFIG to SHELL — You can navigate from anywhere in the CONFIG hierarchy back to the SHELL level by entering quit at the CONFIG prompt and pressing Return. Netopia-3000/9437188 (top)>> quitNetopia-3000/9437188 >◆Moving from top to a subnode — You can navigate from the top node to a subnode by entering the node name (or the significant letters of the node name) at the CONFIG prompt and pressing RETURN. For example, you move to the IP subnode by entering ip and pressing RETURN.Netopia-3000/9437188 (top)>> ipNetopia-3000/9437188 (ip)>>As a shortcut, you can enter the significant letters of the node name in place of the full node name at the CONFIG prompt. The significant characters of a node name are the letters that uniquely identify the node. For example, since no other CONFIG node starts with b, you could enter one letter (“b”) to move to the bridge node.◆Jumping down several nodes at once — You can jump down several levels in the CONFIG hierarchy by entering the complete path to a node. ◆Moving up one node — You can move up through the CONFIG hierarchy one node at a time by entering the up command. ◆Jumping to the top node — You can jump to the top level from anywhere in the CONFIG hierarchy by enter-ing the top command. ◆Moving from one subnode to another — You can move from one subnode to another by entering a partial path that identifies how far back to climb.◆Moving from any subnode to any other subnode — You can move from any subnode to any other subnode by entering a partial path that starts with a top-level CONFIG command.◆Scrolling backward and forward through recent commands — You can use the Up and Down arrow keys to scroll backward and forward through recent commands you have entered. When the command you want appears, press Enter to execute it.Entering Commands in CONFIG ModeCONFIG commands consist of keywords and arguments. Keywords in a CONFIG command specify the action you want to take or the entity on which you want to act. Arguments in a CONFIG command specify the values appropriate to your site. For example, the CONFIG command
65set ip ethernet A ip_address consists of two keywords (ip, and ethernet A) and one argument (ip_address). When you use the com-mand to configure your Gateway, you would replace the argument with a value appropriate to your site.For example:set ip ethernet A 192.31.222.57Guidelines: CONFIG CommandsThe following table provides guidelines for entering and formatting CONFIG commands.If a command is ambiguous or miskeyed, the CLI prompts you to enter additional information. For example, you must specify which virtual circuit you are configuring when you are setting up a Motorola Netopia® Gateway.Displaying Current Gateway SettingsYou can use the view command to display the current CONFIG settings for your Motorola Netopia® Gateway. If you enter the view command at the top level of the CONFIG hierarchy, the CLI displays the settings for all enabled functions. If you enter the view command at an intermediate node, you see settings for that node and its subnodes.Step Mode: A CLI Configuration TechniqueThe Motorola Netopia® Gateway command line interface includes a step mode to automate the process of enter-ing configuration settings. When you use the CONFIG step mode, the command line interface prompts you for all required and optional information. You can then enter the configuration values appropriate for your site without having to enter complete CLI commands.When you are in step mode, the command line interface prompts you to enter required and optional settings. If a setting has a default value or a current setting, the command line interface displays the default value for the com-mand in parentheses. If a command has a limited number of acceptable values, those values are presented in brackets, with each value separated by a vertical line. For example, the following CLI step command indicates that the default value is off and that valid entries are limited to on and off.Command component Rules for entering CONFIG commandsCommand verbs CONFIG commands must start with a command verb (set, view, delete).You can truncate CONFIG verbs to three characters (set, vie, del).CONFIG verbs are case-insensitive. You can enter “SET,” “Set,” or “set.”Keywords Keywords are case-insensitive. You can enter “Ethernet,” “ETHERNET,” or “ethernet” as a keyword without changing its meaning.Keywords can be abbreviated to the length that they are differentiated from other key-words. Argument Text Text strings can be as many as 64 characters long, unless otherwise specified. In some cases they may be as long as 255 bytes.Special characters are represented using backslash notation.Text strings may be enclosed in double (“) or single (‘) quote marks. If the text string includes an embedded space, it must be enclosed in quotes.Special characters are represented using backslash notation.Numbers Enter numbers as integers, or in hexadecimal, where so noted.IP addresses Enter IP addresses in dotted decimal notation (0 to 255).
Administrator’s Handbook66option (off) [on | off]: onYou can accept the default value for a field by pressing the Return key. To use a different value, enter it and press Return.You can enter the CONFIG step mode by entering set from the top node of the CONFIG hierarchy. You can enter step mode for a particular service by entering set service_name. In stepping set mode (press Control-X <Return/Enter> to exit. For example:Netopia-3000/9437188 (top)>> set system...system   name (“Netopia-3000/9437188”): Mycroft   Diagnostic Level (High): mediumStepping mode ended.Validating Your ConfigurationYou can use the validate CONFIG command to make sure that your configuration settings have been entered correctly. If you use the validate command, the Motorola Netopia® Gateway verifies that all required settings for all services are present and that settings are consistent.Netopia-3000/9437188 (top)>> validateError: Subnet mask is incorrectGlobal Validation did not pass inspection!You can use the validate command to verify your configuration settings at any time. Your Motorola Netopia® Gateway automatically validates your configuration any time you save a modified configuration.
67CONFIG CommandsThis section describes the keywords and arguments for the various CONFIG commands.Connection commandsconns are used to create connections, for example, a WAN or LAN conn. There may be more than one of each depending on your model. names correspond to the system object IDs (OIDs) but you can name them yourself.set conn name name link-oid valueSets the connection named name to point to an associated link specified by the link-oid value.set conn name name type [ static | dhcpc ]Specifies whether the type of the connection named name is static or dhcpc.set conn name name side [ lan | wan ]Specifies whether this conn is LAN- or WAN-side. A conn can be either lan or wan.set conn name name dhcp-server-enable [ on | off ]Turns the DHCP server for this connection on or off. The DHCP server can be enabled per connection. The default is on.set conn name name mcast-forwarding [ off | on ]Turns IP IGMP multicast forwarding for this connection off or on. The default is off.set conn name name static ipaddr ipaddrSpecifies a static IP address when the connection type has been set to static. The default is 192.168.1.254set conn name name static netmask netmaskSpecifies a static netmask when the connection type has been set to static. The default is 255.255.255.0.set conn name name dhcp-server start-addr ipaddrIf dhcp-server-enable is set to on, specifies the first address in the DHCP address range. The Motorola Netopia® Gateway can reserve a sequence of up to 253 IP addresses within a subnet, beginning with the specified address for dynamic assignment. The default is 192.168.1.200set conn name name dhcp-server end-addr ipaddrIf dhcp-server-enable is set to on, specifies the last address in the DHCP address range. The default is 192.168.1.240set conn name name dhcp-server lease-time secondsIf dhcp-server-enable is set to on, specifies the default length for DHCP leases issued by the Motorola Netopia® Gateway. Lease time is in seconds. Default is 3600.
Administrator’s Handbook68set conn name name nat-enable [ on | off ]Specifies whether you want the Motorola Netopia® Gateway to use network address translation (NAT) when com-municating with remote Gateways. NAT lets you conceal details of your network from remote Gateways. It also permits all LAN devices to share a single IP address. By default, address NAT is turned on.set conn name name dhcp-client discover-time secondsThe DHCP client parameters appear when the connection type has been set to dhcpc. discover-time is in sec-onds; the default is 30.set conn name name dhcp-client dns-enable [ on | off ]This allows you to enable or disable the default behavior of acting as a DNS proxy. The default is on.set conn name name dhcp-client dns-override [ off | on ]This allows you to enable or disable overriding default DNS behavior. The default is off.set conn name name dhcp-client vendor-class stringThe vendor-class default information varies by model and components. This is information that identifies the unit.IP DNS commandsset ip dns domain-name domain_nameSpecifies the default domain name for your network. When an application needs to resolve a host name, it appends the default domain name to the host name and asks the DNS server if it has an address for the “fully qualified host name.” set ip dns primary-address ip_addressSpecifies the IP address of the primary DNS name server. set ip dns secondary-address ip_addressSpecifies the IP address of the secondary DNS name server. Enter 0.0.0.0 if your network does not have a sec-ondary DNS name server.set ip dns proxy-enable [ on | off ]This allows you to disable the default behavior of acting as a DNS proxy. The default is on.
69IP IGMP commandsMulticasting is a method for transmitting large amounts of information to many, but not all, computers over an internet. One common use is to distribute real time voice, video, and data services to the set of computers which have joined a distributed conference. Other uses include updating the address books of mobile computer users in the field, or sending out company newsletters to a distribution list.Since a router should not be used as a passive forwarding device, Motorola Netopia® Gateways use a protocol for forwarding multicasting: Internet Group Management Protocol (IGMP).Motorola Netopia® Gateways support IGMP Version 1, Version 2, or Version 3.IGMP “Snooping” is a feature of Ethernet layer 2 switches that “listens in” on the IGMP conversation between computers and multicast routers. Through this process, it builds a database of where the multicast routers reside by noting IGMP general queries used in the querier selection process and by listening to other router protocols.From the host point of view, the snooping function listens at a port level for an IGMP report. The switch then pro-cesses the IGMP report and starts forwarding the relevant multicast stream onto the host's port. When the switch receives an IGMP leave message, it processes the leave message, and if appropriate stops the multicast stream to that particular port. Basically, customer IGMP messages although processed by the switch are also sent to the multicast routers.In order for IGMP snooping to function with IGMP Version 3, it must always track the full source filter state of each host on each group, as was previously done with Version 2 only when Fast Leave support was enabled.IGMP Version 3 supports:IGMP Source Filtering: the ability for group memberships to incorporate source address filtering. This allows “Source-Specific Multicast” (SSM). By adding source filtering, a Gateway that proxies IGMP can more selectively join the specific multicast group for which there are interested LAN multicast receivers.These features require no user configuration on the Gateway.You can set the following options:◆IGMP Snooping – enables the Motorola Netopia® Gateway to “listen in” to IGMP traffic. The Gateway discov-ers multicast group membership for the purpose of restricting multicast transmissions to only those ports which have requested them. This helps to reduce overall network traffic from streaming media and other bandwidth-intensive IP multicast applications.◆Robustness – a way of indicating how sensitive to lost packets the network is. IGMP can recover from robust-ness minus 1 lost IGMP packet. The default value is 2.◆Query Interval– the amount of time in seconds between IGMP General Query messages sent by the querier gateway. The default query interval is 125 seconds. ◆Query Response Interval – the maximum amount of time in tenths of a second that the IGMP Gateway waits to receive a response to a General Query message. The default query response interval is 10 seconds and must be less than the query interval.◆Unsolicited Report Interval – the amount of time in seconds between repetitions of a particular computer’s initial report of membership in a group. The default unsolicited report interval is 10 seconds.◆Querier Version – select a version of the IGMP Querier: version 1, version 2, or version 3. If you know you will be communicating with other hosts that are limited to v1 or v2, for backward compatibility, select accordingly; otherwise, allow the default v3.☛  NOTE:IGMP Querier version is relevant only if the Gateway is configured for IGMP forwarding. If any IGMP v1 routers are present on the subnet, the querier must use IGMP v1. The use of IGMP v1 must be administratively configured, since there is no reliable way of dynamically determining whether IGMP
Administrator’s Handbook70v1 routers are present on a network. IGMP forwarding is enabled per IP Profile and WAN Connec-tion Profile.◆Last Member Query Interval – the amount of time in tenths of a second that the IGMP gateway waits to receive a response to a Group-Specific Query message. The last member query interval is also the amount of time in seconds between successive Group-Specific Query messages. The default last member query interval is 1 second (10 deci-seconds).◆Last Member Query Count – the number of Group-Specific Query messages sent before the gateway assumes that there are no members of the host group being queried on this interface. The default last member query count is 2.◆Fast Leave – set to off by default, fast leave enables a non-standard expedited leave mechanism. The querier keeps track of which client is requesting which channel by IP address. When a leave message is received, the querier can check its internal table to see if there are any more clients on this group. If there are none, it imme-diately sends an IGMP leave message to the upstream querier.◆Log Enable – If set to on, all IGMP messages on both the LAN and the WAN will be logged.◆Wireless Multicast to Unicast conversion – Only available if IGMP Snooping is enabled. If set to on, the Gateway replaces the multicast MAC-address with the physical MAC-address of the wireless client. If there is more than one wireless client interested in the same multicast group, the Gateway will revert to multicasting the stream immediately. When one or more wireless clients leave a group, and the Gateway determines that only a single wireless client is interested in the stream, it will once again unicast the stream.set ip igmp querier-version [ 1 | 2 | 3 ]Sets the IGMP querier version: version 1, version 2, or version 3. If you know you will be communicating with other hosts that are limited to v1, for backward compatibility, select 1; otherwise, allow the default 3.set ip igmp robustness valueSets IGMP robustness range: from 2 – 255. The default is 2.set ip igmp query-interval valueSets the query-interval range: from 10 seconds – 600 seconds, The default is 125 seconds.set ip igmp query-response-interval valueSets the query-response interval range: from 5 deci-seconds (tenths of a second) – 255 deci-seconds. The default is 100 deci-seconds.set ip igmp unsolicited-report-interval valueSets the unsolicited report interval: the amount of time in seconds between repetitions of a particular computer’s initial report of membership in a group. The default is 10 seconds.set ip igmp last-member-interval valueSets the last member query interval: the amount of time in tenths of a second that the IGMP gateway waits to receive a response to a Group-Specific Query message. The last member query interval is also the amount of time in seconds between successive Group-Specific Query messages. The default is 1 second (10 deci-seconds).set ip igmp last-member-count valueSets the last member query count: the number of Group-Specific Query messages sent before the gateway assumes that there are no members of the host group being queried on this interface. The default is 2.
71set ip igmp snoop-entry-time secondsThe snoop-entry-time is the amount of time an entry will remain in the snooping table (in seconds) after being added.  An entry is added when a "JOIN" is seen from a multicast client.  Any new joins (triggered by upstream queries) will reset the timeout back to seconds.  If no additional joins are seen, the entry will expire after seconds. Default is 130.set ip igmp snooping-unreg-mode [ block | flood ]The snooping-unreg-mode can be set to block or flood. This indicates what should happen to unregistered mul-ticast traffic – traffic that hasn't been subscribed to by any clients. If set to flood, the traffic will be sent to all LAN ports. If set to block, the traffic will not be sent to any LAN ports; it will be dropped. Default is block.NTP commandsset ip ntp enable [ on | off ]Enables or disables acquiring the time of day from an NTP (Network Time Protocol) server.set ip ntp server-address server_addressset ip ntp alt-server-address alt_server_addressSpecify the NTP server(s) to use for time updates. The NTP server-address and alt-server-address can be entered as DNS names as well as IP addresses.set ip ntp update-period minutesupdate-period specifies how often, in minutes, the Gateway should update the clock. Default is 60.IP Gateway commandsset ip gateway enable [ on | off ]Specifies the conn of the gateway. Normally, this would be the WAN connection.set ip gateway conn-oid 2set ip gateway address "0.0.0.0"
Administrator’s Handbook72Application Layer Gateway (ALG) commandsThese commands allow you to enable or disable the router’s support for a variety of Application Layer Gateways (ALGs). An application layer gateway (ALG) is a NAT component that helps certain application sessions to pass cleanly through NAT. Each ALG has a slightly different function based on the particular application’s protocol-spe-cific requirements.An internal client first establishes a connection with the ALG. The ALG determines if the connection should be allowed or not and then establishes a connection with the destination computer. All communications go through two connections – client to ALG and ALG to destination. The ALG monitors all traffic against its rules before decid-ing whether or not to forward it. The ALG is the only address seen by the public Internet so the internal network is concealed. In some situations, it may be desirable to disable some of the ALGs.set ip alg ftp [ on | off ]Turns the FTP (File Transfer Protocol) ALG for file transfers on or off. Default is on.set ip alg h323 [ on | off ]Turns the H323 ALG for audio, video, and data communications across IP-based networks on or off. Default is on.set ip alg pptp [ on | off ]Turns the PPTP (Point-to-Point Transfer Protocol) ALG for authentication on or off. Default is on.set ip alg sip [ on | off ]Turns the SIP (Session Initiation Protocol) ALG for voice communication initiation on or off. Default is on.set ip alg tftp [ on | off ]Turns the TFTP (Trivial File Transfer Protocol) ALG for simple file transfers and firmware updates on or off. Default is on.Link commandslinks represent physical connections. Currently, port-based VLAN support is provided at this level.set link name name type [ ethernet... ]Specifies whether the type of the link named name is ethernet or some other.(ethernet is the only type currently. Subsequent releases will support various PPP cases.)set link name name igmp-snooping [ off | on ]Turns igmp-snooping off or on on the link named name.set link name name port-vlan ports [ lan | ptm | vc-1 | vc-2 ]Specifies a port-based VLAN on the selected ports on the link named name.set link name name port-vlan priority [ 0 - 7 ]Specifies the 802.1p priority bit. If you set this to a value greater than 0, all packets of this VLAN with unmarked priority bits (pbits) will be re-marked to this priority.
73Management commandsAll management related items are grouped in this section.set management account administrator username usernameSpecifies the username for the administrative user – the default is admin.set management account user username usernameSpecifies the username for the non-administrative user – the default is user.set management cwmp enable [ off | on ]Turns cwmp (TR-069 CPE WAN Management Protocol) on or off. TR-069 allows a remote Auto-Config Server (ACS) to provision and manage the Motorola Netopia® Gateway. TR-069 protects sensitive data on the Gateway by not advertising its presence, and by password protection.set management cwmp acs-url acs_url:port_numberset management cwmp acs-username acs_usernameset management cwmpacs-password acs_passwordIf TR-069 WAN side management services are enabled, specifies the auto-config server URL and port number. A username and password must also be supplied, if TR-069 is enabled.The auto-config server is specified by URL and port number. The format for the ACS URL is as follows:http://some_url.com:port_numberorhttp://123.45.678.910:port_numberOn units that support SSL, the format for the ACS URL can also be:https://some_url.com:port_numberorhttps://123.45.678.910:port_numberset management shell idle-timeout [ 1...120 ]Specifies a timeout period of inactivity for telnet access to the Gateway, after which a user must re-login to the Gateway. Default is 15 minutes for telnet.set management shell telnet-port [ 1 - 65534 ]Specifies the port number for telnet (CLI) communication with the Motorola Netopia® Gateway. Because port numbers in the range 0-1024 are used by other protocols, you should use numbers in the range 1025-65534 when assigning new port numbers to the Motorola Netopia® Gateway telnet configuration interface. A setting of 0 (zero) will turn the server off.
Administrator’s Handbook74set management web http-port [ 1 - 65534 ]Specifies the port number for HTTP (web) communication with the Motorola Netopia® Gateway. Because port numbers in the range 0-1024 are used by other protocols, you should use numbers in the range 1025-65534 when assigning new port numbers to the Motorola Netopia® Gateway web configuration interface. A setting of 0 (zero) will turn the server off.set management web idle-timeout [ 1...120 ]Specifies a timeout period of inactivity for HTTP access to the Gateway, after which a user must re-login to the Gateway. Default is 5 minutes for HTTP.☛  NOTE:You cannot specify a port setting of 0 (zero) for both the web and telnet ports at the same time. This would prevent you from accessing the Gateway.Physical interfaces commandsset physical dsl enable [ off | on ]Turns the physical DSL interface off or on. Default is on.set physical dsl loopback [ off | on ]Turns the DSL loopback mode off or on. Default is off.set physical dsl modulation auto [ off | on ]Turns automatic DSL modulation off or on. Default is on.set physical dsl profile-8a [ off | on ]Default is on.set physical dsl profile-8b [ off | on ]Default is on.set physical dsl profile-8c [ off | on ]Default is on.set physical dsl profile-8d [ off | on ]Default is on.set physical dsl profile-12a [ off | on ]Default is on.
75set physical dsl profile-12b [ off | on ]Default is on.set physical dsl profile-17a [ off | on ]Default is on.set physical dsl profile-30a [ off | on ]Default is off.set physical dsl us0 [ off | on ]Default is on.set physical dsl transport [ atm | ptm | auto | off ]Sets the DSL transport mode: Asynchronous (atm), Packet (ptm), Automatic (auto), or none (off). Default is auto.set physical dsl atm vcc 1 enable [ off | on ]Turns atm on or off on vcc 1. Default is on.set physical dsl atm vcc 1 aal-type [ aal5 | aal0pkt | aal0cell ]Sets the ATM Adaptation Layer type (aal-type): AAL5, AAL0-packet, or AAL0-cell. Default is aal5.set physical dsl atm vcc 1 datapath [ phy0fast | phy0interleaved ]Sets the ATM datapath, Fast Path or Interleaved. Default is phy0fast.set physical dsl atm vcc 1 encap-type [ llcsnap-eth | llcsnap-rtip | llcencaps-ppp | vcmux-eth | vcmux-ipoa | vcmux-pppoa ]Specifies the data link encapsulation type. Default is llcsnap-eth.set physical dsl atm vcc 1 vpi [ 0 - 255 ]Sets the Virtual Path Identifier (vpi) for the circuit. Default is 0.set physical dsl atm vcc 1 vci [ 32 - 65535 ]Sets the Virtual Channel Identifier (vci) for the circuit. Default is 35.set physical dsl atm vcc 2 enable [ off | on ]Turns atm on or off on vcc 2. Default is on.set physical dsl atm vcc 2 aal-type [ aal5 | aal0pkt | aal0cell ]Sets the ATM Adaptation Layer type (aal-type): AAL5, AAL0-packet, or AAL0-cell. Default is aal5.
Administrator’s Handbook76set physical dsl atm vcc 2 datapath [ phy0fast | phy0interleaved ]Sets the ATM datapath, Fast Path or Interleaved. Default is phy0fast.set physical dsl atm vcc 2 encap-type [ llcsnap-eth | llcsnap-rtip | llcencaps-ppp | vcmux-eth | vcmux-ipoa | vcmux-pppoa ]Specifies the data link encapsulation type. Default is llcsnap-eth.set physical dsl atm vcc 2 vpi [ 0 - 255 ]Sets the Virtual Path Identifier (vpi) for the circuit. Default is 8.set physical dsl atm vcc 2 vci [ 32 - 65535 ]Sets the Virtual Channel Identifier (vci) for the circuit. Default is 35.set physical dsl ptm datapath [ phy0fast | phy0interleaved ]Sets the ATM datapath, Fast Path or Interleaved. Default is phy0fast.set physical dsl ptm priority [ low | high ]Sets the Packet Transfer Mode (ptm) priority. Default is low.set physical enet 1 mac-addr-override mac_addrYou can override your Gateway’s Ethernet MAC address with any necessary setting. Some ISPs require your account to be identified by the MAC address, among other things. Enter your 12-character Ethernet MAC override address as instructed by your service provider, for example: 12 34 AB CD 19 64set physical enet 1 port media [ auto | 100-fd | 100-hd | 10-fd | 10-hd ]Sets the Ethernet port’s media flow control: Automatic, 100 Mbps Full-Duplex, 100 Mbps Half-Duplex, 10 Mbps Full-Duplex, or 10 Mbps Half-Duplex. Default is auto.set physical enet 1 port mdix [ auto | on | off ]Sets the Ethernet port’s crossover detection. Default is off.PPPoE relay commandsset pppoe-relay enable [ on | off ]Allows the Gateway to forward PPPoE packets. Default is on.set pppoe-relay max-sessions [ 0... 4 ]Specifies the maximum number of PPPoE relay sessions. Default is 4.
77NAT Pinhole commandsNAT pinholes let you pass specific types of network traffic through the NAT interfaces on the Motorola Netopia® Gateway. NAT pinholes allow you to route selected types of network traffic, such as FTP requests or HTTP (Web) connections, to a specific host behind the Motorola Netopia® Gateway transparently.To set up NAT pinholes, you identify the type(s) of traffic you want to redirect by port number, and you specify the internal host to which each specified type of traffic should be directed.The following list identifies protocol type and port number for common TCP/IP protocols:◆FTP (TCP 21)◆telnet (TCP 23)◆SMTP (TCP 25),◆TFTP (UDP 69)set pinhole name name protocol [ tcp | udp ]Specifies the identifier for the entry in the Gateway's pinhole table. You can name pinhole table entries sequen-tially (1, 2, 3), by port number (21, 80, 23), by protocol, or by some other naming scheme. Specifies the type of protocol being redirected.set pinhole name name ext-port-range [ 0 - 49151 ]Specifies the first and last port number in the range being translated.set pinhole name name int-addr ipaddrSpecifies the IP address of the internal host to which traffic of the specified type should be transferred.set pinhole name name int-start-port [ 0 - 65535 ]Specifies the port number your Motorola Netopia® Gateway should use when forwarding traffic of the specified type. Under most circumstances, you would use the same number for the external and internal port.
Administrator’s Handbook78System commandsset system name nameSpecifies the name of your Motorola Netopia® Gateway. Each Motorola Netopia® Gateway is assigned a name as part of its factory initialization. The default name for a Motorola Netopia® Gateway consists of the word “Neto-pia-7000/XXX” where “XXX” is the serial number of the device; for example, Netopia-7000/9437188. A system name can be 1 – 255 characters long. Once you have assigned a name to your Motorola Netopia® Gateway, you can enter that name in the Address text field of your browser to open a connection to your Motorola Netopia® Gateway.☛  NOTE:Some broadband cable-oriented Service Providers use the System Name as an important identifi-cation and support parameter. If your Gateway is part of this type of network, do NOT alter the Sys-tem Name unless specifically instructed by your Service Provider.set system time-zone [ UTC | HST10 | AKST9AKDT | YST8 | PST8PDT |      MST7MDT | MST7 | CST6CDT | CST6 | EST5EDT | AST4ADT | NST3:30NDT ]time-zone of 0 is Coordinated Universal Time (UTC); options are -12 through 12 (+/- 1 hour increments from UTC time). set system auto-daylight-savings [ on | off ]Time zones honoring Daylight Saving Time may be automatically designated.set system firewall-log enable [ on | off ]Turns firewall logging on or off. The firewall log tracks attempted violations of the firewall rules. Default is on.set system firewall-log file-size [ 4096... 65536 ]Specifies a size for the firewall logs. The most recent entries are posted to the beginning of the log. When the log becomes full, the oldest entries are dropped. The default is 16384.set system firewall-log file-count [ 2... 8 ]Specifies the number of possible log files. The default is 4.set system log buffer-size [ 4096... 65536 ]Specifies a size for the system log. The most recent entries are posted to the beginning of the log. When the log becomes full, the oldest entries are dropped. The default is 16384.set system log level [ low | medium | high | alerts | failures ]Specifies the types of log messages you want the Motorola Netopia® Gateway to record. All messages with a level equal to or greater than the level you specify are recorded. For example, if you specify set system diagnos-tic-level medium, the diagnostic log will retain medium-level informational messages, alerts, and failure mes-sages.Use the following guidelines:◆low - Low-level informational messages or greater; includes trivial status messages.
79◆medium - Medium-level informational messages or greater; includes status messages that can help monitor network traffic.◆high - High-level informational messages or greater; includes status messages that may be significant but do not constitute errors. The default.◆alerts - Warnings or greater; includes recoverable error conditions and useful operator information.◆failures - Failures; includes messages describing error conditions that may not be recoverable.
Administrator’s Handbook80
81CHAPTER 5 Technical Specifications and Safety InformationDescriptionCommunications interfaces: The Motorola Nteopia® Gateways have an RJ-11 jack for DSL line connections or an RJ-45 jack for cable/DSL modem connections and 1 or 4–port 10/100Base-T Ethernet switch for your LAN connections..Some models contain an 802.11b/g/n wireless LAN transmitter.Power requirements12V,1.5AEnvironmentOperating temperature: 0° to +40° CStorage temperature: 0° to +70° CRelative storage humidity: 20 to 80% noncondensingSoftware and protocolsSoftware media: Software preloaded on internal flash memory; field upgrades done via download to internal flash memory via TFTP or web upload. Routing: TCP/IP Internet Protocol Suite, RIPWAN support: PPPoE, DHCP, static IP addressSecurity: PAP, CHAP, UI password security, IPsec, Secure Sockets Layer (SSL) certificate (supported models)Management/configuration methods:  HTTP (Web server), Telnet, SNMP, TR-069 DSL Forum CPE WAN Management ProtocolDiagnostics: Ping, event logging, routing table displays, statistics counters, web-based management, tracer-oute, nslookup, and diagnostic commands.
Administrator’s Handbook82Agency approvalsNorth AmericaSafety Approvals:United States – UL 60950, Third Edition◆Canada – CSA: CAN/CSA-C22.2 No. 60950-00◆EMC:◆United States – FCC Part 15 Class B◆Canada – ICES-003Telecom:◆United States – 47 CFR Part 68◆Canada – CS-03InternationalSafety Approvals:◆Low Voltage (European directive) 73/23◆EN 60950-1 (Europe) EMI Compatibility:◆89/336/EEC (European directive)◆EN55022:1994    CISPR22 Class B◆EN300 386 V1.2.1 (non-wireless products)◆EN 301-489 (wireless products)Regulatory noticesEuropean Community. This Motorola product conforms to the European Community CE Mark standard for the design and manufacturing of information technology equipment. This standard covers a broad area of product design, including RF emissions and immunity from electrical disturbances.The Motorola Netopia® Gateway complies with the following EU directives:◆Low Voltage, 73/23/EEC◆EMC Compatibility, 89/336/EEC, conforming to EN 55 022This Motorola product is in conformity with the essential requirements and other relevant requirements of the Radio Equipment and Telecommunications Terminal Equipment Directive (R&TTE) 1999/5/EC, following the provision of the Electromagnetic Compatibility Directive (EMC) No. 89/336/EEC and Low Voltage Directive (LVD) No. 73/23/EEC.The product is compliant with the following standards and other normative documents:LEMC – Emissions and Immunity: EN 301 489-1 V1.2.1 (2002-08), EN 301 489-17 (2002-08), EN 55022 Class B (1998)EMC – Radio Data Transmission: EN 300 328 V1.4.1 (2003-04) EMC - Resistibility: ITU-T K.21 (1996)LVD - Safety: EN 60950 (2000) + A1 + A2 + A3 + A4 + A11
83Manufacturer’s Declaration of Conformance☛  Warnings:This is a Class B product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures. Adequate measures include increasing the physical distance between this product and other electrical devices.Changes or modifications to this unit not expressly approved by the party responsible for compli-ance could void the user’s authority to operate the equipment.United States. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio commu-nications. However, there is no guarantee that interference will not occur in a particular installation. If this equip-ment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:◆Reorient or relocate the receiving antenna.◆Increase the separation between the equipment and receiver.◆Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.◆Consult the dealer or an experienced radio TV technician for help.Service requirements. In the event of equipment malfunction, if under warranty we will exchange a product deemed defective.Under FCC rules, no customer is authorized to repair this equipment. This restriction applies regardless of whether the equipment is in or our of warranty. It is the responsibility of users requiring service to report the need for service to our Company or to one of our authorized agents.Contact Us for USTechnical Support for Hardware Products1-877-466-8646http://broadband.motorola.com/consumers/support/default.asp?supportSection=blank☛  ImportantThis product was tested for FCC compliance under conditions that included the use of shielded cables and connectors between system components. Changes or modifications to this product not authorized by the manufacturer could void your authority to operate the equipment.Canada. This Class B digital apparatus meets all requirements of the Canadian Interference -Causing Equip-ment Regulations.Cet appareil numérique de la classe B respecte toutes les exigences du Réglement sur le matériel brouilleur du Canada.
Administrator’s Handbook84Declaration for Canadian usersNOTICE: The Canadian Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Department does not guarantee the equipment will operate to the user’s satisfac-tion.Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company’s inside wiring associated with a sin-gle line individual service may be extended by means of a certified connector assembly (telephone extension cord). The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.Repairs to the certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equip-ment malfunctions, may give the telecommunications company cause to request the user to discon-nect the equipment.Users should ensure for their own protection that the electrical ground connections of the power util-ity, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.CautionUsers should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may con-sist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Num-bers of all the devices does not exceed 5.
85Important Safety InstructionsAustralian Safety InformationThe following safety information is provided in conformance with Australian safety requirements:CautionDO NOT USE BEFORE READING THE INSTRUCTIONS: Do not connect the Ethernet ports to a carrier or car-riage service provider’s telecommunications network or facility unless: a) you have the written consent of the net-work or facility manager, or b) the connection is in accordance with a connection permit or connection rules.Connection of the Ethernet ports may cause a hazard or damage to the telecommunication network or facility, or persons, with consequential liability for substantial compensation.Caution◆The direct plug-in power supply serves as the main power disconnect; locate the direct plug-in power supply near the product for easy access.◆For use only with CSA Certified Class 2 power supply, rated 12VDC.Telecommunication installation cautions◆Never install telephone wiring during a lightning storm.◆Never install telephone jacks in wet locations unless the jack is specifically designed for wet locations.◆Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface.◆Use caution when installing or modifying telephone lines.◆Avoid using a telephone (other than a cordless type) during an electrical storm. There may be a remote risk of electric shock from lightning.◆Do not use the telephone to report a gas leak in the vicinity of the leak.
Administrator’s Handbook8647 CFR Part 68 InformationFCC Requirements1. The Federal Communications Commission (FCC) has established Rules which permit this device to be directly connected to the telephone network. Standardized jacks are used for these connections. This equipment should not be used on party lines or coin phones.2. If this device is malfunctioning, it may also be causing harm to the telephone network; this device should be disconnected until the source of the problem can be determined and until repair has been made. If this is not done, the telephone company may temporarily disconnect service.3. The telephone company may make changes in its technical operations and procedures; if such changes affect the compatibility or use of this device, the telephone company is required to give adequate notice of the changes. You will be advised of your right to file a complaint with the FCC.4. If the telephone company requests information on what equipment is connected to their lines, inform them of:a. The telephone number to which this unit is connected.b. The ringer equivalence number. [0.XB]c. The USOC jack required. [RJ11C]d. The FCC Registration Number. [XXXUSA-XXXXX-XX-E]Items (b) and (d) are indicated on the label. The Ringer Equivalence Number (REN) is used to determine how many devices can be connected to your telephone line. In most areas, the sum of the REN's of all devices on any one line should not exceed five (5.0). If too many devices are attached, they may not ring properly.FCC Statementsa) This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA. On the bot-tom of this equipment is a label that contains, among other information, a product identifier in the format US:AAAEQ##TXXXX. If requested, this number must be provided to the telephone company.b) List all applicable certification jack Universal Service Order Codes (“USOC”) for the equipment: RJ11.c) A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modu-lar plug is provided with this product. It is designed to be connected to a compatible modular jack that is also com-pliant. See installation instructions for details.d) The REN is used to determine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be con-nected to a line, as determined by the total RENs, contact the local telephone company. For products approved after July 23, 2002, the REN for this product is part of the product identifier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). For earlier products, the REN is separately shown on the label.e) If this equipment, the Motorola Netopia® Modem or Gateway, causes harm to the telephone network, the tele-phone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isn’t practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary.f) The telephone company may make changes in its facilities, equipment, operations or procedures that could affect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service.g) If trouble is experienced with this equipment, the Motorola Netopia® Gateway, for warranty information, please contact:Technical Support for Hardware Products1-877-466-8646http://broadband.motorola.com/consumers/support/default.asp?supportSection=blank
87If the equipment is causing harm to the telephone network, the telephone company may request that you discon-nect the equipment until the problem is resolved.h) This equipment not intended to be repaired by the end user. In case of any problems, please refer to the trou-bleshooting section of the Product User Manual before calling Motorola Technical Support.i) Connection to party line service is subject to state tariffs. Contact the state public utility commission, public ser-vice commission or corporation commission for information.j) If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this Motorola Netopia® Gateway does not disable your alarm equipment. If you have questions about what will disable alarm equipment, consult your telephone company or qualified installer.RF Exposure Statement:NOTE: Installation of the wireless models must maintain at least 20 cm between the wireless Gateway and any body part of the user to be in compliance with FCC RF exposure guidelines.PRODUCT VENTILATIONThe Motorola Netopia® Gateway is intended for use in a consumer's home. Ambient temperatures around this product should not exceed 104°F (40°C).  It should not be used in locations exposed to outside heat radiation or trapping of its own heat. The product should have at least one inch of clearance on all sides except the bottom when properly installed and should not be placed inside tightly enclosed spaces unless proper ventilation is pro-vided.Electrical Safety AdvisoryTelephone companies report that electrical surges, typically lightning transients, are very destructive to customer terminal equipment connected to AC power sources. This has been identified as a major nationwide problem. Therefore it is advised that this equipment be connected to AC power through the use of a surge arrestor or similar protection device.
Administrator’s Handbook88Warranty InformationSoftware License, Limited Warranty and Limitation of RemediesMotorola, Inc., Broadband Communications Sector (“Motorola”)101 Tournament Drive, Horsham, PA 19044IMPORTANT: PLEASE READ THIS SOFTWARE LICENSE (“LICENSE”) CAREFULLY BEFORE YOU INSTALL, DOWNLOAD OR USE ANY APPLICATION SOFTWARE, USB DRIVER SOFTWARE, FIRMWARE AND RELATED DOCUMENTATION (“SOFTWARE”) PROVIDED WITH MOTOROLA’S DATA PRODUCT (THE “PRODUCT”). BY USING THE PRODUCT AND/OR INSTALLING, DOWNLOADING OR USING ANY OF THE SOFTWARE, YOU INDICATE YOUR ACCEPTANCE OF EACH OF THE TERMS OF THIS LICENSE. UPON ACCEPTANCE, THIS LICENSE WILL BE A LEGALLY BINDING AGREEMENT BETWEEN YOU AND MOTOR-OLA. THE TERMS OF THIS LICENSE APPLY TO YOU AND TO ANY SUBSEQUENT USER OF THIS SOFT-WARE.IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS LICENSE (I) DO NOT INSTALL OR USE THE SOFT-WARE AND (II) RETURN THE PRODUCT AND THE SOFTWARE (COLLECTIVELY, “PRODUCT”), INCLUDING ALL COMPONENTS, DOCUMENTATION AND ANY OTHER MATERIALS PROVIDED WITH THE PRODUCT, TO YOUR SERVICE PROVIDER.The Software includes associated media, any printed materials, and any “on-line” or electronic documentation. Software provided by third parties may be subject to separate end-user license agreements from the manufactur-ers of such Software. This License shall also apply to any updates, bug fixes, or newer versions of the software provided by Motorola for use with this product.The Software is never sold. Motorola licenses the Software to the original customer and to any subsequent lic-ensee for personal use only on the terms of this License. Motorola and its 3rd party licensors retain the ownership of the Software.Software LicenseYou may:USE the Software only in connection with the operation of the Product.TRANSFER the Software (including all component parts and printed materials) permanently to another person, but only if the person agrees to accept all of the terms of this License. If you transfer the Software, you must at the same time transfer the Product and all copies of the Software (if applicable) to the same person or destroy any copies not transferred.TERMINATE this License by destroying the original and all copies of the Software (if applicable) in whatever form.You may not:(1) Loan, distribute, rent, lease, give, sublicense or otherwise transfer the Software, in whole or in part, to any other person, except as permitted under the TRANSFER paragraph above. (2) Copy or translate the User Guide included with the Software, other than for personal use. (3) Copy, alter, translate, decompile, disassemble or reverse engineer the Software, including but not limited to, modifying the Software to make it operate on non-com-patible hardware. (4) Remove, alter or cause not to be displayed, any copyright notices or startup message con-tained in the Software programs or documentation. (5) Export the Software or the Product components in violation of any United States export laws.The Product is not designed or intended for use in on-line control of aircraft, air traffic, aircraft navigation or aircraft communications; or in design, construction, operation or maintenance of any nuclear facility. MOTOROLA AND ITS 3RD PARTY LICENSORS DISCLAIM ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR SUCH USES. YOU REPRESENT AND WARRANT THAT YOU SHALL NOT USE THE PRODUCT FOR SUCH PUR-POSES. Title to this Software, including the ownership of all copyrights, mask work rights, patents, trademarks and all other intellectual property rights subsisting in the foregoing, and all adaptations to and modifications of the foregoing shall at all times remain with Motorola and its 3rd party licensors. Motorola retains all rights not
89expressly licensed under this License. The Software, including any images, graphics, photographs, animation, video, audio, music and text incorporated therein is owned by Motorola or its 3rd party licensors and is protected by United States copyright laws and international treaty provisions. Except as otherwise expressly provided in this License, the copying, reproduction, distribution or preparation of derivative works of the Software, any portion of the Product or the documentation is strictly prohibited by such laws and treaty provisions. Nothing in this License constitutes a waiver of Motorola’s rights under United States copyright law.This License and your rights regarding any matter it addresses are governed by the laws of the Commonwealth of Pennsylvania, without reference to conflict of laws principles. THIS LICENSE SHALL TERMINATE AUTOMATI-CALLY if you fail to comply with the terms of this License.Motorola is not responsible for any third party software provided as a bundled application, or otherwise, with the Software.U.S. GOVERNMENT RESTRICTED RIGHTSThe Product and documentation is provided with RESTRICTED RIGHTS. The use, duplication or disclosure by the Government is subject to restrictions as set forth in subdivision (c)(1)(ii) of The Rights in Technical Data and Computer Software clause at 52.227-7013. The contractor/ manufacturer is Motorola, Inc., Broadband Communi-cations Sector, 101 Tournament Drive, Horsham, PA 19044.Warranty InformationRetail Purchasers. If you purchased this Product directly from Motorola or from an authorized Motorola retail reseller, Motorola warrants to you, the original end user customer, that (A) the Product, excluding Software, will be free from defects in materials and workmanship under normal use, and (B) with respect to Software, (i) the media on which the Software is provided will be free from defects in material and workmanship under normal use, and (ii) the Software will perform substantially as described in its documentation. This Limited Warranty to you, the origi-nal end user customer, continues (A) for Software and the media upon which it is provided, for a period of ninety (90) days from the date of purchase from Motorola or an authorized Motorola reseller, and (B) for the Product (excluding Software), for a period of one (1) year from the date of purchase from Motorola or from an authorized Motorola reseller. To take advantage of this Limited Warranty or to obtain technical support, you must call the Motorola support phone number (below). Motorola’s sole and exclusive obligation under this Limited Warranty for retail sales shall be to repair or replace any Product or Software that does not meet this Limited Warranty. All war-ranty claims must be made within the applicable Warranty Period.Cable Operator or Service Provider Arrangements. If you did not purchase this Product directly from Motorola or from a Motorola authorized retail reseller, Motorola does not warrant this Product to you, the end-user. A limited warranty for this Product (including Software) may have been provided to your cable operator or Internet Service Provider (“Service Provider”) from whom you obtained the Product. Please contact your Service Provider if you experience problems with this Product.General Information. The warranties described in this Section shall not apply: (i) to any Product subjected to accident, misuse, neglect, alteration, Acts of God, improper handling, improper transport, improper storage, improper use or application, improper installation, improper testing or unauthorized repair; or (ii) to cosmetic prob-lems or defects which result from normal wear and tear under ordinary use, and do not affect the performance or use of the Product. Motorola’s warranties apply only to a Product that is manufactured by Motorola and identified by Motorola owned trademark, trade name or product identification logos affixed to the Product. Motorola does not warrant to you, the end user, or to anyone else that the Software will perform error free or without bugs. MOTOR-OLA IS NOT RESPONSIBLE FOR, AND PROVIDES “AS IS” ANY SOFTWARE SUPPLIED BY 3RD PARTIES. EXCEPT AS EXPRESSLY STATED IN THIS SECTION (“WARRANTY INFORMATION”), THERE ARE NO WAR-RANTIES OF ANY KIND RELATING TO THE PRODUCT, EXPRESS, IMPLIED OR STATUTORY, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR-POSE, OR THE WARRANTY AGAINST INFRINGEMENT PROVIDED IN THE UNIFORM COMMERCIAL CODE. Some states do not allow for the exclusion of implied warranties, so the above exclusion may not apply to you.What additional provisions should I be aware of? Because it is impossible for Motorola to know the purposes for which you acquired this Product or the uses to which you will put this Product, you assume full responsibility for the selection of the Product for its installation and use. While every reasonable effort has been made to insure that you will receive a Product that you can use and enjoy, Motorola does not warrant that the functions of the Product will meet your requirements or that the operation of the Product will be uninterrupted or error-free. MOTOROLA IS NOT RESPONSIBLE FOR PROBLEMS OR DAMAGE CAUSED BY THE INTERACTION OF THE PRODUCT
Administrator’s Handbook90WITH ANY OTHER SOFTWARE OR HARDWARE. ALL WARRANTIES ARE VOID IF THE PRODUCT IS OPENED, ALTERED, AND/OR DAMAGED.THESE ARE YOUR SOLE AND EXCLUSIVE REMEDIES for any and all claims that you may have arising out of or in connection with this Product, whether made or suffered by you or another person and whether based in con-tract or tort.IN NO EVENT SHALL MOTOROLA BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDI-RECT, GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR OTHER DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF INFORMATION OR ANY OTHER PECUNIARY LOSS), OR FROM ANY BREACH OF WARRANTY, EVEN IF MOTOROLA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO CASE SHALL MOTOROLA’S LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT.These matters are governed by the laws of the Commonwealth of Pennsylvania, without regard to conflict of laws principles and excluding the provisions of the United Nations Convention on Contracts for the International Sale of Goods.Retail Purchasers Only. If you purchased this Product directly from Motorola or from a Motorola authorized retail reseller, please call the Motorola support number, 1-877-466-8646 for technical support or warranty service.Cable Operator or Service Provider Arrangements. If you did not purchase this Product directly from Motorola or from a Motorola authorized retail reseller, please contact your Service Provider for technical support.MOTOROLA, Intelligence Everywhere, and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. All rights reserved. No part of the contents of this document may be reproduced or transmitted in any form or by any means without the writ-ten permission of the publisher. © Motorola, Inc. 2009.
91Copyright AcknowledgmentsBecause Motorola has included certain software source code in this product, Motorola includes the following text required by the respective copyright holders:Portions of this software are based in part on the work of the following:Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.3. All advertising materials mentioning features or use of this software must display the following acknowledgment:    “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.     (http://www.openssl.org/)”4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.6. Redistributions of any form whatsoever must retain the following acknowledgment:    “This product includes software developed by the OpenSSL Project    for use in the OpenSSL Toolkit (http://www.openssl.org/)”THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).Original SSLeay License/Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL.This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement:    “This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”    The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:    “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]Portions of this software are based in part on the work of the following:Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Administrator’s Handbook92 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Portions of this software are based in part on the work of the following:Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.<<RSA Data Security, Inc. MD5 Message-Digest Algorithm>>License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD5 Message Digest Algorithm” in all material mentioning or referencing this software or this function.License is also granted to make and use derivative works provided that such works are identified as “derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing the derived work.<<RSA Data Security, Inc. MD4 Message-Digest Algorithm>>License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD4 Message Digest Algorithm” in all material mentioning or referencing this software or this function.License is also granted to make and use derivative works provided that such works are identified as “derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm” in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind.These notices must be retained in any copies of any part of this documentation and/or software.Portions of this software are based in part on the work of the following:Copyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.Portions of this software are based in part on the work of the following:Copyright 2000, 2001 Shane Kerr. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:     1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.     2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Portions of this software are based in part on the work of the following:SHA-1 in C By Steve Reid steve@edmweb.com 100% Public Domain Portions of this software are based in part on the work of the following:Broadcom Common Firmware Environment (CFE) BSP Configuration file File: bsp_config.h This module contains global parameters and conditional compilation settings for building CFE. Author: Mitch Lichtenberg (mpl@broadcom.com) Copyright 2000,2001 Broadcom Corporation. All rights reserved. This software is furnished under license and may be used and copied only in accordance with the following terms and conditions. Subject to these conditions, you may download, copy, install, use, modify and distribute modified or unmodified copies of this software in source and/or binary form. No title or ownership is transferred hereby. 1) Any source code used, modified or distributed must reproduce and retain this copyright notice and list of conditions as they appear in the source file.
932) No right is granted to use any trade name, trademark, or logo of Broadcom Corporation. Neither the “Broadcom Corporation” name nor any trademark or logo of Broadcom Corporation may be used to endorse or promote products derived from this software without the prior written permission of Broadcom Corporation. 3) THIS SOFTWARE IS PROVIDED “AS-IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING BUT NOT LIMITED TO, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT ARE DISCLAIMED. IN NO EVENT SHALL BROADCOM BE LIABLE FOR ANY DAMAGES WHATSOEVER, AND IN PARTICULAR, BROADCOM SHALL NOT BE LIABLE FOR DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE), EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Portions of this software are based in part on the work of the following:LZMA SDK 4.22 Copyright (C) 1999-2005 Igor Pavlov LZMA SDK provides developers with documentation, source code, and sample code necessary to write software that uses LZMA compression. LICENSE LZMA SDK is licensed under two licenses: 1) GNU Lesser General Public License (GNU LGPL) 2) Common Public License (CPL) It means that you can select one of these two licenses and follow rules of that license. SPECIAL EXCEPTION Igor Pavlov, as the author of this code, expressly permits you to statically or dynamically link your code (or bind by name) to the files from LZMA SDK without subjecting your linked code to the terms of the CPL or GNU LGPL. Any modifications or additions to files from LZMA SDK, however, are subject to the GNU LGPL or CPL terms. SPECIAL EXCEPTION allows you to use LZMA SDK in applications with closed code, while you keep LZMA SDK code unmodified. SPECIAL EXCEPTION #2: Igor Pavlov, as the author of this code, expressly permits you to use this code under the same terms and conditions contained in the License Agreement you have for any previous version of LZMA SDK developed by Igor Pavlov. SPECIAL EXCEPTION #2 allows owners of proprietary licenses to use latest version of LZMA SDK as update for previous versions. SPECIAL EXCEPTION #3: Igor Pavlov, as the author of this code, expressly permits you to use code of examples (LzmaTest.c, LzmaStateTest.c, LzmaAlone.cpp) as public domain code. GNU LGPL and CPL licenses are pretty similar and both these licenses are classified as 1) “Free software licenses” at http://www.gnu.org/ 2) “OSI-approved” at http://www.opensource.org/ LZMA SDK also can be available under a proprietary license which can include: 1) Right to modify code without subjecting modified code to the terms of the CPL or GNU LGPL 2) Technical support for code To request such proprietary license or any additional consultations, send email message from that page: http://www.7-zip.org/support.html You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA You should have received a copy of the Common Public License along with this library.Portions of this software are based in part on the work of the following:The deflate format used by zlib was defined by Phil Katz. The deflate and zlib specifications were written by L. Peter Deutsch. Thanks to all the people who reported problems and suggested various improvements in zlib; they are too numerous to cite here.Copyright notice: (C) 1995-2004 Jean-loup Gailly and Mark AdlerThis software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.3. This notice may not be removed or altered from any source distribution.Portions of this software are based in part on the work of the following:A program and library for data compression by Julian Seward http://www.bzip.org Version 1.0.5 of 10 December 2007 Copyright © 1996-2007 Julian Seward This program, bzip2, the associated library libbzip2, and all documentation, are copyright © 1996-2007 Julian Seward. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
Administrator’s Handbook94Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED BY THE AUTHOR “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following: hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2 Authenticator ========================================================================== Copyright (c) 2002-2004, Jouni Malinen <jkmaline@cc.hut.fi> and contributors. All Rights Reserved. This program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option. Please note that some of the driver interface implementations (driver_*.c) may be licensed under a different license. License ------- GPL v2: This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA (this copy of the license is in COPYING file). Alternatively, this software may be distributed under the terms of BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following:BSD LicenseRegents of the University of CaliforniaUniversity of California, Berkeley1998All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:• Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.• Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.• Neither the name of the University of California, Berkeley nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Portions of this software are based in part on the work of the following:Memtest Filename: memtest.c Description: General-purpose memory testing functions.
95Notes: Some of the constants in this file are specific to Arcom's Target188EB hardware. This software can be easily ported to systems with different data bus widths by redefining ';datum';. Copyright (c) 1998 by Michael Barr. This software is placed into the public domain and may be used for any purpose. However, this notice must not be changed or removed and no warranty is either expressed or implied by its publication or distribution.Portions of this software are based in part on the work of the following:NIST Secure Hash Algorithm heavily modified by Uwe Hollerbach <uh@alumni.caltech edu> from Peter C. Gutmann's implementation as found in Applied Cryptography by Bruce Schneier Portions of this software are based in part on the work of the following:LGPL 2.1GNU LESSER GENERAL PUBLIC LICENSEVersion 2.1, February 1999Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor,Boston, MA 02110-1301 USAEveryone is permitted to copy and distribute verbatim copies of this license document,but changing it is not allowed.[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]PreambleThe licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program.We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
Administrator’s Handbook96A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on the Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term “modification”.)“Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:a) The modified work must itself be a software library.b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library.4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”. The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.6. As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)
97b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the “work that uses the “Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.NO WARRANTY15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.Portions of this software are based in part on the work of the following:Copyright (c) 2002 Johnny Shelley jshelley@cahaus.com All rights reserved.
Administrator’s Handbook98Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the author nor any contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY COPYRIGHT HOLDERS AND CONTRIBUTORS `AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following:ASN.1 object dumping code, copyright Peter Gutmann <pgut001@cs.auckland.ac.nz>, based on ASN.1 dump program by David Kemp <dpkemp@missi.ncsc.mil>, with contributions from various people including Matthew Hamrick <hamrick@rsa.com>, Bruno Couillard <bcouillard@chrysalis-its.com>, Hallvard Furuseth <h.b.furuseth@usit.uio.no>, Geoff Thorpe <geoff@raas.co.nz>, David Boyce <d.boyce@isode.com>, John Hughes <john.hughes@entegrity.com>, Life is hard, and then you die <ronald@trustpoint.com>, Hans-Olof Hermansson <hans-olof.hermansson@postnet.se>, Tor Rustad <Tor.Rustad@bbs.no>, Kjetil Barvik <kjetil.barvik@bbs.no>, James Sweeny <jsweeny@us.ibm.com>, Chris Ridd <chris.ridd@isode.com>, and several other people whose names I've misplaced (a number of those email addresses probably no longer work, since this code has been around for awhile). Portions of this software are based in part on the work of the following:The deflate format used by zlib was defined by Phil Katz. The deflate and zlib specifications were written by L. Peter Deutsch. Thanks to all the people who reported problems and suggested various improvements in zlib; they are too numerous to cite here. Copyright notice: (C) 1995-2004 Jean-loup Gailly and Mark AdlerThis software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.3. This notice may not be removed or altered from any source distribution.Jean-loup Gailly Mark Adlerjloup@gzip.org madler@alumni.caltech.eduIf you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents to sign. The sources are provided for free but without warranty of any kind. The library has been entirely written by Jean-loup Gailly and Mark Adler; it does not include third-party code. If you redistribute modified sources, we would appreciate that you include in the file ChangeLog history information documenting your changes. Please read the FAQ for more information on the distribution of modified source versions.Portions of this software are based in part on the work of the following:CMU Mach Kernel LicenseCopyright 1988, 1989 by Carnegie Mellon University All Rights Reserved Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.Portions of this software are based in part on the work of the following:Expat XML Parser License For the expat xml parser component: Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd. and Clark Cooper Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
99Portions of this software are based in part on the work of the following:Net SNMP License http://net-snmp.sourceforge.net/about/license.html Various copyrights apply to this package, listed in various separate parts below. Please make sure that you read all the parts. Up until 2001, the project was based at UC Davis, and the first part covers all code written during this time. From 2001 onwards, the project has been based at SourceForge, and Networks Associates Technology, Inc. hold the copyright on behalf of the wider Net-SNMP community, covering all derivative work done since then. An additional copyright section has been added as Part 3 below also under a BSD license for the work contributed by Cambridge Broadband Ltd. to the project since 2001. An additional copyright section has been added as Part 4 below also under a BSD license for the work contributed by Sun Microsystems, Inc. to the project since 2003. Code has been contributed to this project by many people over the years it has been in development, and a full list of contributors can be found in the README file under the THANKS section. ---- Part 1: CMU/UCD copyright notice: (BSD like) ----- Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000 Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Part 2: Networks Associates Technology, Inc. copyright notice (BSD) Copyright (c) 2001-2003, Networks Associates Technology, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the Networks Associates Technology, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, his list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) ----- Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Use is subject to license terms below. This distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Administrator’s Handbook100Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 5: Sparta, Inc. copyright notice (BSD) ----- Copyright (c) 2003-2006, Sparta, Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of Sparta, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 6: Cisco/BUPTNIC copyright notice (BSD) ----- Copyright (c) 2004, Cisco, Inc. and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of Cisco, Inc., Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) ----- Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss@fabasoft.com Author: Bernhard Penz Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, brand or product names may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following:Hw_cryptodev.c License Copyright (c) 2002 Bob Beck <beck@openbsd.org> Copyright (c) 2002 Theo de Raadt Copyright (c) 2002 Markus Friedl All rights reserved.
101Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the author nor the names of contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following:Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that this legend is included on all tape media and as a part of the software program in whole or part. Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute it to anyone else except as part of a product or program developed by the user. SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement. SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY PART THEREOF. In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the possibility of such damages. Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, California 94043 Portions of this software are based in part on the work of the following:v3_pcia.c -- mode:C; c-file-style: “eay” -- / Contributed to the OpenSSL Project 2004 by Richard Levitte (richard@levitte.org) Copyright (c) 2004 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, Sweden). All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Portions of this software are based in part on the work of the following:Racoon License Copyright © 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 and 2003 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Administrator’s Handbook102Portions of this software are based in part on the work of the following:Snprintf License Copyright Patrick Powell 1995 This code is based on code written by Patrick Powell (papowell@astart.com). It may be used for any purpose as long as this notice remains intact on all source code distributions. Portions of this software are based in part on the work of the following:Hostapd License hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2 Authenticator ========================================================================== Copyright (c) 2002-2004, Jouni Malinen <jkmaline@cc.hut.fi> and contributors. All Rights Reserved. This program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option. Please note that some of the driver interface implementations (driver_*.c) may be licensed under a different license. License ------- GPL v2: This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA (this copy of the license is in COPYING file). Alternatively, this software may be distributed under the terms of BSD license: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
103Caring for the Environment by RecyclingRecycling your Motorola EquipmentPlease do not dispose of this product with your residential or commercial waste. Some countries or regions, such as the European Union, have set up systems to collect and recycle electrical and electronic waste items. Contact your local authori-ties for information about practices established for your region.If collection systems are not available, call Motor-ola Customer Service for assistance.Please visit http://www.motorola.com/recycle for instructions on recycling.Genbrug af dit Motorola-udstyrDette produkt må ikke bortskaffes sammen med husholdningsaffald eller erh-vervsaffald. Nogle lande eller områder, f.eks. EU, har oprettet systemer til ind-samling og genbrug af elektriske og elektroniske affaldsprodukter. Kontakt de lokale myndigheder for oplysninger om gældende fremgangsmåder i dit område. Hvis der ikke findes tilgængelige indsamlingssystemer, kan du kon-takte Motorola Kundeservice.Recycling bei Geräten von MotorolaBitte entsorgen Sie dieses Produkt nicht als gewöhnlichen Haus- oder Büromüll. In einigen Ländern und Gebieten, z. B. in der Europäischen Union, wurden Systeme für die Rücknahme und Wiederverwertung von Elek-troschrott eingeführt. Erkundigen Sie sich bitte bei Ihrer Stadtoder Kreisver-waltung nach der geltenden Entsorgungspraxis. Falls bei Ihnen noch kein Abfuhroder Rücknahmesystem besteht, wenden Sie sich bitte an den Kun-dendienst von Motorola.Reciclaje de su equipo MotorolaNo deseche este producto junto con sus residuos residenciales o comer-ciales. Algunos países o regiones, tales como la Unión Europea, han orga-nizado sistemas para recoger y reciclar desechos eléctricos y electrónicos. Comuníquese con las autoridades locales para obtener información acerca de las prácticas vigentes en su región. Si no existen sistemas de recolección disponibles, solicite asistencia llamando el Servicio al Cliente de Motorola.Recyclage de votre équipement MotorolaVeuillez ne pas jeter ce produit avec vos ordures ménagères ou vos rebuts d'entreprise. Certains pays ou certaines régions comme l'Union Européenne ont mis en place des systèmes de collecte et de recyclage des produits élec-triques et électroniques mis au rebut. Veuillez contacter vos autorités locales pour vous informer des pratiques instaurées dans votre region. Si aucun système de collecte n'est disponible, veuillez appeler le Service clientèle de Motorola qui vous apportera son assistance.When you see this symbol on a Motorola product, do not dispose of the product with residential or commercial waste.Beskyttelse af miljøet med genbrugNår du ser dette symbol på et Motorola-produkt, må produktet ikke bortskaffes sammen med husholdningsaffald eller erh-vervsaffald.Umweltschutz durch RecyclingWenn Sie dieses Zeichen auf einem Produkt von Motorola sehen, entsorgen Sie das Produkt bitte nicht als gewöhnli-chen Hausoder Büromüll.Cuidar el medio ambiente mediante el reciclajeCuando vea este símbolo en un producto Motorola, no lo deseche junto con residuos resi-denciales o comerciales.Recyclage pour le respect de l'environnementLorsque vous voyez ce symbole sur un produit Motorola, ne le jetez pas avec vos ordures ménagères ou vos rebuts d'entreprise.
Administrator’s Handbook104Uw Motorola-materiaal recycleren.Gooi dit product niet bij het huishoudelijk afval het of bedrijfsafval. In sommige landen of regio's zoals de Europese Unie, zijn er bepaalde systemen om elek-trische of elektronische afvalproducten in te zamelen en te recycleren. Neem contact op met de plaatselijke overheid voor informatie over de geldende regels in uw regio. Indien er geen systemen bestaan, neemt u contact op met de klantendienst van Motorola.Recykling posiadanego sprzętu MotorolaProduktu nie należy wyrzucać do komunalnych pojemników na śmieci. W niek-tórych krajach i regionach, np. w Unii Europejskiej, istnieją systemy zbierania i recyklingu sprzętu elektrycznego i elektronicznego. Informacje o utylizacji tego rodzaju odpadów należy uzyskać od władz lokalnych. Jeśli w danym regionie nie istnieją systemy zbierania odpadów elektrycznych i elektronicznych, infor-macje o utylizacji należy uzyskać od biura obsługi klienta firmy Motorola (Motorola Customer Service).Reciclagem do seu equipamento MotorolaNão descarte este produto junto com o lixo residencial ou comercial. Alguns países ou regiões, tais como a União Européia, criaram sistemas para cole-cionar e reciclar produtos eletroeletrônicos. Para obter informações sobre as práticas estabelecidas para sua região, entre em contato com as autoridades locais. Se não houver sistemas de coleta disponíveis, entre em contato com o Serviço ao Cliente da Motorola para obter assistência.Återvinning av din Motorola-utrustningKasta inte denna produkt tillsammans med det vanliga avfallet. Vissa länder eller regioner, som t.ex. EU, har satt upp ett system för insamling och återvin-ning av el- och elektronikavfall. Kontakta dina lokala myndigheter för informa-tion om vilka regler som gäller i din region. Om det inte finns något insamlingssystem ska du kontakta Motorolas kundtjänst för hjälp.Milieubewust recyclerenAls u dit symbool op een Motor-ola-product ziet, gooi het dan niet bij het huishoudelijk afval of het bedrijfsafval.Dbałość o środowisko - recyklingProduktów Motorola oznac-zonych tym symbolem nie należy wyrzucać do komunalnych pojem-ników na śmieci.Cuidando do meio ambiente através da reciclagemQuando você ver este símbolo em um produto Motorola, não descarte o produto junto com lixo residencial ou comercial.Var rädd om miljön genom återvinningNär du ser den här symbolen på en av Motorolas produkter ska du inte kasta produkten tillsam-mans med det vanliga avfallet.
105Please visit http://www.motorola.com/recycle for instructions on recycling.ࣛࣛࢦ࢕ࢠࣜ࡞ࡻࡾ⎌ሾಕ㆜࣓ࢹ࣭ࣞࣚ⿿ဗ࡞ࡆࡡエྒ࠿⾪♟ࡈࡿ࡙࠷ࡾሔྙࠉ⿿ဗࢅᐓᗖࡱࡒࡢၛᴏᗣᲘ∸࡛ࡊ࡙ฌฦࡊ࡝࠷࡚ࡂࡓࡈ࠷ࠊ࣓ࢹ࣭ࣞࣚ⿞⨠ࡡࣛࢦ࢕ࢠࣜᮇ⿿ဗࢅᐓᗖࡱࡒࡢၛᴏᗣᲘ∸࡛ࡊ࡙ฌฦࡊ࡝࠷࡚ࡂࡓࡈ࠷ࠊḚᕗ㏻ྙ࡝࡜ࡡᅗࡱࡒࡢᆀᇡ࡞ࡻࡖ࡙ࡢࠉ㞹ẴⓏ࣬㞹ᏄⓏᗣᲘ∸ࢅ཭㞗࠽ࡻࡦࣛࢦ࢕ࢠࣜࡌࡾࢨࢪࢷ࣑࠿࠵ࡽࡱࡌࠊ࠽పࡱ࠷ࡡᆀᇡ࡚Ửࡴࡼࡿ࡙࠷ࡾ᪁Ἢ࡞ࡗ࠷࡙ࡡ᝗ሒࡢࠉᆀ᪁⮤἖మ࡞࠽ၡ࠷ྙࢂࡎࡂࡓࡈ࠷ࠊ཭㞗ࢨࢪࢷ࣑࠿࡝࠷ሔྙࠉ࣓ࢹ࣭ࣞࣚ࣬࢜ࢪࢰ࣏࣭ࢦ࣭ࣄࢪࡱ࡚࠽ၡ࠷ྙࢂࡎࡂࡓࡈ࠷ࠊ재활용으로환경보호하기Motorola 제품에 이 표시가 있는 경우, 가정 또는 상업 폐기물과 함께 버리지 마십시오.Motorola 기기 재활용 이 제품을 가정용 또는 사업용 폐기물과 함께 버리지 마십시오. 유럽 유니온과 같은 일부 국가 또는 지역에서는 재활용 전기 전자 폐기물 항목을 수집하는 시스템이 구축되어 있습니다. 해당 지역에 구축되어 있는 절차에 관한 정보는 지역 관할당국에 연락하십시오. 수집 시스템이 존재하지 않는 경우, 도움을 받기 위해 Motorola 고객서비스부로 연락하십시오. 䞡໡߽⫼ˈֱᡸ⦃๗བᵰ0RWRURODѻકϞ݋᳝䖭Ͼᷛ䆚ˈ䇋࣓ᇚѻક϶ᓗࠄᆊᒁ៪ଚϮൗഒЁDŽ0RWRUROD䆒໛ⱘ䞡໡߽⫼䇋࣓ᇚᴀѻક϶ᓗࠄᆊᒁ៪ଚϮൗഒЁDŽᶤѯ೑ᆊ៪ഄऎ՟བ⃻ⲳᏆ㒣ᓎゟ䍋ಲᬊ੠䞡໡߽⫼⬉⇨Ϣ⬉ᄤᑳᓗ⠽ⱘԧ㋏DŽ䇋ϢᔧഄⳌ݇ᴎᵘ㘨㋏ˈ㦋প᳝݇᠔೼ഄऎⳌ݇㾘ᅮⱘֵᙃDŽབᵰᔧഄᇮ᳾ᓎゟಲᬊԧ㋏ˈ䇋㟈⬉0RWRURODᅶ᠋᳡ࡵҹᇏ∖ᐂࡽDŽ注意環保問題 在你看到產品上有Motorola的標誌時,請勿以住家或商用的廢棄物方式處置。 Mot or ol a  設備的回收 請勿以住家或商用的廢棄物方式處置。某些國家或地區,如歐盟,已對廢棄的電器和電子產品制訂回收以及再?用體制。請與䓟所在地的管?機構諮詢相關規定。 ?䓟所在的地區並未設置回收機制,請電Motorola客服部諮詢相關事宜。
Administrator’s Handbook106
107IndexSymbols!! command 55AAddress resolution table 60Administrator password 54Arguments, CLI 64ARPCommand 56, 62CCLI 51!! command 55Arguments 64Command shortcuts 55Command truncation 64Configuration mode 64Keywords 64Navigating 64Prompt 55, 64Restart command 55SHELL mode 55View command 65CommandARP 56, 62Ping 57Telnet 62Command line interface (see CLI)CONFIGCommand List 53Configuration mode 64Configure 20Connection 21Connection commands 67DDHCP 11DHCP lease table 58DHCP Server 23Diagnostic log 58, 61Diagnostics 40DSL 35Dynamic Addressing 11EEthernet 36Ethernet statistics 58Ffactory default 42Factory Reset Switch 49firewall 60Firewall Log 38HHelp 44Home Page 18IICMP Echo 57IGMP 69IGMP Snooping 69IP 36IP DNS commands 68IP Gateway commands 71IP IGMP commands 69IP interfaces 60IP routes 61IPMap table 61KKeywords, CLI 64LLAN 36LAN Host Discovery Table 61LEDs 46Link commands 72Links Bar 19Log 61Log, Firewall 38Log, System 37Logging in 54MMAC Filtering 29Management commands 73Memory 61multiple subnets 24NNAT 31
Administrator’s Handbook108NAT Pinhole commands 77NTP commands 71PPasswordAdministrator 54User 54Physical interfaces commands 74Ping command 57Pinhole Entry 31PPP 63Prompt, CLI 55, 64Qquickstart 14RReset Router 42Reset Switch 49Restart 58Restart command 55Restart Router 42Router Password 33Ssafety instructions 8SHELLCommand Shortcuts 55Commands 55Prompt 55SHELL level 64SHELL mode 55show config 59Show ppp 63Software Upgrade 43Static IP Address 22Status 35status indicator lights 46Step mode 65subnetsmultiple 24System commands 78System Log 37TTelnet 54Telnet command 62TFTP server 56Time Zone 34Trivial File Transfer Protocol 56Troubleshooting 45Truncation 64UUpdate Router 43User name 54User password 54Utilities 39VView command 65view config 62WWAN 35Wi-Fi Protected Access 28Wired Equivalent Privacy 27Wireless 36Wireless Multi-media 29

Navigation menu