ARRIS 3347 802.11b/g ADSL Router User Manual Software User Guide V7 7

ARRIS Group, Inc. 802.11b/g ADSL Router Software User Guide V7 7

Abridged user manual

 3 Table of Contents Table of Contents Copyright  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 CHAPTER 1  Introduction   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 What’s New in 7.7  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13About Netopia Documentation . . . . . . . . . . . . . . . . . . . . . . . . . 15Intended Audience  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Documentation Conventions  . . . . . . . . . . . . . . . . . . . . . . . . . . 16 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  16Internal Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  16Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  16 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18A Word About Example Screens  . . . . . . . . . . . . . . . . . . . . . . . 18 CHAPTER 2  Basic Mode Setup  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Important Safety Instructions  . . . . . . . . . . . . . . . . . . . . . . . . . . 20 POWER SUPPLY INSTALLATION  . . . . . . . . . . . . . . . . . . . . . . . . . . .  20TELECOMMUNICATION INSTALLATION. . . . . . . . . . . . . . . . . . . . . .  20PRODUCT VENTILATION  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  20 Wichtige Sicherheitshinweise . . . . . . . . . . . . . . . . . . . . . . . . . . 21 NETZTEIL INSTALLIEREN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  21INSTALLATION DER TELEKOMMUNIKATION  . . . . . . . . . . . . . . . . .  21 Setting up the Netopia Gateway . . . . . . . . . . . . . . . . . . . . . . . . 22 Microsoft Windows:  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  22Macintosh MacOS 8 or higher or Mac OS X:   . . . . . . . . . . . . . . .  23 Configuring the Netopia Gateway  . . . . . . . . . . . . . . . . . . . . . . 25 MiAVo VDSL and Ethernet WAN models Quickstart . . . . . . . . . . . . . .  26PPPoE Quickstart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  27Set up the Netopia Pocket Gateway . . . . . . . . . . . . . . . . . . . . . . . . . .  29 Netopia Gateway Status Indicator Lights . . . . . . . . . . . . . . . . . 31
 Table of Contents 4 Home Page - Basic Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Manage My Account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Status Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Enable Remote Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Expert Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Update Firmware  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38Factory Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 CHAPTER 3  Expert Mode  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Accessing the Expert Web Interface . . . . . . . . . . . . . . . . . . . . . 41 Open the Web Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41Home Page - Expert Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Home Page - Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Toolbar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Navigating the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Breadcrumb Trail  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Restart  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Alert Symbol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Help  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Configure  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Quickstart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49How to Use the Quickstart Page   . . . . . . . . . . . . . . . . . . . . . . . . . 49Setup Your Gateway using a PPP Connection   . . . . . . . . . . . . . . 49LAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60About Closed System Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . .   62WPA Version Allowed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   64Multiple SSIDs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65WiFi Multimedia  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Wireless MAC Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Use RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   71WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73PPP over Ethernet interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Advanced: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   76Ethernet WAN interface  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78WAN Ethernet and VDSL Gateways . . . . . . . . . . . . . . . . . . . . . .   81ADSL Gateways  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   82Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
 5 Table of Contents IP Static Routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  88IP Static ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  90Pinholes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  90Configure Specific Pinholes   . . . . . . . . . . . . . . . . . . . . . . . . . . . .  90Planning for Your Pinholes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  90Example: A LAN Requiring Three Pinholes   . . . . . . . . . . . . . . . .  91Pinhole Configuration Procedure   . . . . . . . . . . . . . . . . . . . . . . . .  93IPMaps  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  96Configure the IPMaps Feature  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  97FAQs for the IPMaps Feature  . . . . . . . . . . . . . . . . . . . . . . . . . . .  97What are IPMaps and how are they used?  . . . . . . . . . . . . . . . . .  97What types of servers are supported by IPMaps?   . . . . . . . . . . .  97Can I use IPMaps with my PPPoE or PPPoA connection? . . . . .  97Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway?   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  97IPMaps Block Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  98Default Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  99Configure a Default Server  . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  99Typical Network Diagram   . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  100NAT Combination Application  . . . . . . . . . . . . . . . . . . . . . . . . . .  101IP-Passthrough  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  101A restriction  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  102Differentiated Services  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  103DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  106DHCP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  106RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  108SNMP  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  109IGMP (Internet Group Management Protocol)  . . . . . . . . . . . . . . . . .  112UPnP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  115LAN Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Ethernet Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  117Configuring for Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  121Example #1  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  129Example #2  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  132System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  135Syslog Parameters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  135Log Event Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  137Internal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  140Software Hosting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  141List of Supported Games and Software . . . . . . . . . . . . . . . . . . .  142Rename a User(PC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  143Ethernet MAC Override . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  144Clear Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  145
 Table of Contents 6 Time Zone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Passwords  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Create and Change Passwords  . . . . . . . . . . . . . . . . . . . . . . . . . 147Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149Use a Netopia Firewall  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   149BreakWater Basic Firewall  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149Configuring for a BreakWater Setting . . . . . . . . . . . . . . . . . . . .   149TIPS for making your BreakWater Basic Firewall Selection . . .   151Basic Firewall Background  . . . . . . . . . . . . . . . . . . . . . . . . . . . .   151IPSec  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154SafeHarbour IPSec VPN  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Configuring a SafeHarbour VPN . . . . . . . . . . . . . . . . . . . . . . . .   156Parameter Descriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   160Stateful Inspection  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164Stateful Inspection Firewall installation procedure . . . . . . . . . . . . . . . 164Exposed Addresses  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Stateful Inspection Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168Open Ports in Default Stateful Inspection Installation  . . . . . . . . . . . . 169 Firewall Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 General firewall terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170Basic IP packet components  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170Basic protocol types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Firewall design rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172Firewall Logic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   172Implied rules  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   173Example filter set page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   174Filter basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175Example network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   175Example filters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   176Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   176Example 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   176Example 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   177Example 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   177Packet Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178What’s a filter and what’s a filter set? . . . . . . . . . . . . . . . . . . . . . . . . . 179How filter sets work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Filter priority. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   180How individual filters work  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180A filtering rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   181Parts of a filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   181Port numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   182
 7 Table of Contents Port number comparisons  . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  182Other filter attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  183Putting the parts together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  183Filtering example #1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  184Filtering example #2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  186Design guidelines  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  187An approach to using filters . . . . . . . . . . . . . . . . . . . . . . . . . . . .  187 Working with IP Filters and Filter Sets . . . . . . . . . . . . . . . . . . 188 Adding a filter set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  188Adding filters to a filter set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  189Viewing filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  193Modifying filters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  194Deleting filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  194Moving filters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  194Deleting a filter set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  194 Associating a Filter Set with an Interface . . . . . . . . . . . . . . . . 194Policy-based Routing using Filtersets  . . . . . . . . . . . . . . . . . . 197 TOS field matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  197Security Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  200Using the Security Monitoring Log . . . . . . . . . . . . . . . . . . . . . . .  200Timestamp Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  202 Install  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Install Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  204Updating Your Gateway’s Netopia Firmware Version . . . . . . . .  204Step 1: Required Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  205Step 2: Netopia firmware Image File . . . . . . . . . . . . . . . . . . . . . . . . .  205Install Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  209Use Netopia Software Feature Keys . . . . . . . . . . . . . . . . . . . . . . . . .  209Obtaining Software Feature Keys  . . . . . . . . . . . . . . . . . . . . . . .  209Procedure - Install a New Feature Key File . . . . . . . . . . . . . . . .  209To check your installed features: . . . . . . . . . . . . . . . . . . . . . . . .  211Install Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  213 CHAPTER 4   Basic Troubleshooting   . . . . . . . . . . . . . . . . . . . . . . . . 215 Status Indicator Lights  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 LED Function Summary Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  225 Factory Reset Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
 Table of Contents 8 CHAPTER 5  Advanced Troubleshooting  . . . . . . . . . . . . . . . . . . . . . . 231 Home Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232Expert Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234System Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235Ports: Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236Ports: DSL  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237IP: Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238DSL: Circuit Configuration  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239System Log: Entire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241Network Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 CHAPTER 6  Command Line Interface   . . . . . . . . . . . . . . . . . . . . . . . 247 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Starting and Ending a CLI Session . . . . . . . . . . . . . . . . . . . . . 250 Logging In. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Ending a CLI Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251Saving Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Using the CLI Help Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . 251About SHELL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 SHELL Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251SHELL Command Shortcuts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 SHELL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252WAN Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 About CONFIG Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . 265 CONFIG Mode Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265Navigating the CONFIG Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . 265Entering Commands in CONFIG Mode  . . . . . . . . . . . . . . . . . . . . . . . 266Guidelines: CONFIG Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267Displaying Current Gateway Settings. . . . . . . . . . . . . . . . . . . . . . . . . 267Step Mode: A CLI Configuration Technique . . . . . . . . . . . . . . . . . . . . 267Validating Your Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 CONFIG Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Remote ATA Configuration Commands  . . . . . . . . . . . . . . . . . . . . . . . 269DSL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272ATM Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Bridging Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
 9 Table of Contents Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  274DHCP Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  275Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  275DHCP Option Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  277Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  278DMT Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  279DSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  279Domain Name System Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . .  280Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  280Dynamic DNS Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  280IGMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  281IP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  284Common Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  284ARP Timeout Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  284DSL Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  284Ethernet LAN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  287Additional subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  288Default IP Gateway Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . .  289IP-over-PPP Settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  289Static ARP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  293IGMP Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  293IPsec Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  293IP Prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  294Differentiated Services (DiffServ). . . . . . . . . . . . . . . . . . . . . . . .  294Packet Mapping Configuration . . . . . . . . . . . . . . . . . . . . . . . . . .  296Queue Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  298Basic Queue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  299Weighted Fair Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  300Priority Queue  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  301Funnel Queue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  302Interface Queue Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . .  302SIP Passthrough  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  303Static Route Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  303IPMaps Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  305Network Address Translation (NAT) Default Settings  . . . . . . . . . . . .  305Network Address Translation (NAT) Pinhole Settings . . . . . . . . . . . .  306PPPoE /PPPoA Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  307Configuring Basic PPP Settings  . . . . . . . . . . . . . . . . . . . . . . . .  307Configuring Port Authentication   . . . . . . . . . . . . . . . . . . . . . . . .  309PPPoE with IPoE Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311Ethernet WAN platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  311ADSL platforms  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  312Ethernet Port Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  314Command Line Interface Preference Settings  . . . . . . . . . . . . . . . . .  314
 Table of Contents 10 Port Renumbering Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315Security Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316Firewall Settings (for BreakWater Firewall) . . . . . . . . . . . . . . . .   316SafeHarbour IPSec Settings . . . . . . . . . . . . . . . . . . . . . . . . . . .   316Internet Key Exchange (IKE) Settings. . . . . . . . . . . . . . . . . . . .   321Stateful Inspection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   322Example: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   323Packet Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   324Example: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   327SNMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328SNMP Notify Type Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . .   329System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329Syslog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333Default syslog installation procedure. . . . . . . . . . . . . . . . . . . . .   334Wireless Settings (supported models) . . . . . . . . . . . . . . . . . . . . . . . . 336Wireless Multi-media (WMM) Settings  . . . . . . . . . . . . . . . . . . .   340Wireless Privacy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   343Wireless MAC Address Authorization Settings . . . . . . . . . . . . .   345RADIUS Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   345VLAN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   346Example: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   347UPnP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   348DSL Forum settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   348TR-064  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348TR-069  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 CHAPTER 7  Glossary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 -----A-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   351-----B-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   352-----C-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   353-----D-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   354-----E-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   356-----F-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   356-----H-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   357-----I----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   358-----K-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   359-----L-----. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   359-----M----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   359-----N-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   360-----P-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   361-----Q----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   362-----R-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   362
 11 Table of Contents -----S----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  363-----T----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  365-----U-----. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  365-----V----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  366-----W-----  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  366-----X----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  367 CHAPTER 8  Technical Specifications and Safety Information  . . . . . 369 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Dimensions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Communications interfaces:  . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Power requirements  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Environment  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Operating temperature:  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Storage temperature:   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  369Relative storage humidity: . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370Software and protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370Software media:   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370Routing: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370WAN support:  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370Security:   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370Management/configuration methods:  . . . . . . . . . . . . . . . . . . . .  370Diagnostics: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  370 Agency approvals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 North America  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  371International . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  371Regulatory notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  371European Community. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  371 Manufacturer’s Declaration of Conformance  . . . . . . . . . . . . . 372 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  372Service requirements   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  372Canada  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  373Declaration for Canadian users . . . . . . . . . . . . . . . . . . . . . . . . .  373Caution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  373 Important Safety Instructions  . . . . . . . . . . . . . . . . . . . . . . . . . 374 Australian Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . .  374Caution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  374Caution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  374Telecommunication installation cautions . . . . . . . . . . . . . . . . . .  374 47 CFR Part 68 Information . . . . . . . . . . . . . . . . . . . . . . . . . . 375 FCC Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  375
 Table of Contents 12 FCC Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 Electrical Safety Advisory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 CHAPTER 9  Overview of Major Capabilities  . . . . . . . . . . . . . . . . . . . 377 Wide Area Network Termination . . . . . . . . . . . . . . . . . . . . . . . 378 PPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM) . . . . . . . 378Instant-On PPP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Simplified Local Area Network Setup  . . . . . . . . . . . . . . . . . . . 379 DHCP (Dynamic Host Configuration Protocol) Server . . . . . . . . . . . . 379DNS Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Embedded Web Server  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   380 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Remote Access Control  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381Password Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   381Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . .   381Netopia Advanced Features for NAT  . . . . . . . . . . . . . . . . . . . .   383Internal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   383Pinholes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   383Default Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   384Combination NAT Bypass Configuration. . . . . . . . . . . . . . . . . .   384IP-Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   385VPN IPSec Pass Through . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   385VPN IPSec Tunnel Termination. . . . . . . . . . . . . . . . . . . . . . . . .   386Stateful Inspection Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . .   386SSL Certificate Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   386VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   386 Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .389
 13 What’s New in 7.7 CHAPTER 1 Introduction What’s New in 7.7 New in Netopia Firmware Version 7.7 are the following features: • Internet Group Management Protocol (IGMP) Version 3 support. See “IGMP (Internet Group Management Protocol)” on page 112. • TR-101 Support:• Concurrent support for PPPoE and IPoE connections on the WAN.    See “WAN” on page 73.• Multiple LAN IP Subnet support. See “LAN” on page 51.• Additional DHCP range support. These ranges are associated with the additional    LAN subnets on a 1-to-1 basis.• DHCP option filtering support. Allows DHCP option data to be used to determine the   desired DHCP address range. See “DHCP Option Filtering” on page 277.• Support for additional WAN settings to control multicast forwarding as well as if    0.0.0.0  is used as the source address for IGMP packets.    See “Advanced:” on page 76.• Support for “unnumbered” interfaces. For IP interfaces, this allows the address to be   set to  0  and the DHCP client also to be disabled. See page 79. • PPPoE/DHCP Autosensing. See “WAN” on page 73. • Wireless Multimedia Mode (WMM) support. See “WiFi Multimedia” on page 67. • Support of VLAN ID 0 on the Ethernet WAN and support for setting p-bits on a segment/port basis. See “VLAN” on page 121 and CLI “VLAN Settings” on page 346. • Firewall: ClearSailing is automatically enabled on all 2200-Series ADSL2+ platforms. (Explicit exceptions: bonded and VDSL2, 3341, and 3387WG.) See “Firewall” on page 149.
 14 • TR-069 Remote device management is automatically enabled by default for 2200-Series Gateways. (Explicit exceptions: bonded and VDSL2, 3341, 3387WG). See “TR-069” on page 349.Corresponding commands have been added to the Command Line Interface (CLI). See “Command Line Interface” on page 247. • Reset WAN port counter and CLI command to display individual Ethernet port statistics. See “reset enet [ all ]” on page 257 and “show enet [ all ]” on page 259. • CLI for Netopia ATA Remote Management. See “Remote ATA Configuration Commands” on page 269. • Provide Bandwidth Management using Weighted Fair Queueing for VDSL2 Platforms.See “Queue Configuration” on page 298.
 15 About Netopia Documentation About Netopia Documentation ☛   NOTE: This guide describes the wide variety of features and functionality of the Neto-pia Gateway, when used in Router mode. The Netopia Gateway may also be delivered in Bridge mode. In Bridge mode, the Gateway acts as a pass-through device and allows the workstations on your LAN to have public addresses directly on the Internet. Netopia, Inc. provides a suite of technical information for its 2200- and 3300-series family of intelligent enterprise and consumer Gateways. It consists of:  • Software User Guide • Dedicated Quickstart guides • Specific White PapersThe documents are available in electronic form as Portable Document Format (PDF) files. They are viewed (and printed) from Adobe Acrobat Reader, Exchange, or any other applica-tion that supports PDF files.They are downloadable from Netopia’s website:  http://www.netopia.com/ Intended Audience This guide is targeted primarily to residential service subscribers. Expert Mode sections may also be of use to the support staffs of broadband service pro-viders and advanced residential service subscribers.See “Expert Mode” on page 41.
 16 Documentation Conventions General This manual uses the following conventions to present information: Internal Web InterfaceCommand Line Interface Syntax conventions for the Netopia Gateway command line interface are as follows: Convention (Typeface) Description bold italic monospaced Menu commands bold italic sans serif  Web GUI page links and button names terminal Computer display textbold terminal User-entered textItalic  Italic type indicates the complete titles of manuals.Convention (Graphics) DescriptionDenotes an “excerpt” from a Web page or the visual truncation of a Web pageDenotes an area of emphasis on a Web pageConvention Descriptionstraight ([ ]) brackets in cmd line Optional command arguments blue rectangle or linesolid rounded rectangle with an arrow
17Documentation Conventionscurly ({ }) brackets, with values sep-arated with vertical bars (|).Alternative values for an argument are pre-sented in curly ({ }) brackets, with values separated with vertical bars (|).bold terminal type faceUser-entered textitalic terminal type faceVariables for which you supply your own val-ues
18OrganizationThis guide consists of nine chapters, including a glossary, and an index. It is organized as follows:•Chapter 1, “Introduction” — Describes the Netopia document suite, the purpose of, the audience for, and structure of this guide. It gives a table of conventions.•Chapter 2, “Basic Mode Setup” — Describes how to get up and running with your Netopia Gateway.•Chapter 3, “Expert Mode” — Focuses on the “Expert Mode” Web-based user inter-face for advanced users. It is organized in the same way as the Web UI is organized. As you go through each section, functions and procedures are discussed in detail.•Chapter 4, “Basic Troubleshooting” — Gives some simple suggestions for trouble-shooting problems with your Gateway’s initial configuration.•Chapter 5, “Advanced Troubleshooting” — Gives suggestions and descriptions of expert tools to use to troubleshoot your Gateway’s configuration.•Chapter 6, “Command Line Interface” — Describes all the current text-based com-mands for both the SHELL and CONFIG modes. A summary table and individual com-mand examples for each mode is provided.•Chapter 7, “Glossary” •Chapter 8, “Technical Specifications and Safety Information”•Chapter 9, “Overview of Major Capabilities” — Presents a product description sum-mary.•IndexA Word About Example ScreensThis manual contains many example screen illustrations. Since Netopia 2200- and 3300 Series Gateways offer a wide variety of features and functionality, the example screens shown may not appear exactly the same for your particular Gateway or setup as they appear in this manual. The example screens are for illustrative and explanatory purposes, and should not be construed to represent your own unique environment.
369DescriptionCHAPTER 8 Technical Specifications and Safety InformationDescriptionDimensions: Smart Modems: 13.5 cm (w) x 13.5 cm (d) x 3.5 cm (h); 5.25” (w) x 5.25” (d) x 1.375” (h)Wireless Models: 19.5 cm (w) x 17.0 cm (d) x 4.0 cm (h); 7.6” (w) x 6.75” (d) x 1.5” (h)3342/3342N/3352/3352N: 8.5 cm (w) x 4.5 cm (d) x 2 cm (h); 3.375” (w) x 1.75” (d) x .875” (h)2200-Series Modems: 1.06"(2.69 cm) H, 4.36" (11.07 cm) W, 5.71"(14.50 cm) L2200-Series Wireless Models: 1.2"(3.0cm) H, 8.7" (22.0 cm) W, 5.2"(13.2cm) LCommunications interfaces: The Netopia Gateways have an RJ-11 jack for DSL line connections or an RJ-45 jack for cable/DSL modem connections and 1 or 4–port 10/100Base-T Ethernet switch for your LAN connections. Some models have a USB port that can be used to connect to your PC; in some cases, the USB port also serves as the power source. Some models contain an 802.11b or 802.11g wireless LAN transmitter.Power requirements■12 VDC input■USB-powered models only: For Use with Listed I.T.E. OnlyEnvironmentOperating temperature: 0° to +40° CStorage temperature: 0° to +70° C
370Relative storage humidity: 20 to 80% noncondensingSoftware and protocolsSoftware media: Software preloaded on internal flash memory; field upgrades done via download to internal flash memory via TFTP or web upload. (does not apply to 3342/3352)Routing: TCP/IP Internet Protocol Suite, RIPWAN support: PPPoA, PPPoE, DHCP, static IP addressSecurity: PAP, CHAP, UI password security, IPsec, SSL certificateManagement/configuration methods:  HTTP (Web server), Telnet, SNMP, TR-069 DSL Forum CPE WAN Management ProtocolDiagnostics: Ping, event logging, routing table displays, statistics counters, web-based management, traceroute, nslookup, and diagnostic commands.
371Agency approvalsAgency approvalsNorth AmericaSafety Approvals:■United States – UL 60950, Third Edition■Canada – CSA: CAN/CSA-C22.2 No. 60950-00EMC:■United States – FCC Part 15 Class B■Canada – ICES-003Telecom:■United States – 47 CFR Part 68■Canada – CS-03InternationalSafety Approvals:■Low Voltage (European directive) 73/23■EN60950 (Europe) EMI Compatibility:■89/336/EEC (European directive)■EN55022:1994    CISPR22 Class B■EN300 386 V1.2.1 (non-wireless products)■EN 301-489 (wireless products)Regulatory noticesEuropean Community. This Netopia product conforms to the European Community CE Mark standard for the design and manufacturing of information technology equipment. This standard covers a broad area of product design, including RF emissions and immunity from electrical disturbances.
372The Netopia Firmware Version 7.7 complies with the following EU directives:■Low Voltage, 73/23/EEC■EMC Compatibility, 89/336/EEC, conforming to EN 55 022Manufacturer’s Declaration of Conformance☛  Warnings:This is a Class B product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures. Ade-quate measures include increasing the physical distance between this product and other electrical devices.Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.United States. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful inter ference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:■Reorient or relocate the receiving antenna.■Increase the separation between the equipment and receiver.■Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.■Consult the dealer or an experienced radio TV technician for help.Service requirements. In the event of equipment malfunction, all repairs should be performed by our Company or an authorized agent. Under FCC rules, no customer is authorized to repair this equipment. This restriction applies regardless of whether the equipment is in or our of warranty. It is the responsibility of users requiring service to report the need for service to our Company or to one of our authorized agents. Service can be obtained at Netopia, Inc., 6001 Shellmound Street, Emeryville, California, 94608. Telephone: 510-597-5400.
373Manufacturer’s Declaration of Conformance☛  ImportantThis product was tested for FCC compliance under conditions that included the use of shielded cables and connectors between system components. Changes or modifica-tions to this product not authorized by the manufacturer could void your authority to operate the equipment.Canada. This Class B digital apparatus meets all requirements of the Canadian Interference -Causing Equipment Regulations.Cet appareil numérique de la classe B respecte toutes les exigences du Réglement sur le matériel brouilleur du Canada.Declaration for Canadian usersNOTICE: The Canadian Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Department does not guarantee the equipment will operate to the user’s satisfaction.Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company’s inside wiring associated with a single line individual service may be extended by means of a certified connector assembly (telephone extension cord). The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.Repairs to the certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.CautionUsers should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.
374Important Safety InstructionsAustralian Safety InformationThe following safety information is provided in conformance with Australian safety requirements:CautionDO NOT USE BEFORE READING THE INSTRUCTIONS: Do not connect the Ethernet ports to a carrier or carriage service provider’s telecommunications network or facility unless: a) you have the written consent of the network or facility manager, or b) the connection is in accordance with a connection permit or connection rules.Connection of the Ethernet ports may cause a hazard or damage to the telecommunication network or facility, or persons, with consequential liability for substantial compensation.Caution■The direct plug-in power supply serves as the main power disconnect; locate the direct plug-in power supply near the product for easy access.■For use only with CSA Certified Class 2 power supply, rated 12VDC.Telecommunication installation cautions■Never install telephone wiring during a lightning storm.■Never install telephone jacks in wet locations unless the jack is specifically designed for wet locations.■Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface.■Use caution when installing or modifying telephone lines.■Avoid using a telephone (other than a cordless type) during an electrical storm. There may be a remote risk of electric shock from lightning.■Do not use the telephone to report a gas leak in the vicinity of the leak.
37547 CFR Part 68 Information47 CFR Part 68 InformationFCC Requirements1. The Federal Communications Commission (FCC) has established Rules which permit this device to be directly connected to the telephone network. Standardized jacks are used for these connections. This equipment should not be used on party lines or coin phones.2. If this device is malfunctioning, it may also be causing harm to the telephone network; this device should be disconnected until the source of the problem can be determined and until repair has been made. If this is not done, the telephone company may temporarily disconnect service.3. The telephone company may make changes in its technical operations and procedures; if such changes affect the compatibility or use of this device, the telephone company is required to give adequate notice of the changes. You will be advised of your right to file a complaint with the FCC.4. If the telephone company requests information on what equipment is connected to their lines, inform them of:a. The telephone number to which this unit is connected.b. The ringer equivalence number. [0.XB]c. The USOC jack required. [RJ11C]d. The FCC Registration Number. [XXXUSA-XXXXX-XX-E]Items (b) and (d) are indicated on the label. The Ringer Equivalence Number (REN) is used to determine how many devices can be connected to your telephone line. In most areas, the sum of the REN's of all devices on any one line should not exceed five (5.0). If too many devices are attached, they may not ring properly.FCC Statementsa) This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA. On the bottom of this equipment is a label that contains, among other information, a product identifier in the format US:AAAEQ##TXXXX. If requested, this number must be provided to the telephone company.b) List all applicable certification jack Universal Service Order Codes (“USOC”) for the equipment: RJ11.c) A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. See installation instructions for details.
376d) The REN is used to determine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. For products approved after July 23, 2002, the REN for this product is part of the product identifier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). For earlier products, the REN is separately shown on the label.e) If this equipment, the Netopia 3300- or 2200-Series router, causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isn’t practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary.f) The telephone company may make changes in its facilities, equipment, operations or procedures that could affect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service.g) If trouble is experienced with this equipment, the Netopia 3300- or 2200-Series router, for repair or warranty information, please contact:Netopia Technical Support510-597-5400www.netopia.com.If the equipment is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved.h) This equipment not intended to be repaired by the end user. In case of any problems, please refer to the troubleshooting section of the Product User Manual before calling Netopia Technical Support.i) Connection to party line service is subject to state tariffs. Contact the state public utility commission, public service commission or corporation commission for information.j) If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this Netopia 3300- or 2200-Series router does not disable your alarm equipment. If you have questions about what will disable alarm equipment, consult your telephone company or qualified installer.RF Exposure Statement:NOTE: Installation of the wireless models must maintain at least 20 cm between the wireless router and any body part of the user to be in compliance with FCC RF exposure guidelines.Electrical Safety AdvisoryTelephone companies report that electrical surges, typically lightning transients, are very destructive to customer terminal equipment connected to AC power sources. This has been identified as a major nationwide problem. Therefore it is advised that this equipment be connected to AC power through the use of a surge arrestor or similar protection device.
377CHAPTER 9 Overview of Major CapabilitiesThe Netopia Gateway offers simplified setup and management features as well as advanced broadband router capabilities. The following are some of the main features of the Netopia Gateway:•“Wide Area Network Termination” on page 378The Gateway combines an ADSL modem with an Internet router. It translates protocols used on the Internet to protocols used by home personal computers and eliminates the need for special desktop software (i.e. PPPoE). •“Simplified Local Area Network Setup” on page 379Built-in DHCP and DNS proxy features minimize or eliminate the need to program any network configuration into your home personal computer. •“Management” on page 380A Web server built into the Netopia Operating System makes setup and maintenance easy using standard browsers. Diagnostic tools facilitate troubleshooting.•“Security” on page 381Network Address Translation (NAT), password protection, Stateful Inspection firewall and other built-in security features prevent unauthorized remote access to your network. Pinholes, default server, and other features permit access to computers on your home network that you can specify.
378Wide Area Network TerminationPPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM)The PPPoE specification, incorporating the PPP and Ethernet standards, allows your com-puter(s) to connect to your Service Provider’s network through your Ethernet WAN connec-tion. The Netopia-series Gateway supports PPPoE, eliminating the need to install PPPoE client software on any LAN computers.Service Providers may require the use of PPP authentication protocols such as Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP). CHAP and PAP use a username and password pair to authenticate users with a PPP server.A CHAP authentication process works as follows:1. The password is used to scramble a challenge string.2. The password is a shared secret, known by both peers. 3. The unit sends the scrambled challenge back to the peer.PAP, a less robust method of authentication, sends a username and password to a PPP server to be authenticated. PAP’s username and password pair are not encrypted, and are therefore sent “unscrambled”.Instant-On PPPYou can configure your Gateway for one of two types of Internet connections:•Always On•Instant OnThese selections provide either an uninterrupted Internet connection or an as-needed con-nection. While an Always On connection is convenient, it does leave your network permanently con-nected to the Internet, and therefore potentially vulnerable to attacks. Netopia's Instant On technology furnishes almost all the benefits of an Always-On connec-tion while providing two additional security benefits:•Your network cannot be attacked when it is not connected.
379Simplified Local Area Network Setup•Your network may change address with each connection making it more difficult to attack.When you configure Instant On access, you can also configure an idle time-out value. Your Gateway monitors traffic over the Internet link and when there has been no traffic for the configured number of seconds, it disconnects the link. When new traffic that is destined for the Internet arrives at the Gateway, the Gateway will instantly re-establish the link. Your service provider may be using a system that assigns the Internet address of your Gateway out of a pool of many possible Internet addresses. The address assigned varies with each connection attempt, which makes your network a moving target for any attacker.Simplified Local Area Network SetupDHCP (Dynamic Host Configuration Protocol) ServerDHCP Server functionality enables the Gateway to assign to your LAN computer(s) a “pri-vate” IP address and other parameters that allow network communication. The default DHCP Server configuration of the Gateway supports up to 253 LAN IP addresses.This feature simplifies network administration because the Gateway maintains a list of IP address assignments. Additional computers can be added to your LAN without the hassle of configuring an IP address.DNS ProxyDomain Name System (DNS) provides end users with the ability to look for devices or web sites by typing their names, rather than IP addresses. For web surfers, this technology allows you to enter the URL (Universal Resource Locator) as text to surf to a desired web-site. The Netopia DNS Proxy feature allows the LAN-side IP address of the Gateway to be used for proxying DNS requests from hosts on the LAN to the DNS Servers configured in the gateway. This is accomplished by having the Gateway's LAN address handed out as the “DNS Server” to the DHCP clients on the LAN.
380☛  NOTE:The Netopia DNS Proxy only proxies UDP DNS queries, not TCP DNS queries.ManagementEmbedded Web ServerThere is no specialized software to install on your PC to configure, manage, or maintain your Netopia Gateway. Web pages embedded in the operating system provide access to the following Gateway operations:•Setup•System and security logs•Diagnostics functionsOnce you have removed your Netopia Gateway from its packing container and powered the unit up, use any LAN attached PC or workstation running a common web browser applica-tion to configure and monitor the Gateway. DiagnosticsIn addition to the Gateway’s visual LED indicator lights, you can run an extensive set of diagnostic tools from your Web browser. Two of the facilities are:•Automated “Multi-Layer” Test The Run Diagnostics link initiates a sequence of tests. They examine the entire functionality of the Gateway, from the physical connections to the data traffic.•Network Test ToolsThree test tools to determine network reachability are available:Ping - tests the “reachability” of a particular network destination by sending an ICMP echo request and waiting for a reply.NSLookup - converts a domain name to its IP address and vice versa.
381SecurityTraceRoute - displays the path to a destination by showing the number of hops and the router addresses of these hops.The system log also provides diagnostic information.☛  NOTE:Your Service Provider may request information that you acquire from these var-ious diagnostic tools. Individual tests may be performed at the command line. (See “Command Line Interface” on page 247.).SecurityRemote Access ControlYou can determine whether or not an administrator or other authorized person has access to configuring your Gateway. This access can be turned on or off in the Web interface.Password ProtectionAccess to your Netopia device can be controlled through two access control accounts, Admin or User.•The Admin, or administrative user, performs all configuration, management or mainte-nance operations on the Gateway. •The User account provides monitor capability only. A user may NOT change the configuration, perform upgrades or invoke maintenance functions. Account usernames can now be changed for the Admin and User accounts.Network Address Translation (NAT)The Netopia Gateway Network Address Translation (NAT) security feature lets you conceal the topology of a hard-wired Ethernet or wireless network connected to its LAN inter face
382from routers on networks connected to its WAN interface. In other words, the end com-puter stations on your LAN are invisible from the Internet.Only a single WAN IP address is required to provide this security support for your entire LAN.LAN sites that communicate through an Internet Service Provider typically enable NAT, since they usually purchase only one IP address from the ISP.•When NAT is ON, the Netopia Gateway “proxies” for the end computer stations on your network by pretending to be the originating host for network communications from non-originating networks. The WAN interface address is the only IP address exposed.The Netopia Gateway tracks which local hosts are communicating with which remote hosts. It routes packets received from remote networks to the correct computer on the LAN (Ethernet) inter face. •When NAT is OFF, a Netopia Gateway acts as a traditional TCP/IP router, all LAN com-puters/devices are exposed to the Internet.A diagram of a typical NAT-enabled LAN follows: WAN InterfaceLANEthernet InterfaceNetopia GatewayNATInternetEmbedded Admin Services:HTTP-Web Server and Telnet Server PortNAT-protectedLAN stationsEthernet
383Security☛  NOTE:1. The default setting for NAT is ON.2. Netopia uses Port Address Translation (PAT) to implement the NAT facility.3. NAT Pinhole traffic (discussed below) is always initiated from the WAN side.Netopia Advanced Features for NATUsing the NAT facility provides effective LAN security. However, there are user applications that require methods to selectively by-pass this security function for certain types of Inter-net traffic.Netopia Gateways provide special pinhole configuration rules that enable users to estab-lish NAT-protected LAN layouts that still provide flexible by-pass capabilities.Some of these rules require coordination with the unit’s embedded administration ser-vices: the internal Web (HTTP) Port (TCP 80) and the internal Telnet Server Port (TCP 23). Internal ServersThe internal servers are the embedded Web and Telnet servers of the Gateway. You would change the internal server ports for Web and Telnet of the Gateway if you wanted to have these services on the LAN using pinholes or the Default server.PinholesThis feature allows you to:•Transparently route selected types of network traffic using the port forwarding facility.FTP requests or HTTP (Web) connections are directed to a specific host on your LAN.•Setup multiple pinhole paths.Up to 32 paths are supported•Identify the type(s) of traffic you want to redirect by port number.
384Common TCP/IP protocols and ports are:See page 90 for How To instructions.Default ServerThis feature allows you to:•Direct your Gateway to forward all externally initiated IP traffic (TCP and UDP protocols only) to a default host on the LAN.•Enable it for certain situations:Where you cannot anticipate what port number or packet protocol an in-bound applica-tion might use. For example, some network games select arbitrary port numbers when a connection is opened.When you want all unsolicited traffic to go to a specific LAN host.Combination NAT Bypass ConfigurationSpecific pinholes and Default Server settings, each directed to different LAN devices, can be used together.☛  WARNING:Creating a pinhole or enabling a Default Server allows inbound access to the specified LAN station. Contact your Network Administrator for LAN security questions. FTP (TCP 21) telnet (TCP 23)SMTP (TCP 25) HTTP (TCP 80)SNMP (TCP 161, UDP 161)
385SecurityIP-PassthroughNetopia OS now offers an IP passthrough feature. The IP passthrough feature allows a sin-gle PC on the LAN to have the Gateway’s public address assigned to it. It also provides PAT (NAPT) via the same public IP address for all other hosts on the private LAN subnet.VPN IPSec Pass ThroughThis Netopia service supports your independent VPN client software in a transparent man-ner. Netopia has implemented an Application Layer Gateway (ALG) to support multiple PCs running IP Security protocols.This feature has three elements:1. On power up or reset, the address mapping function (NAT) of the Gate-way’s WAN configuration is turned on by default.2. When you use your third-party VPN application, the Gateway recognizes the traffic from your client and your unit. It allows the packets to pass through the NAT “protection layer” via the encrypted IPSec tunnel.3. The encrypted IPSec tunnel is established “through” the Gateway.A typical VPN IPSec Tunnel pass through is diagrammed below:NetopiaGateway
386☛  NOTE:Typically, no special configuration is necessary to use the IPSec pass through feature.In the diagram, VPN PC clients are shown behind the Netopia Gateway and the secure server is at Corporate Headquarters across the WAN. You cannot have your secure server behind the Netopia Gateway.When multiple PCs are starting IPSec sessions, they must be started one at a time to allow the associations to be created and mapped.VPN IPSec Tunnel TerminationThis Netopia service supports termination of VPN IPsec tunnels at the Gateway. This per-mits tunnelling from the Gateway without the use of third-party VPN client software on your client PCs.Stateful Inspection FirewallStateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled. You can configure UDP and TCP “no-activity” periods that will also apply to NAT time-outs if stateful inspection is enabled on the interface.Technical details are discussed in “Expert Mode” on page 41.SSL Certificate SupportOn selected models, you can also install a Secure Sockets Layer (SSL V3.0) certificate from a trusted Certification Authority (CA) for authentication purposes. If this feature is available on your Gateway, an additional link will appear in the Install page.Netopia Firmware Version 7.7 uses SSL certificates for TR-069 support.See “Install Certificate” on page 213. VLANsNetopia's VGx technology allows a single Netopia VGx-enabled broadband gateway to act as separate virtual gateways, treating each individual service as a single service "chan-nel." The VGx-enabled gateway applies specific policies, routing, and prioritization parame-ters to each service channel, ensuring delivery of that service to the appropriate peripheral
387Securitydevice with the requisite level of QoS and correct feature sets — making it ideal for deliv-ery of triple play voice, video, and data services.VGx was developed to ensure that subscribers receive the quality of voice, video, and data services they expect — to prevent a large data download from causing jittery video or poor voice quality. VGx achieves this goal by providing superior service segmentation and QoS features obtained by mapping multiple local virtual local area networks (VLANs) to one or more specific permanent virtual circuits (PVCs) for DSL, or wide area network VLANs for a fiber network.Traffic prioritization is determined through the Institute of Electrical Engineering (IEEE) standard 802.1p, which specifies QoS algorithms to prioritize traffic based on protocol and source. This insures that each service receives the QoS treatment it requires; for example, •video is free from latency, •VoIP service is prioritized to insure aural quality, and •data is securely and efficiently routed.
388
389IndexSymbols!! command 252AAccess the GUI 41Address resolution table 260Administrativerestrictions 290Administrator password 41,147, 250Arguments, CLI 266ARPCommand 252, 263ATA configuration 269Authentication 309Authentication trap 328auto-channel mode 336AutoChannel Setting 61, 336BBridging 274Broadcast address 284, 287CCLI 247!! command 252Arguments 266Command shortcuts 252Command truncation 265Configuration mode 265Keywords 266Navigating 265Prompt 251, 265Restart command 252SHELL mode 251View command 267CommandARP 252, 263Ping 255Telnet 262Command line interface (seeCLI)Community 328Compression, protocol 308Concurrent Bridging/Routing 119, 274CONFIGCommand List 249Configuration mode 265DD. port 184Default IP address 41denial of service 364designing a new filter set 187DHCP 275DHCP filtering 277DHCP lease table 257Diagnostic log 257, 261Level 330Diagnostics 380DNS 280DNS Proxy 379Documentationconventions 16
390Domain Name System(DNS) 280DSL Forum settings 348EEcho request 308echo-period 308Embedded Web Server 380Ethernet address 274Ethernet statistics 257FFeature KeysObtaining 209filterparts 181parts of 181filter priority 180filter setadding 188display 183filter setsadding 188defined 179deleting 194disadvantages 178using 188filtering example #1 184filtersactions a filter cantake 180adding to a filter set 190defined 179deleting 194input 189modifying 194output 189using 187, 188viewing 193firewall 261FTP 305HHardware address 274hijacking 364Hop count 304HTTP traffic 315IICMP Echo 255IGMP Snooping 113, 281Install 203Install Certificate 213IP address 284, 287Default 41IP interfaces 260IP routes 261IPMap table 261IPSec Tunnel 260KKeywords, CLI 266LLAN Host DiscoveryTable 261latency 197
391LCP echo request 308LinkInstall Software 203Quickstart 49, 51, 73Local Area Network 379Location, SNMP 328Log 261Logging in 250lost echoes 308MMagic number 308Memory 261Metric 304multi-cast forwarding 285,312Multiple SSIDs 65multiple subnets 53Multiple Wireless SSIDsWireless 65, 337NNameserver 280NAT 291, 305, 381Traffic rules 101NAT Default Server 384Netmask 287Network AddressTranslation 381Network Test Tools 380NSLookup 380Oset upnp option 348Operating ModeWireless 60, 337PPAP 378Password 147Administrator 41,  147,250User 41, 147, 250persistent-log 330Ping 380Ping command 255Pinholes 305, 383Planning 90policy-based routing 197Port authentication 309port numbercomparisons 182port numbers 182Port renumbering 315PPP 264PPPoE 378Primary nameserver 280Prompt, CLI 251, 265Protocol compression 308Qqos max-burst-size 273qos peak-cell-rate 272qos service-class 272qos sustained-cell-rate 273quality of service 181, 197
392RRestart 258Restart command 252Restart timer 309Restrictions 290RIP 286, 288Routing Information Protocol(RIP) 286, 288SSecondary nameserver 280Secure Sockets Layer 213Securityfilters 178Security log 201Set bncp command 272,273, 274Set bridge commands 274Set DMT commands 279Set dns commands 280Set ip static-routescommands 303Set ppp module port authenti-cation command 310Set preference morecommand 314Set preference verbosecommand 314set security state-insp 322Set servers command 315Set servers telnet-tcpcommand 315Set snmp sysgroup locationcommand 328Set snmp traps authentifica-tion-traps ip-addresscommand 328Set system diagnostic-levelcommand 330Set system heartbeatcommand 331Set system namecommand 329Set system NTPcommand 332Set system passwordcommand 331set system syslog 333Set wireless optioncommand 336Set wireless user-auth optioncommand 345SHELLCommand Shortcuts 252Commands 251Prompt 251SHELL level 265SHELL mode 251show config 258Show ppp 264Simple Network ManagementProtocol (SNMP) 328SMTP 305SNMP 109, 305, 328SNMP Notify Typesettings 329src. port184SSL certificates 213
393Stateful Inspection 164stateful inspection 261Static route 303Step mode 267Subnet mask 287subnetsmultiple 53Syslog 135System contact, SNMP 328System diagnostics 330system idle-timeout 330TTelnet 250, 305Telnet command 262Telnet traffic 315TFTP 305TFTP server 254Toolbar 45TOS bit 181, 197TraceRoute 242, 381Trap 328Trivial File TransferProtocol 254Truncation 265UUPnP 115User name 250User password 41, 147, 250Vset atm 272, 273View command 267view config 263VLAN ID 124VLAN Settings 346VLANs 121VPNIPSec Pass Through 385IPSec TunnelTermination 386WWeighted Fair Queue 300Wide Area Network 378Wireless 56ZZero Touch 332
394
Netopia 2200 and 3300 series by NetopiaNetopia, Inc.6001 Shellmound StreetEmeryville, CA 94608August 18, 2006

Navigation menu