Comtrend 5700 Wireless ADSL IAD User Manual UM NexusLink 5700 C1 0
Comtrend Corporation Wireless ADSL IAD UM NexusLink 5700 C1 0
  
    Comtrend   >  
5.User's manual

NexusLink 5700 
Wireless ADSL bonding IAD 
User’s Manual 
Version C1.0, October 5, 2010 
260101-001

1 
  Warning 
 
Before servicing or disassembling this equipment, always disconnect all 
power and telephone lines from the device. 
 
Use an appropriate power supply and a UL Listed telephone line cord.   
Specification of the power supply is clearly stated in Appendix C. 
Preface 
This manual provides information to network administrators. It covers the 
installation, operation and applications of the Wireless ADSL bonding IAD. 
The individual reading this manual is presumed to have a basic understanding of 
telecommunications.     
This document is subject to change without notice.    For product update, new 
product release, manual revision, software upgrade, technical support, etc., visit 
Comtrend Corporation at http://www.comtrend.com   
FCC Interference Statement 
This equipment has been tested and found to comply with the limits for a Class B 
Digital Device, pursuant to part 15 of the FCC Rules. These limits are designed to 
provide reasonable protection against harmful interference in a residential 
installation. This equipment generates, uses and can radiate radio frequency 
energy and, if not installed and used in accordance with the instruction, may 
cause harmful interference to radio communication. However, there is no grantee 
that interference will not occur in a particular installation. If this equipment dose 
cause harmful interference to radio or television reception, which can be 
determined by turning the equipment off and on , the user is encouraged to try to 
correct the interference by one or more of the following measures: 
 Reorient or relocate the receiving antenna. 
 Increase the separation between the equipment and receiver. 
 Connect the equipment into an outlet on a circuit different from that to which 
the receiver is connected 
 Consult the dealer or an experienced radio/TV technician for help 
FCC Caution: The changes or modifications not expressly approved 
by the party responsible for compliance could void the 
user's authority to operate the equipment.   

2 
This device complies with Part 15 of the FCC Rules. Operation is subject to the 
following two conditions: 
1. This device may not cause harmful interference 
2. This device must accept any interference received, including interference that 
may cause undesired operation. 
FCC Radiation Exposure Statement 
To comply with the FCC RF exposure compliance requirements, this device and its 
antenna must not be co-located or operating to conjunction with any other 
antenna or transmitter. 
This equipment should be installed and operated with minimum distance 
20cmbetween the radiator & your body 
Copyright 
Copyright© 2010 Comtrend Corporation.    All rights reserved. The information 
contained herein is proprietary to Comtrend Corporation.    No part of this document 
may be translated, transcribed, reproduced, in any form, or by any means without 
the prior written consent of Comtrend Corporation. 
Technical support 
If you find the product to be inoperable or malfunctioning, please contact a technical 
support engineer for immediate service by email at INT-support@comtrend.com 
Save Our Environment 
This symbol means that when the equipment has reached the end of its 
useful life, it must be taken to a recycling centre and processed separate   
from domestic waste. 
The cardboard box, the plastic contained in the packaging, and the parts that make 
up this device can be recycled in accordance with regionally established regulations. 
Never throw-out this electronic equipment along with your household waste.    You 
may be subject to penalties or sanctions under the law.    Instead, ask for 
instructions from your municipal government on how to correctly dispose of it.   
Please be responsible and protect our environment. 
3 
Table of Contents 
CHAPTER 1
  INTRODUCTION ....................................................................................................6
1.1
F
EATURES
........................................................................................................................................6
1.2
A
PPLICATION
...................................................................................................................................7
1.3
F
RONT 
P
ANEL 
LED
I
NDICATORS
......................................................................................................8
CHAPTER 2
  INSTALLATION ......................................................................................................9
2.1
H
ARDWARE 
I
NSTALLATION
..............................................................................................................9
CHAPTER 3
  LOGIN VIA WEB BROWSER .............................................................................10
3.1
IP
A
DDRESS
...................................................................................................................................10
3.2
L
OGIN 
P
ROCEDURE
........................................................................................................................ 11
CHAPTER 4 DEVICE .........................................................................................................................12
4.1
D
EVICE 
S
UMMARY
........................................................................................................................13
4.2
R
ESET 
S
TATISTICS
..........................................................................................................................14
4.3
T
ROUBLESHOOT
............................................................................................................................15
4.4
W
IRELESS
......................................................................................................................................17
4.4.1 Enable Wireless............................................................................................................. 19
4.4.2 Wireless - Security Configure..................................................................................19
4.4.3 WPS Setup......................................................................................................................22
4.4.4 Wireless - Advanced Configure............................................................................... 26
4.5
R
ESTART 
Y
OUR 
S
YSTEM
................................................................................................................28
4.6
H
OME 
N
ETWORK
...........................................................................................................................30
4.7
G
AMING AND 
A
PPLICATIONS
..........................................................................................................32
4.7.1 Incoming Traffic Control............................................................................................ 33
4.7.2 Outgoing Traffic Control ............................................................................................ 35
4.8
R
ESET 
A
CCESS 
C
ODE
.....................................................................................................................37
CHAPTER 5 BROADBAND...............................................................................................................39
5.1
S
TATUS
..........................................................................................................................................39
5.2
C
ONFIGURE
...................................................................................................................................40
CHAPTER 6 HOME NETWORK...................................................................................................... 42
6.1
LAN
S
TATUS
.................................................................................................................................42
6.2
C
ONFIGURE
...................................................................................................................................43
6.3
W
IRELESS 
S
TATUS
.........................................................................................................................48
6.4
W
IRELESS 
C
ONFIGURE
..................................................................................................................49
6.5
W
IRELESS 
MAC
F
ILTER
................................................................................................................50
CHAPTER 7 VOIP............................................................................................................................... 52
4 
7.1
S
TATUS
..........................................................................................................................................53
7.2
SIP ................................................................................................................................................53
7.2.1 Global Parameters .......................................................................................................54
7.2.2 Service Provider............................................................................................................ 55
7.3
RTCP ............................................................................................................................................ 57
7.3.1 Global Parameters ................................................................................................................57
7.3.2 Service Provider ....................................................................................................................58
7.4
T
ELEPHONE 
C
ALLS
........................................................................................................................59
CHAPTER 8 FIREWALL ...................................................................................................................59
8.1
S
TATUS
..........................................................................................................................................61
8.2
I
NBOUND 
F
ILTER
...........................................................................................................................61
8.3
O
UTBOUND 
F
ILTER
........................................................................................................................61
8.4
P
ORT 
F
ORWARDING
........................................................................................................................62
8.5
P
ORT 
T
RIGGERING
.........................................................................................................................65
CHAPTER 9 MAINTENANCE .......................................................................................................... 67
9.1
T
EST
..............................................................................................................................................67
9.2
DSL............................................................................................................................................... 68
9.2.1 xDSL BER Test ..............................................................................................................69
9.2.2 Reset Statistics ............................................................................................................. 71
9.2.3 Draw Graph Tone ......................................................................................................... 71
9.2.4 Draw Loss of Signal Graph .......................................................................................72
9.2.5 Draw Loss of Frames Graph.....................................................................................72
9.2.6 Loss of Power................................................................................................................. 73
9.3
P
ING
/T
RACEROUTE
/NSL
OOKUP
....................................................................................................74
9.3.1 Ping....................................................................................................................................74
9.3.2 TraceRoot........................................................................................................................ 75
9.3.3 NSLookup........................................................................................................................75
9.4
S
YSTEM 
L
OG
.................................................................................................................................76
9.4.1 Refresh.............................................................................................................................77
9.4.2 Export Syslog................................................................................................................. 77
9.5
P
ASSWORD
.....................................................................................................................................79
9.5.1 Use New Access Code.................................................................................................80
9.5.2 Clear Input...................................................................................................................... 80
9.5.3 Reset to Default Access Code.................................................................................. 80
9.6
U
PGRADE
.......................................................................................................................................81
9.7
R
EBOOT
.........................................................................................................................................82
9.8
F
ACTORY 
R
ESET
............................................................................................................................83
5 
APPENDIX A: FIREWALL ................................................................................................................ 85
APPENDIX B: PIN ASSIGNMENTS................................................................................................. 89
APPENDIX C: SPECIFICATIONS.................................................................................................... 90
APPENDIX D: SSH CLIENT ............................................................................................................. 93
6 
Chapter 1    Introduction 
The NexusLink 5700 Wireless ADSL bonding IAD features flexible networking 
connectivity with dual ADSL line capability, four 10/100 Ethernet ports, and an 
802.11g wireless LAN access point.    It has robust routing capabilities to segment 
and direct data streams and allows for multiple data encapsulations. 
The NexusLink 5700 is a black box solution for deploying Triple Play architectures, 
doubling bandwidth (48Mbps) performance over traditional ADSL2 modems.    It 
provides higher level performance with embedded security, QoS, VPN and remote 
management functions.    As an added bonus, the USB host acts as a printer hub and 
will enable future product enhancements available by software upgrade.
1.1  Features 
• NexusLink 5700 (Annex M) 
• Dual ADSL2 PTM bonded 
• Wi-Fi Support 
• UPnP installation 
• Integrated 802.11b/g/n 
• WPA and 802.1x 
• RADIUS client 
• IP /MAC address filtering 
• Static route/RIP/RIP v2 routing functions 
• Dynamic IP assignment 
• NAT/PAT 
• IGMP Proxy and fast leave 
• DHCP Server/Relay/Client   
• DNS Relay 
• Supports 16 VCs 
• Embedded SNMP agent 
• Web-based management 
• Remote configuration and upgrade 
• Supports TR-069/TR-098/TR-104/TR-111 For Remote Management 
• Configuration backup and restoration 
• FTP server 
• TFTP server 

7 
1.2  Application 
This diagram depicts the application of the NexusLink
5700 on a wireless network. 

8 
1.3  Front  Panel  LED  Indicators 
The front panel LED indicators are shown in the picture below, followed by an 
explanation in the table below. 
LED  Color  Mode
Function 
Green  On  The router is powered up. POWER 
  Off  The router is powered down. 
Green  On  An Ethernet Link is established. 
  Off  An Ethernet Link is not established. 
LAN 1X~4X
Green  Blink
Data transmitting or receiving over LAN. 
Green  On  WPS mode exists protected clients 
  Blink
WPS mode is on for 120 seconds 
WPS 
Green  Off  WPS mode is off 
Green  On  The Wireless is ready and idle. 
  Off  The Wireless is not installed. 
WIRELESS 
Green  Blink
Data transmitting or receiving over Wireless
Green 
      On
  The DSL link is established. 
  Off  The DSL link is not established. 
DSL1~DSL2 
Green  Blink
The DSL link is training. 
Green  On  The Internet link (PVC) is established. 
Service 
  Off  The Internet link (PVC) is not established. 
Green  On  The FXS phone 1 is off hook. 
Phone1 
 Off  The FXS phone 1 is on hook. 
Green  On  The FXS phone 2 is off hook. 
Phone2 
 Off  The FXS phone 2 is on hook. 

9 
Chapter 2    Installation 
2.1  Hardware  Installation   
Follow the instructions below to complete the hardware installation.     
A schematic of the back of the router is shown below for reference. 
Connection to Power   
Connect the power jack to the shipped power cord.    Attach the power adapter to 
the wall outlet or other AC source.    After all connections have been made the router 
will perform a self-test.    Wait a few moments and the router will be ready to 
operate. 
Caution 1: If the router fails to power up, or if it malfunctions, first v
erify that the 
power supply is connected correctly.    If the problem persists, contact 
our technical support engineers.     
Caution 2: 
Before servicing or disassembling this equipment always disconnect all 
power cords and telephone lines from the wall outlet. 
Connection to LINE port   
Connect the telephone set to the RJ14 Phone1/ Phone2 port for VoIP service. 
Reset Button 
In the rear panel, there is a reset button. To load the factory default settings, hold 
the reset button down for 5 to 10 seconds.   
Connection to ETH port   
To connect to a hub or PC, use a RJ45 cable. You can connect the router to up to four 
LAN devices.    The ports are auto-sensing MDI/X and either straight-through cable 
or crossover cable can be used.   
DSL   
Connect to the ADSL port with the ADSL RJ14 cable. 
Reset button

10 
Chapter 3    Login via Web Browser 
This section describes how to manage the router via a web browser.    The web page 
is best viewed with Microsoft Internet Explorer 5.0 and later.    Access Code Required: 
#0009@3BFA.    The user can change the Access Code later (see 9.5 Password). 
3.1  IP  Address 
The default IP address of the router (LAN port) is 192.168.1.254    To configure the 
router for the first time, the configuration PC must have a static IP address within 
the 192.168.1.x subnet.    Follow the steps below to configure your PC IP address to 
use subnet 192.168.1.x. 
STEP 1:   Right click on the Local Area Connection under the Network and Dial-Up 
connection window and select Properties. 
STEP 2:   Enter the TCP/IP window and change the IP address to 192.168.1.x/24.     
STEP 3: Click OK to submit settings. 
11 
3.2  Login  Procedure 
Perform the following steps to bring up the web browser and configure the router. 
STEP 1:   Start the Internet browser. Type the IP address for the router in the Web 
address field.    For example, if the IP address is 192.168.1.254, type 
http://192.168.1.254 

12 
Chapter 4 Device 
Select the Device button from the main menu to display the Device Summary 
information as here. 

13 
4.1  Device  Summary 
The main menu has several options, and selecting each of these options opens a 
submenu with more selections. 
Subsequent sections will introduce the other main menu options in sequence.   
The Device Summary screen will display at startup. 

14 
4.2  Reset  Statistics 
To reset all statistics including LAN, WAN and xDSL click Reset Statistics.   
When the following window is displayed, simply click the Reset Statistics button to 
confirm your choice. 

15 
4.3  Troubleshoot 
Your device is capable of testing your DSL connection. Click Troubleshoot and the 
diagnostics window will display. 
The Diagnostics menu provides feedback on the connection status of the device 
and the ADSL link.    Click Troubleshoot to bring up the following window. 
The individual test results are explained below. 

16 
Test  Description 
Ethernet Connection
Pass: indicates that the Ethernet interface from your 
computer is connected to the LAN port of your DSL router. A 
flashing or solid green LAN LED on the router also signifies 
that an Ethernet connection is present and that this test is 
successful. 
Fail: Indicates that the DSL router does not detect the 
Ethernet interface on your computer. 
Wireless Connection
Pass: Indicates that the Wireless interface from your 
computer is connected to the wireless network. 
Down: Indicates that the DSL router does not detect the 
wireless network. 
DSL Synchronization
Pass: Indicates that the DSL modem has detected a DSL 
signal from the telephone company.    A solid WAN LED on the 
router also indicates the detection of a DSL signal from the 
telephone company. 
Fail:
 indicates that the DSL modem does not detect a signal 
from the telephone company’s DSL network.    The WAN LED 
will continue to flash green. 
If a test displays a fail status, click the   button at the 
bottom of this page to make sure the fail status is consistent. If the test continues 
to fail, click Help and follow the troubleshooting procedures. To test the connection 
with your DSL service provider, click the    button. 

17 
4.4  Wireless 
This page allows you to configure basic features of the wireless LAN interface. You 
can enable or disable the wireless LAN interface, hide the network from active scans, 
set the wireless network name (also known as SSID) and restrict the channel set 
based on country requirements. 
Click Wireless to bring up the following window. 
Input the access code (which is located ______) and click the   button.   

18 
The options shown here allow you to configure security features of the wireless LAN 
interface. 

19 
4.4.1 Enable Wireless 
Option  Description 
Enable Wireless 
A checkbox that enables or disables the wireless LAN interface.   
When selected, the Web UI displays Hide Access point, SSID, 
and County settings.    The default is Enable Wireless. 
4.4.2 Wireless - Security Configure 
Wireless security settings can be configured according to Wi-Fi Protected Setup 
(WPS) or Manual Setup. The WPS method configures security settings automatically 
(see 4.4.3 WPS) while the Manual Setup method requires that the user configure 
these settings using the Web User Interface (see the table below). 
Select SSID 
Select the wireless network name from the drop-
down box. SSID stands for Service 
Set Identifier.    All stations must be configured with the corre
ct SSID to access the 
WLAN. If the SSID does not match, that client will not be granted access. 
Network Authentication 
This option specifies whether a network key is used for authentication to the wireless 
network.    If network authentication is set to Open, then no authentication is 
provided.    Despite this, the identity of the client is still verified.     
Each authentication type has its own settings.    For example, selecting 802.1X 
authentication will reveal the RADIUS Server IP address, Port and Key f
ields.    WEP 
Encryption will also be enabled as shown below. 

20 
The settings for WPA authentication are shown below. 
The settings for WPA-PSK authentication are shown next. 
WEP Encryption 
This option specifies whether data sent over the network is encrypted. The same 
network key is used for data encryption and network authentication. Four network 
keys can be defined although only one can be used at any one time. Use the Current 
Network Key list box to select the appropriate network key.   

21 
Security options include authentication and encryption services based on the wired 
equivalent privacy (WEP) algorithm.    WEP is a set of security services used to 
protect 802.11 networks from unauthorized acc
ess, such as eavesdropping; in this 
case, the capture of wireless network traffic.    When data encryption is enabled, 
secret shared encryption keys are generated and used by the source station and the 
destination station to alter frame bits, thus avoiding disclosure to eavesdroppers.
Under shared key authentication, each wireless station is assumed to have received 
a secret shared key over a secure channel that is independent from the 802.11 
wireless network communications channel. 
Encryption Strength 
This drop-down list box will display when WEP Encryption is enabled.    The key 
strength is proportional to the number of binary bits comprising the key.    This 
means that keys with a greater number of bits have a greater degree of security and 
are considerably more difficult to crack.    Encryption strength can be set to either 
64-bit or 128-bit.    A 64-bit key is equivalent to 5 ASCII characters or 10 
hexadecimal numbers.    A 128-bit key contains 13 ASCII characters or 26 
hexadecimal numbers.    Each key contains a 24-bit header (an initiation vector) 
which enables parallel decoding of multiple streams of encrypted data. 
Current Network Key 
Select the required network key. 

22 
4.4.3 WPS Setup 
Wi-Fi Protected Setup (WPS) is an industry standard that simplifies wireless security 
setup  for  certified  network  devices.  Every  WPS  certified  device  has  both  a  PIN 
number  and  a  push  button,  located  on  the  device  or  accessed  through  device 
software. The NexusLink 5700 has both a WPS button on the device and a virtual 
button accessible from the web user interface (WUI). 
To configure security settings with WPS, follow the procedures below. You must 
choose either the Push-Button or PIN configuration method for Steps 6 and 7. 
I. Setup 
Step 1:  Enable WPS by selecting Enabled from the drop down list box shown. 

23 
Step 2:  Set the WPS AP Mode. Configured is used when the NexusLink 5700. 
will assign security settings to clients. Unconfigured is used when an external 
client assigns security settings to the NexusLink 5700. 
NOTES:  Your client may or may not have the ability to provide security settings to 
the NexusLink 5700. If it does not, then you must set the WPS AP mode to 
Configured. Consult the device documentation to check its capabilities. 
  In addition, using Windows Vista, you can add an external registrar using 
the StartAddER button (Appendix E - WPS OPERATION has detailed 
instructions). 
II. NETWORK AUTHENTICATION 
Step 3:  Select Open, WPA-PSK, WPA2-PSK, or Mixed WPA2/WPA-PSK network 
authentication mode from the Manual Setup AP section of the Wireless 
Security screen. The example below shows WPA2-PSK mode. 
Step 4:  For the Pre-Shared Key (PSK) modes, enter a WPA Pre-Shared Key.    You 

24 
will see the following dialog box if the Key is too short or too long. 
Step 5:  Click the    button at the bottom of the window. 
IIIa.    PUSH-BUTTON CONFIGURATION 
The WPS push-button configuration provides a virtual button (accessible from the 
web user interface) configuration method. 
The WPS push-button configuration is described in the procedure below.    It is 
assumed that the Wireless function is Enabled and that the router is configured as 
the Wireless Access Point (AP) of your WLAN.    In addition, the wireless client must 
also be configured correctly and turned on, with WPS function enabled. 
NOTE:  The wireless AP on the router searches for 2 minutes.    If the router stops 
searching before you complete Step 7, return to Step 6. 
Step 6:    WUI virtual button   
  Select the Push-Button radio button in the WPS Setup section of the 
Wireless Security screen, and then click the appropriate button based on 
the WPS AP mode selected in step 2. 
For Configured mode, click the Add Enrollee button. 
Step 7:  Go to your WPS wireless client and activate the push-button function on 
your NexusLink 5700.     
  A typical WPS client screenshot is shown below as an example. 

25 
Now go to Step 8 (part IV. Check Connection) to check the WPS connection. 
IIIb.    WPS – PIN CONFIGURATION 
Using this method, security settings are configured with a personal identification 
number (PIN).    The PIN can be found on the device itself or within the software.   
The PIN may be generated randomly in the latter case.    To obtain a PIN number for 
your client, check the device documentation for specific instructions. 
The WPS PIN configuration is described in the procedure below.    It is assumed that 
the Wireless function is Enabled and that the router is configured as the Wireless 
Access Point (AP) of your wireless LAN.    In addition, the wireless client must also be 
configured correctly and turned on, with WPS function enabled. 
Step 6:    Select the PIN radio button in the WPS Setup section of the Wireless 
Security screen, as shown in A or B below, and then click the appropriate 
button based on the WPS AP mode selected in step 2. 
  A - For Configured mode, enter the client PIN in the box provided and 
  then click the Add Enrollee button (see below). 
  B - For Unconfigured mode, click the Config AP button. 

26 
Step 7:  Activate the PIN function on the wireless client.    For Configured mode, 
the client must be configured as an Enrollee.    For Unconfigured mode, 
the client must be configured as the Registrar.    This is different from the 
External Registrar function provided in Windows Vista.       
The figure below provides an example of a WPS client PIN function in-progress. 
Now go to Step 8 (part IV. Check Connection) to check the WPS connection. 
IV. CHECK CONNECTION 
Step 8:  If the WPS setup method was successful, you will be able access the 
wireless AP from the client.    The client software should show the status.   
The example below shows that the connection established successfully. 
  You can also double-click the Wireless Network Connection icon from the 
Network Connections window (or the system tray) to confirm the status of 
the new connection. 
4.4.4 Wireless - Advanced Configure 
The Advanced page allows you to configure advanced features of the wireless LAN 
interface.   

28 
4.5  Restart  Your  System 
Should you want to reboot the NexusLink 5700, please follow the instructions 
provided below. 

29 
Click Restart your System to bring up the following window. 
When the following window is displayed, simply click the Reboot button to confirm 
your choice. The following window will display. 

30 
4.6  Home  Network 
Click Home Network to bring up the following window. 

31 
Heading  Description 
Interface  LAN interface(s) 
Received/Transmitted:  - Bytes 
  - Pkts 
  - Errs 
  - Drops 
Number of Bytes   
Number of Packets   
Number of packets with errors 
Number of dropped packets   
Click the    button to refresh this screen. 

32 
4.7  Gaming  and  Applications 
This window allows you to modify your firewall settings. 
Click Gaming and Applications to bring up the following window. 

33 
4.7.1 Incoming Traffic Control 
IP filtering allows you to create a filter rule to identify outgoing/incoming IP traffic 
by specifying a new filter name and at least one condition below. All of the specified 
conditions in this filter rule must be satisfied for the rule to take effect.   
The default setting for all Incoming traffic is Blocked. 
To add or remove IP filters, Click     
Input the access code (which is located ______) and click the   button.   
The options are shown (on the following page)   
To add a filtering rule, click the    button.    The following window will be 
displayed. 

34 
Filter Name  Type a name for the filter rule. 
Rule Order  Execute IP Filter order. (Available in future 
versions). 
IP Version  IPv4 selected by default. 
Protocol  User can select: TCP, TCP/UDP, UDP or ICMP.
Source IP address  Input source IP address. 
Source Subnet Mask  Input source subnet mask. 
Source Port (port or port:port)  Input source port number. 
Destination IP address  Input destination IP address. 
Destination Subnet Mask  Input destination subnet mask. 
Destination port (port or port:port)
Input destination port number. 
Click    to save and activate the filter. 
Click    to delete a filter. 

35 
4.7.2 Outgoing Traffic Control 
IP filtering allows you to create a filter rule to identify outgoing/incoming IP traffic 
by specifying a new filter name and at least one condition below. All of the specified 
conditions in this filter rule must be satisfied for the rule to take effect.   
The default setting for all Outgoing traffic is Accepted. 
To add or remove IP filters, Click   
Input the access code (which is located ______) and click the   button.   
The options are shown (on the following page)   

36 
To add a filtering rule, click the    button.    The following window will be 
displayed. 
Filter Name  Type a name for the filter rule. 
Rule Order  Execute IP Filter order. (Available in future 
versions). 
IP Version  IPv4 selected by default. 
Protocol  User can select: TCP, TCP/UDP, UDP or ICMP.
Source IP address  Input source IP address. 
Source Subnet Mask  Input source subnet mask. 
Source Port (port or port:port)  Input source port number. 
Destination IP address  Input destination IP address. 
Destination Subnet Mask  Input destination subnet mask. 
Destination port (port or port:port)
Input destination port number. 
Click    to save and activate the filter. 

37 
Click    to delete a filter. 
4.8  Reset  Access  Code 
To help prevent unauthorized access to your router, be sure you record your Modem 
Access Code and safeguard it just as you would any other password or PIN number. 
Should you need access to your router (for example, to make configuration changes 
or to change your Internet Service Provider login password) you will need the 
modem access code.   
Note: This modem access code is separate from the password that you use 
to log in to your Internet Service Provider, and it is strongly recommend 
you use a different value for your access code for security reasons.   
Click Reset access code to bring up the following window. 
If you have lost or forgotten your new access code, click 

38 
  to se to default. 

39 
Chapter 5 Broadband 
This window shows the existing WAN status. 
5.1  Status   
Click Broadband to display the status of all configured PVC(s).   
Port/VPI/VCI  Shows the values of the ATM Port/VPI/VCI 
VLAN Mux  Shows 802.1Q VLAN ID 
Con. ID  Shows the connection ID 
Category  Shows the ATM service classes 
Service    Shows the name for WAN connection 
Interface    Shows connection interfaces 
Protocol  Shows the connection type, such as PPPoE, PPPoA, etc. 
IGMP  Shows the statue of the IGMP function 
State  Shows the connection state of the WAN connection 
Status  Lists the status of DSL link 
IP Address  Shows IP address for WAN interface 
Click    to reset the status of all configured PVC(s).   

40 
5.2  Configure 
Click Configure will bring up the following window. 
Input the access code (which is located ______) and click the   button.   
The options are shown (on the following page)   

41 
Select the configuration for the broadband utilization of the DSL lines. Any Changes 
to DSL Bonding Config will require a reboot. 
Select one of the three options (DSL Auto, DSL on inner pair, DSL on outer pair) from 
the drop down menu and tick the Enable 802.1x auto start box if required. Click the 
  button to confirm your choice(s). 

42 
Chapter 6 Home Network 
The Home Network – LAN Status screen shows interface statistics for Ethernet and 
Wireless interfaces.   
6.1  LAN  Status 
The Network Statistics screen shows interface statistics for LAN of Ethernet 
interface. Here provides byte transfer, packet transfer, Error and Drop statistics for 
the LAN interface.) 
Click the    button to refresh this screen. 

43 
6.2  Configure 
Click Configure to bring up the following window. 
Input the access code (which is located ______) and click the   button.   
The options are shown (on the following page)   

44 
Configure the DSL router IP address and subnet mask for the LAN interface. 
IP ADDRESS: ENTER THE IP ADDRESS FOR THE LAN PORT. 
SUBNET MASK: ENTER THE SUBNET MASK FOR THE LAN PORT. 
DHCP Server:   To enable DHCP, select Enable DHCP server and enter Start and 
End IP addresses and the Leased Time. This setting configures the 
router to automatically assign IP, default gateway and DNS server 
addresses to every PC on your LAN. 
Static IP Lease List:    A maximum of 32 entries can be configured. 

45 
Click    to add a DHCP static IP lease. The following window will be 
displayed. 
Input the MAC address and Static IP address and then click   
To remove an entry, tick the corresponding checkbox  in the Remove column and 
then click the    button. 
Click    to input the secondary subnet mask for the LAN port. 

46 
To create a new subnet group for LAN Devices:   
1. Enter the Group name and the group name must be unique   
2. Select the intended application of the new subnet group   
3. Enter the corresponding IP and DHCP address   
4. Passthrough MAC Address only needs to be entered in passthrough mode for the 
specific device that needs to share the WAN IP address   
5. You can define the IP address of the router device within the subnet in Route To 
LAN IP Address for automatic routing rules to direct traffics to it; If the routing 
requires a different subnet set, you can define it in Routing Subnet   
6. If Secondary IP Address is empty, it will be calculated as one address less than 
the last address of the defined subnet for the dhcp server.   
Note: For Passthrough mode to correctly route the traffic, you need to reboot the 
gateway   
2
ND
 LAN INTERFACE 
To configure a secondary IP address, tick the checkbox  as shown here. 

47 
IP Address: Enter the secondary IP address for the LAN port. 
Subnet Mask: Enter the secondary subnet mask for the LAN port.   
Click      to confirm.   
Ethernet Media Type: Each LAN port has Speed/Duplex Negotiation detection 
capability, the LAN ports detect the speed (for example, 10MBps, 100Mbps) and 
duplex (half-duplex or full-duplex) settings of the device on the other end of the 
wire and subsequently adjusts to match those settings. During speed/duplex 
negotiation the device transmits its own abilities to the peer device so that the peer 
can use the appropriate settings.   
Auto: Auto detects Speed/Duplex Negotiation 
10_Half: The speed limit is 10M and Duplex Negotiation is half. 
10_Full: The speed limit is 100M and Duplex Negotiation is full. 
100_Half: The speed limit is 100M and Duplex Negotiation is half. 
100_Full: The speed limit is 100M and Duplex Negotiation is full. 

48 
6.3  Wireless  Status 
Click Wireless Status to bring up the following window. 
Click    to reset the screen. 

49 
6.4  Wireless  Configure 
This page allows you to configure basic features of the wireless LAN interface. You 
can enable or disable the wireless LAN interface, hide the network from active scans, 
set the wireless network name (also known as SSID) and restrict the channel set 
based on country requirements. 
See section: 4.4 Wireless for a detailed description. 

50 
6.5  Wireless  MAC  Filter 
When a device is using MAC filtering, any address not explicitly defined will be 
denied access. 
This MAC Filter page allows access to be restricted/allowed based on a MAC address. 
All (Network Interface Cards) NICs have a unique 48-bit MAC address burned into 
the ROM chip on the card.    When MAC address filtering is enabled, you are 
restricting the NICs that are allowed to connect to your access point.    Therefore, an 
access point will grant access to any computer that is using a NIC whose MAC 
address is on its “allows” list. 
Click Wireless MAC Filter to bring up the following window. 

51 
MAC Restrict mode: Off- disables MAC filtering; Allow – permits access for the 
specified MAC address; deny; reject access of the specified MAC address, then click 
the SET button.   
Option
Description 
MAC 
Restrict 
Mode 
Radio buttons that allow settings of; 
Off: MAC filtering function is disabled. 
Allow: Permits PCs with listed MAC addresses to connect to access point.
Deny: Prevents PCs with listed MAC from connecting to the access point.
MAC 
Address
Lists the MAC addresses subject to the Off, Allow, or Deny instruction.   
The Add button prompts an entry field that requires you type in a MAC 
address in a two-character, 6-
byte convention: xx:xx:xx:xx:xx:xx where 
xx are hexadecimal numbers.    The maximum number of MAC addresses 
that can be added is 60. 
To add a MAC entry, click    and input a MAC address 
Click    to add the MAC address to the wireless MAC address filters. To 
delete an entry, select the entry, click the    button. 

52 
Chapter 7 VOIP 
This chapter first describes the various options for configuration of the SIP voice 
service. It then provides detailed instructions for making telephone calls using VoIP 
(Voice over IP) or PSTN (Public Switched Telephone Network)
(1)
 services.     
Session Initiation Protocol (SIP) is a peer-to-peer protocol used for Internet 
conferencing, telephony, events notification, presence and instant messaging.     
SIP is designed to address the functions of signaling and session management 
within a packet telephony network.    Signaling allows call information to be carried 
across network boundaries.    Session management provides the ability to control 
the attributes of an end-to-end call.     
(1) The NexusLink 5700 supports Phone Line (FXS) interface only, which cannot dial to the 
local PSTN network.   
NOTE:    The SIP standard is set by the Internet Engineering Task Force (IETF).   
The SIP standard defines the following agents/servers: 
  User Agents (UA) - SIP phone clients (hardware or software) 
  Proxy Server – relays data between UA and external servers 
  Registrar Server - a server that accepts register requests from UA 
  Redirect Server – provides an address lookup service to UA 

53 
7.1  Status 
Displays the call summary. 
7.2  SIP 
Click SIP to bring up the following window. 
The settings of Global Parameters and Service Provider please contact with your ISP 

54 
servicer. 
7.2.1 Global Parameters 
Start SIP client: Active SIP service (Internet telephony calls)   
Stop SIP client: Inactive SIP service (Internet telephony calls) 
About the setting of Global Parameters or want to know any detail information 
please contact with your ISP servicer. 
A common parameter setting. 

55 
7.2.2 Service Provider 
This screen contains basic SIP configuration settings. 
Start SIP client: Active SIP service (Internet telephony calls)   
Stop SIP client: Inactive SIP service (Internet telephony calls) 
About the setting of Service Provider or want to know any detail information please 
contact with your ISP servicer. 
VoIP settings are set by your service provider. 

56 
Once settings are configured, click    to begin using the service. 
Click    to cease using the service. 

57 
7.3  RTCP 
For VoIP voice quality reporting, a SIP event package is specified to report RTCP and 
RTCP-XR summaries; SIP method options are provided to convey such events to a 
collector.     
7.3.1 Global Parameters 
A common parameter setting. 

58 
7.3.2 Service Provider 
This screen contains basic SIP configuration settings. 
NL5700 will collect and report on a set of voice quality metrics on a per-call basis to a 
centralized collector via SIP. 
There are two primary components: First, an IETF-proposed specification is customized to 
define the format of a Voice Quality (VQ) report and to select metrics contained within the 
report.    Second, two candidates SIP methods are proposed for the gateway to convey the VQ 
report to a third-party collector. 

59 
7.4  Telephone  Calls 
AT&T CVoIP Star Codes 
This tab is a list of star codes planned for use by AT&T CVoIP. 
Code
Description 
TBD  Blind Transfer - Invoke 
TBD  Call Forwarding to Voice Mail - Activate 
*312  Simultaneous Ringing - Activate 
*313  Simultaneous Ringing - Deactivate 
*370  Call Waiting - Activate (persistent) 
*371  Call Waiting - Cancel (persistant) 
*372  Call Forwarding Unregistered User - Activate 
*373  Call Forwarding Unregistered User - Deactivate 
*374  Call Forwarding Unreachable Calls to Voice Mail - Activate 
*375  Call Forwarding Unreachable Calls to Voice Mail - Deactivate 
*57  Customer originated Trace - Invoke 
*61  Distinctive Ring Call Waiting 
*63  Selective Call Forwarding - Activate 
*64  Selective Call Acceptance - Activate 
*66  Automatic Call Back (redial last outbound number) - Invoke 
*67  Calling Line Identification - Cancel (make private) 
*68  Selective Call Rejection - Activate 
*69  Automatic Recall (return last incoming call) - Invoke 
*70  Call Waiting - Cancel (mid call) 
*70  Call Waiting - Cancel (per call) 
*72  Call Forwarding (always) - Activate 
*73  Call Forwarding (always) - Deactivate 
*74  Speed Call Short 
*75  Speed Call Long 
*77  Anonymous Call Rejection - Activate 
*78  Do not Disturb - Activate 
*78  Call Park 
*79  Do not Disturb - Deactivate 
*79  Call Park Retrieve 
*80  Selective Call Rejection - Deactivate 

60 
*81  Distinctive ring 
*82  Calling Line Identification Restriction – Cancel (make public) 
*83  Selective Call Forwarding - Deactivate 
*84  Selective Call Acceptance - Deactivate 
*86  Automatic Call Back Deactivate 
*87  Anonymous Call Rejection - Deactivate 
*89  Automatic Recall Deactivate 
*90  Call Forwarding Busy - Activate 
*91  Call Forwarding Busy - Deactivate 
*92  Call Forwarding No Answer - Activate 
*93  Call Forwarding No Answer - Deactivate 
*95  Automatic Call Control VRU 
*98  Voicemail 
*99  Trunk Answer Any Station 
N/A  Ring Back when Free (RBwF) - Cancel 

61 
Chapter 8 Firewall   
The gateway is protected by firewall from unfriendly network attacks on the system.
8.1  Status   
Displays your firewall setting.   
8.2  Inbound  Filter 
See section: 4.7.1 Incoming Traffic Control for a detailed description. 
8.3  Outbound  Filter   
See section: 4.7.2 Outgoing Traffic Control for a detailed description 

62 
8.4  Port  Forwarding 
Port forwarding allows you to direct incoming traffic from the WAN side (identified by 
Protocol and External port) to the Internal server with private IP addresses on the 
LAN side.    The Internal port is required only if the external port needs to be 
converted to a different port number used by the server on the LAN side.   
A maximum of 32 entries can be configured. 
Click Port Forwarding will bring up the following window. 
Input the access code (which is located ______) and click the   button.   
The options are shown (on the following page)   

63 
Click    to display the following window.   
Select a Service 
or 
Custom Server 
User should select the service from the list. 
or 
User can enter the name of their choice. 
Server IP Address  Enter the IP address for the server. 
External Port Start  Enter the starting external port number (when you select 
Custom Server). When a service is selected the port ranges 
are automatically configured. 
External Port End  Enter the ending external port number (when you select 
Custom Server). When a service is selected the port ranges 
are automatically configured. 
Protocol  User can select from: TCP, TCP/UDP or UDP. 
Internal Port Start  Enter the internal port starting number (when you select 

64 
Custom Server). When a service is selected the port ranges 
are automatically configured 
Internal Port End  Enter the internal port ending number (when you select 
Custom Server). When a service is selected the port ranges 
are automatically configured. 
Click    to forward IP packets for this service to the specified server. 
Click    to delete an entry. 

65 
8.5  Port  Triggering 
Some applications require that specific ports in the router’s firewall be opened for 
access by the remote parties. Port Trigger dynamically opens up the ‘Open Ports’ in 
the firewall when an application on the LAN initiates a TCP/UDP connection to a 
remote party using the ‘Triggering Ports’. The router allows the remote party from 
the WAN side to establish new connections back to the application on the LAN side 
using the ‘Open Ports’. A maximum 32 entries can be configured. 
Click Port Triggering to bring up the following window. 
To add a Trigger Port, simply click  . The following will be displayed. 

66 
You  can  configure  the  port  settings  from  this  screen  by  selecting  an  existing 
application or creating your own (Custom application)and click    to add 
it. 
Click    to delete an entry. 
Select an Application 
Or Custom Application
User should select the application from the list. 
Or User can enter the name of their choice. 
Trigger Port Start  Enter the starting trigger port number (when you select 
custom application). When an application is selected the 
port ranges are automatically configured. 
Trigger Port End  Enter the ending trigger port number (when you select 
custom application). When an application is selected the 
port ranges are automatically configured. 
Trigger Protocol  User can select from: TCP, TCP/UDP or UDP. 
Open Port Start  Enter the starting open port number (when you select 
custom application). When an application is selected the 
port ranges are automatically configured. 
Open Port End  Enter the ending open port number (when you select 
custom application). When an application is selected the 
port ranges are automatically configured. 
Open Protocol  User can select from: TCP, TCP/UDP or UDP. 

67 
Chapter 9 Maintenance 
The Diagnostics menu provides feedback on the connection status of the device 
and the ADSL link.    The individual tests are listed below.   
9.1  Test 
The individual tests are listed below. If a test displays a fail status, click "Rerun 
Diagnostic Tests" at the bottom of this page to make sure the fail status is consistent. 
If the test continues to fail, click "Help" and follow the troubleshooting procedures. 
If a test displays a fail status, click   at the bottom of 
this page to make sure the fail status is consistent. If the test continues to fail, click 
Help and follow the troubleshooting procedures. To test the connection with your 
DSL service provider, click   

68 
9.2  DSL 
Click DSL to display the xDSL Diagnostics window. 
Consult the table below for descriptions of each field. 

69 
Field  Description 
Mode  Line Coding format, that can be selected G.dmt, G.lite, 
T1.413, ADSL2 
Traffic Type  Channel type Interleave or Fast 
Status  Lists the status of the DSL link 
Link Power State  Link output power state. 
Line Coding  Trellis On/Off 
SNR Margin (dB)  Signal to Noise Ratio (SNR) margin 
Attenuation (dB)  Estimate of average loop attenuation in the do
wnstream 
direction. 
Output Power (dBm)  Total upstream output power 
Attainable Rate (Kbps)  The sync rate you would obtain. 
Rate (Kbps)  Current sync rate. 
Super Frames  Total number of super frames 
Super Frame Errors  Number of super frames received with errors 
RS Words  Total number of Reed-Solomon code errors 
RS Correctable Errors  Total Number of RS with correctable errors 
RS Uncorrectable Errors 
Total Number of RS words with uncorrectable errors 
HEC Errors  Total Number of Header Error Checksum errors 
OCD Errors  Total Number of out-of-cell Delineation errors 
LCD Errors  Total number of Loss of Cell Delineation 
Total Cells  Total number of ATM cells (including idle + data cells) 
Data Cells  Total number of ATM data cells 
Bit Errors  Total number of bit errors 
Total ES:  Total Number of Errored Seconds 
Total SES:  Total Number of Severely Errored Seconds   
Total UAS:  Total Number of Unavailable Seconds 
9.2.1 xDSL BER Test 
Click    on the xDSL Statistics screen to test the Bit Error Rate 

70 
(BER). A small pop-up window will open after the button is pressed, as shown below. 
Click Start to start the test or click Close to cancel the test.   
After the BER testing is complete, the pop-up window will display as follows.   

71 
9.2.2 Reset Statistics 
Click    to refresh the screen. 
9.2.3 Draw Graph Tone     
Click    to display the current xDSL bits per tone status. The X 
axis represents Tone Number and the Y axis represents Bit Allocation. 

72 
9.2.4 Draw Loss of Signal Graph 
Click    to display the loss of signal within each 15 minute intervals 
for the last 24 hours. The X axis represents Time and the Y axis represents Errors 
Observed. 
9.2.5 Draw Loss of Frames Graph 
Click    to display the loss of frames within each 15 minute 

73 
intervals for the last 24 hours. The X axis represents Time and the Y axis represents 
Errors Observed. 
9.2.6 Loss of Power 
Click    to display the loss of power within each 15 minute intervals 
for the last 24 hours. The X axis represents Time and the Y axis represents Errors 
Observed. 

74 
9.3  Ping/Traceroute/NSLookup 
Click Ping/Traceroute/NSLookup to bring up the following window. 
9.3.1 Ping 
Ping: Used to test the reach ability of a host on an Internet Protocol (IP) network 
and to measure the round-trip time for messages sent from the originating host to 
a destination computer 
Click    to seek a reply from an IP address. 

75 
9.3.2 TraceRoute   
TraceRoute: Used to show the route taken by packets across an IP network 
Traceroute is often used for network troubleshooting. By showing a list of routers 
traversed, it allows the user to identify the path taken to reach a particular 
destination on the network. 
Click    to trace the route of an IP address. 
9.3.3 NSLookup 
Nslookup:Used to query Domain Name System (DNS) servers to find DNS details, 
including IP addresses of a particular computer, MX records for a domain and the NS 
servers of a domain. 

76 
Click    to lookup the name server of an IP address. 
9.4  System  Log 
The System Log option allows you to view the system events log. 
Click System Log to bring up the following window. 

77 
9.4.1 Refresh 
Click    to update the System Log. 
9.4.2 Export Syslog 
Click    to bring up the following window. 

78 
Click    to save the system log file. 

79 
9.5  Password 
Click Password to bring up the following window. 
Input the access code (which is located ______) and click   
The options are shown (on the following page)   

80 
9.5.1 Use New Access Code 
Select User, enter the current access code and the new access code. Hen retype the 
new access code. 
Click     
9.5.2 Clear Input 
Click    to delete what you have entered.    
9.5.3 Reset to Default Access Code 
Click    to reset to default. 

81 
9.6  Upgrade 
Click Upgrade to bring up the following window. 
Input the access code (which is located ______) and click   
  The options are shown (on the following page)   
Click    to start the upgrade process. 

82 
9.7  Reboot 
Click    to reboot the gateway. 
The following window will be displayed. 

83 
9.8  Factory  Reset 
Click Factory Reset to bring up the following window. 
Input the access code (which is located ______) and click   
The options are shown (on the following page)   
Click    to restore the DSL gateway to the factory 
defaults. 

84 
Click OK to confirm. 
Click OK to confirm. 
85 
Appendix A: Firewall 
Stateful Packet Inspection 
Refers to an architecture, where the firewall keeps track of packets on each 
connection traversing all its interfaces and makes sure they are valid. This is in 
contrast to static packet filtering which only examines a packet based on the 
information in the packet header. 
Denial of Service attack 
Is an incident in which a user or organization is deprived of the services of a 
resource they would normally expect to have. Various DoS attacks the device can 
withstand are: ARP Attack, Ping Attack, Ping of Death, Land, SYN Attack, Smurf 
Attack and Tear Drop. 
TCP/IP/Port/Interface filtering rules 
These rules help in the filtering of traffic at the Network layer i.e. Layer 3. 
When a Routing interface is created "Enable Firewall" must be checked. 
Navigate to Advanced Setup -> Security -> IP Filtering, web page. 
Outbound Filter: Helps in setting rules to DROP packets from the LAN   
interface. By default if Firewall is Enabled all IP traffic from LAN is allowed. By 
setting up one or more filters, particular packet types coming from the LAN can be 
dropped. 
Filter Name: User defined Filter Name. 
Protocol: Can take on any values from: TCP/UDP, TCP, UDP or ICMP 
Source IP Address/Source Subnet Mask: Packets with the particular “Source IP 
Address/Source Subnet Mask" combination will be dropped. 
Source Port: This can take on either a single port number or a range of port 
numbers. Packets having a source port equal to this value or falling within the range 
of port numbers (portX : portY) will be dropped. 
Destination IP Address/Destination Subnet Mask: Packets with the particular 
"Destination IP Address/Destination Subnet Mask" combination will be dropped. 

86 
Destination Port: This can take on either a single port number or a range 
of port numbers. Packets having a destination port equal to this value or falling 
within the range of port numbers (portX : portY) will be dropped. 
Examples: 
1.    Filter Name      : Out_Filter1 
    Protocol       : TCP 
    Source Address    : 192.168.1.45 
    Source Subnet Mask  : 255.255.255.0 
    Source Port      : 80 
    Dest. Address    : NA 
    Dest. Sub. Mask    : NA 
    Dest. Port      : NA 
This filter will Drop all TCP packets coming from LAN with IP Address/Sub. Mask 
192.168.1.45/24 having a source port of 80 irrespective of the destination. All other 
packets will be Accepted. 
2.      Filter Name      : Out_Filter2 
    Protocol       : UDP 
    Source Address    : 192.168.1.45 
    Source Subnet Mask  : 255.255.255.0 
    Source Port      : 5060:6060 
    Dest. Address    : 172.16.13.4 
    Dest. Sub. Mask    : 255.255.255.0 
    Dest. Port      : 6060:7070 
This filter will drop all UDP packets coming from LAN with IP Address/Sub. Mask 
192.168.1.45/24 and a source port in the range of 5060 to 6060, destined 
to 172.16.13.4/24 and a destination port in the range of 6060 to 7070 
Inbound Filter:Helps in setting rules to ACCEPT packets from the WAN interface. 
By default all incoming IP  traffic from WAN is Blocked, if the Firewall is Enabled. 
By setting up one or more filters, particular packet types coming from the WAN can 
be Accepted. 
Filter Name: User defined Filter Name. 
87 
Protocol: Can take on any values from: TCP/UDP, TCP, UDP or ICMP 
Source IP Address/Source Subnet Mask: Packets with the particular "Source IP 
Address/Source Subnet Mask" combination will be accepted. 
Source Port: This can take on either a single port number or a range of port 
numbers. Packets having a source port equal to this value or falling within the range 
of port numbers (portX : portY) will be accepted. 
Destination IP Address/Destination Subnet Mask: Packets with the particular 
"Destination IP Address/Destination Subnet Mask" combination will be accepted. 
Destination Port: This can take on either a single port number or a range of port 
numbers. Packets having a destination port equal to this value or falling within the 
range of port numbers(portX : portY) will be accepted. 
The WAN interface on which these rules apply needs to be selected by the user. 
Examples: 
1.      Filter Name        : In_Filter1 
            Protocol         : TCP 
    Source Address      : 210.168.219.45 
    Source Subnet Mask    : 255.255.0.0 
    Source Port        : 80 
    Dest. Address      : NA 
    Dest. Sub. Mask      : NA 
    Dest. Port        : NA 
Selected WAN interface: mer_0_35/nas_0_35 
This filter will ACCEPT all TCP packets coming from WAN interface 
mer_0_35/nas_0_35 with IP Address/Sub. Mask 210.168.219.45/16 having a 
source port of 80 irrespective of the destination. All other incoming packets on this 
interface are DROPPED. 
88 
2.      Filter Name        : In_Filter2 
    Protocol         : UDP 
    Source Address      : 210.168.219.45 
    Source Subnet Mask    : 255.255.0.0 
    Source Port        : 5060:6060 
    Dest. Address      :192.168.1.45 
    Dest. Sub. Mask      : 255.255.255.0 
    Dest. Port        : 6060:7070 
This rule will ACCEPT all UDP packets coming from WAN interface 
mer_0_35/nas_0_35 with IP Address/Sub. Mask 210.168.219.45/16 and a 
source port in the range of 5060 to 6060, destined to 192.168.1.45/24 and a 
destination port in the range of 6060 to 7070. All other incoming packets on this 
interface are DROPPED.   

89 
Appendix B: Pin Assignments 
Line port (RJ14) 
Pin  Definition  Pin  Definition 
1  -  4  ADSL_TIP1 
2  ADSL_TIP2  5  ADSL_RING2 
3  ADSL_RING1  6  - 
LAN Port (RJ45) 
Pin  Definition  Pin  Definition 
1  Transmit data+  5  NC 
2  Transmit data-  6  Receive data- 
3  Receive data+  7  NC 
4  NC  8  NC 
90 
Appendix C: Specifications 
Rear Panel 
  RJ-14 X1 for ADSL2+ bonded, RJ-45 X 4 for LAN, Reset Button X 1,   
  WPS button x1, WIFI button x1 Wi-Fi Antenna x 1       
ADSL                             
 ADSL standard      ITU-T G.992.5, ITU-T G.992.3, ITU-T G.992.1,   
                                                  ANSI T1.413 Issue 2AnnexM          
  ADSL2 Bonded    Downstream : 48 Mbps Upstream : 2.6 Mbps 
ADSL2+ Bonded      Downstream : 48 Mbps Upstream : 2.6 Mbps 
ADSL2+ non-Bonded    Downstream : 24 Mbps Upstream : 1.3 Mbps 
ADSL2 non-Bonded    Downstream : 12 Mbps Upstream : 1.3 Mbps 
G.DMT            Downstream : 8Mbps Upstream : 832kbps 
LAN                                                                       
  Standard        IEEE 802.3, IEEE 802.3u                             
  10/100 BaseT     Auto-sense                                       
  MDI/MDX support    Yes         
Wireless 
  Standard    IEEE802.11b/g/n, backward compatible with 802.11b             
  Encryption  64, 128-bit Wired Equivalent Privacy (WEP) Data Encryption 
  Channels   11 Channels (US, Canada) 
  Data Rate  Up to 300Mbps         
  BSSID    Multiple           
  WPA     Yes         
  WPA2    Yes 
WEP                    Yes 
WDS    Yes                         
  IEEE 802.1x  Yes     
10,25,50,100mW@22MHz channel bandwidth output power level can be         
91 
selected according to the environment 
ATM Attributes                                                     
  RFC 2364 (PPPoA), RFC 2684 (RFC 1483) Bridge/Route; RFC 2516 (PPPoE); 
  RFC 1577 (IPoA)                                                                                     
  Support PVCs    16               
  AAL type     AAL5                                   
  ATM service class  UBR/CBR/VBR-rt/VBR-nrt 
  ATM UNI support  UNI3.1/4.0                               
  OAM F4/F5    Yes               
Management                                                               
  SNMP, Telnet, Web-based management, Configuration backup and restoration                         
  Software upgrade via HTTP, TFTP server, or FTP server     
          Supports TR-069/TR-098/TR-111 for Remote Management 
Bridge Functions                                                                                                           
  Transparent bridging and learning    IEEE 802.1d                           
  VLAN support            Yes                                                 
  Spanning Tree Algorithm                      Yes                                                              
  IGMP Proxy            Yes     
IGMP Snooping          Yes 
Voice   
SIP: RFC 3261 
Codec: G.711, G.723.1, G.726, G.729ab 
RTP: RFC 1889 
SDP: RFC 2327 
Caller ID: ETSI based 
Routing Functions                                                                                                                 
Static route, RIP, and RIPv2, NAT/PAT, DHCP Server/DHCP Relay, DNS Relay, ARP                                                                                       
Security Functions                                                                                                                   
  Authentication protocols  PAP, CHAP,                                     
  TCP/IP/Port filtering rules, Port triggering/Forwarding, Packet and MAC address 
  filtering, SSH    
92 
Application Passthrough                 
  PPTP, L2TP, IPSec, VoIP, Yahoo messenger, ICQ, RealPlayer, NetMeeting, MSN,   
  X-box, etc     
O
S Supported for USB driver                                                                                                                                                                                                       
Windows 2000/XP/ME/98SE                                                                                                                                                                                 
Power Supply                                       
  External power adapter 100-240Vac
 Environment Condition                                                                                                                     
  Operating temperature  0 ~ 40 degrees Celsius                 
  Relative humidity  5 ~ 95% (non-condensing)     
Dimensions                                                                                                                                         
  205 mm (W) x 48 mm (H) x 145 mm (D)                 
Certifications                                                                                                       
  FCC Part 15 class B, FCC Part 68, CE                 
    Kit Weight 
Kit    0.98 KG 
NOTE: Specifications are subject to change without notice 
93 
Appendix D: SSH Client 
Linux OS comes with ssh client. Microsoft Windows does not have ssh client but 
there is a public domain one “putty” that you can download. 
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html 
To access the router using Linux ssh client: 
From LAN: Use the router WEB UI to enable SSH access from LAN. 
(default is enabled) 
type: ssh -l admin 192.168.1.1 
From WAN: In the router, use WEB UI to enable SSH access from WAN. 
type: ssh -l support 
router-WAN-ip-address 
To access the router using Windows putty ssh client: 
From LAN: Use the router WEB UI to enable SSH access from LAN 
(default is enabled) 
type: putty -ssh -l admin 192.168.1.1 
From WAN: In the router, use WEB UI to enable SSH access from WAN. 
type: putty -ssh -l support 
router-WAN-ip-address