Comtrend 5700 Wireless ADSL IAD User Manual UM NexusLink 5700 C1 0
Comtrend Corporation Wireless ADSL IAD UM NexusLink 5700 C1 0
Comtrend >
5.User's manual
NexusLink 5700 Wireless ADSL bonding IAD User’s Manual Version C1.0, October 5, 2010 260101-001 Warning Before servicing or disassembling this equipment, always disconnect all power and telephone lines from the device. Use an appropriate power supply and a UL Listed telephone line cord. Specification of the power supply is clearly stated in Appendix C. Preface This manual provides information to network administrators. It covers the installation, operation and applications of the Wireless ADSL bonding IAD. The individual reading this manual is presumed to have a basic understanding of telecommunications. This document is subject to change without notice. For product update, new product release, manual revision, software upgrade, technical support, etc., visit Comtrend Corporation at http://www.comtrend.com FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B Digital Device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction, may cause harmful interference to radio communication. However, there is no grantee that interference will not occur in a particular installation. If this equipment dose cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on , the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio/TV technician for help FCC Caution: The changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. This device may not cause harmful interference 2. This device must accept any interference received, including interference that may cause undesired operation. FCC Radiation Exposure Statement To comply with the FCC RF exposure compliance requirements, this device and its antenna must not be co-located or operating to conjunction with any other antenna or transmitter. This equipment should be installed and operated with minimum distance 20cmbetween the radiator & your body Copyright Copyright© 2010 Comtrend Corporation. All rights reserved. The information contained herein is proprietary to Comtrend Corporation. No part of this document may be translated, transcribed, reproduced, in any form, or by any means without the prior written consent of Comtrend Corporation. Technical support If you find the product to be inoperable or malfunctioning, please contact a technical support engineer for immediate service by email at INT-support@comtrend.com Save Our Environment This symbol means that when the equipment has reached the end of its useful life, it must be taken to a recycling centre and processed separate from domestic waste. The cardboard box, the plastic contained in the packaging, and the parts that make up this device can be recycled in accordance with regionally established regulations. Never throw-out this electronic equipment along with your household waste. may be subject to penalties or sanctions under the law. Instead, ask for instructions from your municipal government on how to correctly dispose of it. Please be responsible and protect our environment. You Table of Contents CHAPTER 1 INTRODUCTION ....................................................................................................6 1.1 FEATURES ........................................................................................................................................6 1.2 APPLICATION ...................................................................................................................................7 1.3 FRONT PANEL LED INDICATORS ......................................................................................................8 CHAPTER 2 INSTALLATION ......................................................................................................9 2.1 HARDWARE INSTALLATION ..............................................................................................................9 CHAPTER 3 LOGIN VIA WEB BROWSER .............................................................................10 3.1 IP ADDRESS ...................................................................................................................................10 3.2 LOGIN PROCEDURE........................................................................................................................ 11 CHAPTER 4 DEVICE .........................................................................................................................12 4.1 DEVICE SUMMARY ........................................................................................................................13 4.2 RESET STATISTICS ..........................................................................................................................14 4.3 TROUBLESHOOT ............................................................................................................................15 4.4 WIRELESS ......................................................................................................................................17 4.4.1 Enable Wireless.............................................................................................................19 4.4.2 Wireless - Security Configure..................................................................................19 4.4.3 WPS Setup ......................................................................................................................22 4.4.4 Wireless - Advanced Configure...............................................................................26 4.5 RESTART YOUR SYSTEM ................................................................................................................28 4.6 HOME NETWORK ...........................................................................................................................30 4.7 GAMING AND APPLICATIONS..........................................................................................................32 4.7.1 Incoming Traffic Control............................................................................................33 4.7.2 Outgoing Traffic Control ............................................................................................35 4.8 RESET ACCESS CODE .....................................................................................................................37 CHAPTER 5 BROADBAND...............................................................................................................39 5.1 STATUS ..........................................................................................................................................39 5.2 CONFIGURE ...................................................................................................................................40 CHAPTER 6 HOME NETWORK......................................................................................................42 6.1 LAN STATUS .................................................................................................................................42 6.2 CONFIGURE ...................................................................................................................................43 6.3 WIRELESS STATUS .........................................................................................................................48 6.4 WIRELESS CONFIGURE ..................................................................................................................49 6.5 WIRELESS MAC FILTER ................................................................................................................50 CHAPTER 7 VOIP...............................................................................................................................52 7.1 STATUS ..........................................................................................................................................53 7.2 SIP ................................................................................................................................................53 7.2.1 Global Parameters .......................................................................................................54 7.2.2 Service Provider............................................................................................................55 7.3 RTCP ............................................................................................................................................57 7.3.1 Global Parameters ................................................................................................................57 7.3.2 Service Provider ....................................................................................................................58 7.4 TELEPHONE CALLS ........................................................................................................................59 CHAPTER 8 FIREWALL ...................................................................................................................59 8.1 STATUS ..........................................................................................................................................61 8.2 INBOUND FILTER ...........................................................................................................................61 8.3 OUTBOUND FILTER ........................................................................................................................61 8.4 PORT FORWARDING........................................................................................................................62 8.5 PORT TRIGGERING .........................................................................................................................65 CHAPTER 9 MAINTENANCE ..........................................................................................................67 9.1 TEST ..............................................................................................................................................67 9.2 DSL...............................................................................................................................................68 9.2.1 xDSL BER Test ..............................................................................................................69 9.2.2 Reset Statistics .............................................................................................................71 9.2.3 Draw Graph Tone .........................................................................................................71 9.2.4 Draw Loss of Signal Graph .......................................................................................72 9.2.5 Draw Loss of Frames Graph.....................................................................................72 9.2.6 Loss of Power.................................................................................................................73 9.3 PING/TRACEROUTE/NSLOOKUP ....................................................................................................74 9.3.1 Ping....................................................................................................................................74 9.3.2 TraceRoot ........................................................................................................................75 9.3.3 NSLookup ........................................................................................................................75 9.4 SYSTEM LOG .................................................................................................................................76 9.4.1 Refresh.............................................................................................................................77 9.4.2 Export Syslog.................................................................................................................77 9.5 PASSWORD .....................................................................................................................................79 9.5.1 Use New Access Code.................................................................................................80 9.5.2 Clear Input......................................................................................................................80 9.5.3 Reset to Default Access Code..................................................................................80 9.6 UPGRADE.......................................................................................................................................81 9.7 REBOOT .........................................................................................................................................82 9.8 FACTORY RESET ............................................................................................................................83 APPENDIX A: FIREWALL ................................................................................................................85 APPENDIX B: PIN ASSIGNMENTS.................................................................................................89 APPENDIX C: SPECIFICATIONS....................................................................................................90 APPENDIX D: SSH CLIENT .............................................................................................................93 Chapter 1 Introduction The NexusLink 5700 Wireless ADSL bonding IAD features flexible networking connectivity with dual ADSL line capability, four 10/100 Ethernet ports, and an 802.11g wireless LAN access point. It has robust routing capabilities to segment and direct data streams and allows for multiple data encapsulations. The NexusLink 5700 is a black box solution for deploying Triple Play architectures, doubling bandwidth (48Mbps) performance over traditional ADSL2 modems. It provides higher level performance with embedded security, QoS, VPN and remote management functions. As an added bonus, the USB host acts as a printer hub and will enable future product enhancements available by software upgrade. 1.1 Features • NexusLink 5700 (Annex M) • Dual ADSL2 PTM bonded • Wi-Fi Support • UPnP installation • Integrated 802.11b/g/n • WPA and 802.1x • RADIUS client • IP /MAC address filtering • Static route/RIP/RIP v2 routing functions • Dynamic IP assignment • NAT/PAT • IGMP Proxy and fast leave • DHCP Server/Relay/Client • DNS Relay • Supports 16 VCs • Embedded SNMP agent • Web-based management • Remote configuration and upgrade • Supports TR-069/TR-098/TR-104/TR-111 For Remote Management • Configuration backup and restoration • FTP server • TFTP server 1.2 Application This diagram depicts the application of the NexusLink 5700 on a wireless network. 1.3 Front Panel LED Indicators The front panel LED indicators are shown in the picture below, followed by an explanation in the table below. LED POWER Color Mode Function Green On The router is powered up. Off The router is powered down. On An Ethernet Link is established. Off An Ethernet Link is not established. Green LAN 1X~4X Green Blink Data transmitting or receiving over LAN. Green On WPS WPS mode exists protected clients Blink WPS mode is on for 120 seconds Green Off WPS mode is off Green On The Wireless is ready and idle. Off The Wireless is not installed. WIRELESS Green Blink Data transmitting or receiving over Wireless Green On The DSL link is established. Off The DSL link is not established. DSL1~DSL2 Green Blink The DSL link is training. Green On The Internet link (PVC) is established. Off The Internet link (PVC) is not established. On The FXS phone 1 is off hook. Off The FXS phone 1 is on hook. On The FXS phone 2 is off hook. Off The FXS phone 2 is on hook. Service Green Phone1 Green Phone2 Chapter 2 Installation 2.1 Hardware Installation Follow the instructions below to complete the hardware installation. A schematic of the back of the router is shown below for reference. Reset button Connection to Power Connect the power jack to the shipped power cord. Attach the power adapter to the wall outlet or other AC source. After all connections have been made the router will perform a self-test. Wait a few moments and the router will be ready to operate. Caution 1: If the router fails to power up, or if it malfunctions, first verify that the power supply is connected correctly. If the problem persists, contact our technical support engineers. Caution 2: Before servicing or disassembling this equipment always disconnect all power cords and telephone lines from the wall outlet. Connection to LINE port Connect the telephone set to the RJ14 Phone1/ Phone2 port for VoIP service. Reset Button In the rear panel, there is a reset button. To load the factory default settings, hold the reset button down for 5 to 10 seconds. Connection to ETH port To connect to a hub or PC, use a RJ45 cable. You can connect the router to up to four LAN devices. The ports are auto-sensing MDI/X and either straight-through cable or crossover cable can be used. DSL Connect to the ADSL port with the ADSL RJ14 cable. Chapter 3 Login via Web Browser This section describes how to manage the router via a web browser. The web page is best viewed with Microsoft Internet Explorer 5.0 and later. Access Code Required: #0009@3BFA. The user can change the Access Code later (see 9.5 Password). 3.1 IP Address The default IP address of the router (LAN port) is 192.168.1.254 To configure the router for the first time, the configuration PC must have a static IP address within the 192.168.1.x subnet. Follow the steps below to configure your PC IP address to use subnet 192.168.1.x. STEP 1: Right click on the Local Area Connection under the Network and Dial-Up connection window and select Properties. STEP 2: Enter the TCP/IP window and change the IP address to 192.168.1.x/24. STEP 3: Click OK to submit settings. 10 3.2 Login Procedure Perform the following steps to bring up the web browser and configure the router. STEP 1: Start the Internet browser. Type the IP address for the router in the Web address field. For example, if the IP address is 192.168.1.254, type http://192.168.1.254 11 Chapter 4 Device Select the Device button from the main menu to display the Device Summary information as here. 12 4.1 Device Summary The main menu has several options, and selecting each of these options opens a submenu with more selections. Subsequent sections will introduce the other main menu options in sequence. The Device Summary screen will display at startup. 13 4.2 Reset Statistics To reset all statistics including LAN, WAN and xDSL click Reset Statistics. When the following window is displayed, simply click the Reset Statistics button to confirm your choice. 14 4.3 Troubleshoot Your device is capable of testing your DSL connection. Click Troubleshoot and the diagnostics window will display. The Diagnostics menu provides feedback on the connection status of the device and the ADSL link. Click Troubleshoot to bring up the following window. The individual test results are explained below. 15 Test Description Ethernet Connection Pass: indicates that the Ethernet interface from your computer is connected to the LAN port of your DSL router. A flashing or solid green LAN LED on the router also signifies that an Ethernet connection is present and that this test is successful. Fail: Indicates that the DSL router does not detect the Ethernet interface on your computer. Wireless Connection Pass: Indicates that the Wireless interface from your computer is connected to the wireless network. Down: Indicates that the DSL router does not detect the wireless network. DSL Synchronization Pass: Indicates that the DSL modem has detected a DSL signal from the telephone company. A solid WAN LED on the router also indicates the detection of a DSL signal from the telephone company. Fail: indicates that the DSL modem does not detect a signal from the telephone company’s DSL network. The WAN LED will continue to flash green. If a test displays a fail status, click the button at the bottom of this page to make sure the fail status is consistent. If the test continues to fail, click Help and follow the troubleshooting procedures. To test the connection with your DSL service provider, click the 16 button. 4.4 Wireless This page allows you to configure basic features of the wireless LAN interface. You can enable or disable the wireless LAN interface, hide the network from active scans, set the wireless network name (also known as SSID) and restrict the channel set based on country requirements. Click Wireless to bring up the following window. Input the access code (which is located ______) and click the 17 button. The options shown here allow you to configure security features of the wireless LAN interface. 18 4.4.1 Enable Wireless Option Description Enable Wireless A checkbox that enables or disables the wireless LAN interface. When selected, the Web UI displays Hide Access point, SSID, and County settings. The default is Enable Wireless. 4.4.2 Wireless - Security Configure Wireless security settings can be configured according to Wi-Fi Protected Setup (WPS) or Manual Setup. The WPS method configures security settings automatically (see 4.4.3 WPS) while the Manual Setup method requires that the user configure these settings using the Web User Interface (see the table below). Select SSID Select the wireless network name from the drop-down box. SSID stands for Service Set Identifier. All stations must be configured with the correct SSID to access the WLAN. If the SSID does not match, that client will not be granted access. Network Authentication This option specifies whether a network key is used for authentication to the wireless network. If network authentication is set to Open, then no authentication is provided. Despite this, the identity of the client is still verified. Each authentication type has its own settings. For example, selecting 802.1X authentication will reveal the RADIUS Server IP address, Port and Key fields. WEP Encryption will also be enabled as shown below. 19 The settings for WPA authentication are shown below. The settings for WPA-PSK authentication are shown next. WEP Encryption This option specifies whether data sent over the network is encrypted. The same network key is used for data encryption and network authentication. Four network keys can be defined although only one can be used at any one time. Use the Current Network Key list box to select the appropriate network key. 20 Security options include authentication and encryption services based on the wired equivalent privacy (WEP) algorithm. WEP is a set of security services used to protect 802.11 networks from unauthorized access, such as eavesdropping; in this case, the capture of wireless network traffic. When data encryption is enabled, secret shared encryption keys are generated and used by the source station and the destination station to alter frame bits, thus avoiding disclosure to eavesdroppers. Under shared key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel. Encryption Strength This drop-down list box will display when WEP Encryption is enabled. The key strength is proportional to the number of binary bits comprising the key. This means that keys with a greater number of bits have a greater degree of security and are considerably more difficult to crack. Encryption strength can be set to either 64-bit or 128-bit. A 64-bit key is equivalent to 5 ASCII characters or 10 hexadecimal numbers. A 128-bit key contains 13 ASCII characters or 26 hexadecimal numbers. Each key contains a 24-bit header (an initiation vector) which enables parallel decoding of multiple streams of encrypted data. Current Network Key Select the required network key. 21 4.4.3 WPS Setup Wi-Fi Protected Setup (WPS) is an industry standard that simplifies wireless security setup for certified network devices. Every WPS certified device has both a PIN number and a push button, located on the device or accessed through device software. The NexusLink 5700 has both a WPS button on the device and a virtual button accessible from the web user interface (WUI). To configure security settings with WPS, follow the procedures below. You must choose either the Push-Button or PIN configuration method for Steps 6 and 7. I. Setup Step 1: Enable WPS by selecting Enabled from the drop down list box shown. 22 Step 2: Set the WPS AP Mode. Configured is used when the NexusLink 5700. will assign security settings to clients. Unconfigured is used when an external client assigns security settings to the NexusLink 5700. NOTES: Your client may or may not have the ability to provide security settings to the NexusLink 5700. If it does not, then you must set the WPS AP mode to Configured. Consult the device documentation to check its capabilities. In addition, using Windows Vista, you can add an external registrar using the StartAddER button (Appendix E - WPS OPERATION has detailed instructions). II. NETWORK AUTHENTICATION Step 3: Select Open, WPA-PSK, WPA2-PSK, or Mixed WPA2/WPA-PSK network authentication mode from the Manual Setup AP section of the Wireless Security screen. The example below shows WPA2-PSK mode. Step 4: For the Pre-Shared Key (PSK) modes, enter a WPA Pre-Shared Key. You 23 will see the following dialog box if the Key is too short or too long. Step 5: Click the IIIa. button at the bottom of the window. PUSH-BUTTON CONFIGURATION The WPS push-button configuration provides a virtual button (accessible from the web user interface) configuration method. The WPS push-button configuration is described in the procedure below. It is assumed that the Wireless function is Enabled and that the router is configured as the Wireless Access Point (AP) of your WLAN. In addition, the wireless client must also be configured correctly and turned on, with WPS function enabled. NOTE: The wireless AP on the router searches for 2 minutes. If the router stops searching before you complete Step 7, return to Step 6. Step 6: WUI virtual button Select the Push-Button radio button in the WPS Setup section of the Wireless Security screen, and then click the appropriate button based on the WPS AP mode selected in step 2. For Configured mode, click the Add Enrollee button. Step 7: Go to your WPS wireless client and activate the push-button function on your NexusLink 5700. A typical WPS client screenshot is shown below as an example. 24 Now go to Step 8 (part IV. Check Connection) to check the WPS connection. IIIb. WPS – PIN CONFIGURATION Using this method, security settings are configured with a personal identification number (PIN). The PIN can be found on the device itself or within the software. The PIN may be generated randomly in the latter case. To obtain a PIN number for your client, check the device documentation for specific instructions. The WPS PIN configuration is described in the procedure below. It is assumed that the Wireless function is Enabled and that the router is configured as the Wireless Access Point (AP) of your wireless LAN. In addition, the wireless client must also be configured correctly and turned on, with WPS function enabled. Step 6: Select the PIN radio button in the WPS Setup section of the Wireless Security screen, as shown in A or B below, and then click the appropriate button based on the WPS AP mode selected in step 2. A - For Configured mode, enter the client PIN in the box provided and then click the Add Enrollee button (see below). B - For Unconfigured mode, click the Config AP button. 25 Step 7: Activate the PIN function on the wireless client. For Configured mode, the client must be configured as an Enrollee. For Unconfigured mode, the client must be configured as the Registrar. This is different from the External Registrar function provided in Windows Vista. The figure below provides an example of a WPS client PIN function in-progress. Now go to Step 8 (part IV. Check Connection) to check the WPS connection. IV. CHECK CONNECTION Step 8: If the WPS setup method was successful, you will be able access the wireless AP from the client. The client software should show the status. The example below shows that the connection established successfully. You can also double-click the Wireless Network Connection icon from the Network Connections window (or the system tray) to confirm the status of the new connection. 4.4.4 Wireless - Advanced Configure The Advanced page allows you to configure advanced features of the wireless LAN interface. 26 4.5 Restart Your System Should you want to reboot the NexusLink 5700, please follow the instructions provided below. 28 Click Restart your System to bring up the following window. When the following window is displayed, simply click the Reboot button to confirm your choice. The following window will display. 29 4.6 Home Network Click Home Network to bring up the following window. 30 Heading Description Interface LAN interface(s) Received/Transmitted: Click the - Bytes Number of Bytes - Pkts Number of Packets - Errs Number of packets with errors - Drops Number of dropped packets button to refresh this screen. 31 4.7 Gaming and Applications This window allows you to modify your firewall settings. Click Gaming and Applications to bring up the following window. 32 4.7.1 Incoming Traffic Control IP filtering allows you to create a filter rule to identify outgoing/incoming IP traffic by specifying a new filter name and at least one condition below. All of the specified conditions in this filter rule must be satisfied for the rule to take effect. The default setting for all Incoming traffic is Blocked. To add or remove IP filters, Click Input the access code (which is located ______) and click the button. The options are shown (on the following page) To add a filtering rule, click the button. The following window will be displayed. 33 Filter Name Type a name for the filter rule. Rule Order Execute IP Filter order. (Available in future versions). IP Version IPv4 selected by default. Protocol User can select: TCP, TCP/UDP, UDP or ICMP. Source IP address Input source IP address. Source Subnet Mask Input source subnet mask. Source Port (port or port:port) Input source port number. Destination IP address Input destination IP address. Destination Subnet Mask Input destination subnet mask. Destination port (port or port:port) Input destination port number. Click Click to save and activate the filter. to delete a filter. 34 4.7.2 Outgoing Traffic Control IP filtering allows you to create a filter rule to identify outgoing/incoming IP traffic by specifying a new filter name and at least one condition below. All of the specified conditions in this filter rule must be satisfied for the rule to take effect. The default setting for all Outgoing traffic is Accepted. To add or remove IP filters, Click Input the access code (which is located ______) and click the The options are shown (on the following page) 35 button. To add a filtering rule, click the button. The following window will be displayed. Filter Name Type a name for the filter rule. Rule Order Execute IP Filter order. (Available in future versions). IP Version IPv4 selected by default. Protocol User can select: TCP, TCP/UDP, UDP or ICMP. Source IP address Input source IP address. Source Subnet Mask Input source subnet mask. Source Port (port or port:port) Input source port number. Destination IP address Input destination IP address. Destination Subnet Mask Input destination subnet mask. Destination port (port or port:port) Input destination port number. Click to save and activate the filter. 36 Click to delete a filter. 4.8 Reset Access Code To help prevent unauthorized access to your router, be sure you record your Modem Access Code and safeguard it just as you would any other password or PIN number. Should you need access to your router (for example, to make configuration changes or to change your Internet Service Provider login password) you will need the modem access code. Note: This modem access code is separate from the password that you use to log in to your Internet Service Provider, and it is strongly recommend you use a different value for your access code for security reasons. Click Reset access code to bring up the following window. If you have lost or forgotten your new access code, click 37 to se to default. 38 Chapter 5 Broadband This window shows the existing WAN status. 5.1 Status Click Broadband to display the status of all configured PVC(s). Port/VPI/VCI Shows the values of the ATM Port/VPI/VCI VLAN Mux Shows 802.1Q VLAN ID Con. ID Shows the connection ID Category Shows the ATM service classes Service Shows the name for WAN connection Interface Shows connection interfaces Protocol Shows the connection type, such as PPPoE, PPPoA, etc. IGMP Shows the statue of the IGMP function State Shows the connection state of the WAN connection Status Lists the status of DSL link IP Address Shows IP address for WAN interface Click to reset the status of all configured PVC(s). 39 5.2 Configure Click Configure will bring up the following window. Input the access code (which is located ______) and click the The options are shown (on the following page) 40 button. Select the configuration for the broadband utilization of the DSL lines. Any Changes to DSL Bonding Config will require a reboot. Select one of the three options (DSL Auto, DSL on inner pair, DSL on outer pair) from the drop down menu and tick the Enable 802.1x auto start box if required. Click the button to confirm your choice(s). 41 Chapter 6 Home Network The Home Network – LAN Status screen shows interface statistics for Ethernet and Wireless interfaces. 6.1 LAN Status The Network Statistics screen shows interface statistics for LAN of Ethernet interface. Here provides byte transfer, packet transfer, Error and Drop statistics for the LAN interface.) Click the button to refresh this screen. 42 6.2 Configure Click Configure to bring up the following window. Input the access code (which is located ______) and click the The options are shown (on the following page) 43 button. Configure the DSL router IP address and subnet mask for the LAN interface. IP ADDRESS: ENTER THE IP ADDRESS FOR THE LAN PORT. SUBNET MASK: ENTER THE SUBNET MASK FOR THE LAN PORT. DHCP Server: To enable DHCP, select Enable DHCP server and enter Start and End IP addresses and the Leased Time. This setting configures the router to automatically assign IP, default gateway and DNS server addresses to every PC on your LAN. Static IP Lease List: A maximum of 32 entries can be configured. 44 Click to add a DHCP static IP lease. The following window will be displayed. Input the MAC address and Static IP address and then click To remove an entry, tick the corresponding checkbox in the Remove column and then click the Click button. to input the secondary subnet mask for the LAN port. 45 To create a new subnet group for LAN Devices: 1. Enter the Group name and the group name must be unique 2. Select the intended application of the new subnet group 3. Enter the corresponding IP and DHCP address 4. Passthrough MAC Address only needs to be entered in passthrough mode for the specific device that needs to share the WAN IP address 5. You can define the IP address of the router device within the subnet in Route To LAN IP Address for automatic routing rules to direct traffics to it; If the routing requires a different subnet set, you can define it in Routing Subnet 6. If Secondary IP Address is empty, it will be calculated as one address less than the last address of the defined subnet for the dhcp server. Note: For Passthrough mode to correctly route the traffic, you need to reboot the gateway 2ND LAN INTERFACE To configure a secondary IP address, tick the checkbox as shown here. 46 IP Address: Enter the secondary IP address for the LAN port. Subnet Mask: Enter the secondary subnet mask for the LAN port. Click to confirm. Ethernet Media Type: Each LAN port has Speed/Duplex Negotiation detection capability, the LAN ports detect the speed (for example, 10MBps, 100Mbps) and duplex (half-duplex or full-duplex) settings of the device on the other end of the wire and subsequently adjusts to match those settings. During speed/duplex negotiation the device transmits its own abilities to the peer device so that the peer can use the appropriate settings. Auto: Auto detects Speed/Duplex Negotiation 10_Half: The speed limit is 10M and Duplex Negotiation is half. 10_Full: The speed limit is 100M and Duplex Negotiation is full. 100_Half: The speed limit is 100M and Duplex Negotiation is half. 100_Full: The speed limit is 100M and Duplex Negotiation is full. 47 6.3 Wireless Status Click Wireless Status to bring up the following window. Click to reset the screen. 48 6.4 Wireless Configure This page allows you to configure basic features of the wireless LAN interface. You can enable or disable the wireless LAN interface, hide the network from active scans, set the wireless network name (also known as SSID) and restrict the channel set based on country requirements. See section: 4.4 Wireless for a detailed description. 49 6.5 Wireless MAC Filter When a device is using MAC filtering, any address not explicitly defined will be denied access. This MAC Filter page allows access to be restricted/allowed based on a MAC address. All (Network Interface Cards) NICs have a unique 48-bit MAC address burned into the ROM chip on the card. When MAC address filtering is enabled, you are restricting the NICs that are allowed to connect to your access point. Therefore, an access point will grant access to any computer that is using a NIC whose MAC address is on its “allows” list. Click Wireless MAC Filter to bring up the following window. 50 MAC Restrict mode: Off- disables MAC filtering; Allow – permits access for the specified MAC address; deny; reject access of the specified MAC address, then click the SET button. Option MAC Restrict Mode Description Radio buttons that allow settings of; Off: MAC filtering function is disabled. Allow: Permits PCs with listed MAC addresses to connect to access point. Deny: Prevents PCs with listed MAC from connecting to the access point. MAC Lists the MAC addresses subject to the Off, Allow, or Deny instruction. Address The Add button prompts an entry field that requires you type in a MAC address in a two-character, 6-byte convention: xx:xx:xx:xx:xx:xx where xx are hexadecimal numbers. The maximum number of MAC addresses that can be added is 60. To add a MAC entry, click Click and input a MAC address to add the MAC address to the wireless MAC address filters. To delete an entry, select the entry, click the 51 button. Chapter 7 VOIP This chapter first describes the various options for configuration of the SIP voice service. It then provides detailed instructions for making telephone calls using VoIP (Voice over IP) or PSTN (Public Switched Telephone Network)(1) services. Session Initiation Protocol (SIP) is a peer-to-peer protocol used for Internet conferencing, telephony, events notification, presence and instant messaging. SIP is designed to address the functions of signaling and session management within a packet telephony network. Signaling allows call information to be carried across network boundaries. Session management provides the ability to control the attributes of an end-to-end call. (1) The NexusLink 5700 supports Phone Line (FXS) interface only, which cannot dial to the local PSTN network. NOTE: The SIP standard is set by the Internet Engineering Task Force (IETF). The SIP standard defines the following agents/servers: User Agents (UA) - SIP phone clients (hardware or software) Proxy Server – relays data between UA and external servers Registrar Server - a server that accepts register requests from UA Redirect Server – provides an address lookup service to UA 52 7.1 Status Displays the call summary. 7.2 SIP Click SIP to bring up the following window. The settings of Global Parameters and Service Provider please contact with your ISP 53 servicer. 7.2.1 Global Parameters Start SIP client: Active SIP service (Internet telephony calls) Stop SIP client: Inactive SIP service (Internet telephony calls) About the setting of Global Parameters or want to know any detail information please contact with your ISP servicer. A common parameter setting. 54 7.2.2 Service Provider This screen contains basic SIP configuration settings. Start SIP client: Active SIP service (Internet telephony calls) Stop SIP client: Inactive SIP service (Internet telephony calls) About the setting of Service Provider or want to know any detail information please contact with your ISP servicer. VoIP settings are set by your service provider. 55 Once settings are configured, click Click to begin using the service. to cease using the service. 56 7.3 RTCP For VoIP voice quality reporting, a SIP event package is specified to report RTCP and RTCP-XR summaries; SIP method options are provided to convey such events to a collector. 7.3.1 Global Parameters A common parameter setting. 57 7.3.2 Service Provider This screen contains basic SIP configuration settings. NL5700 will collect and report on a set of voice quality metrics on a per-call basis to a centralized collector via SIP. There are two primary components: First, an IETF-proposed specification is customized to define the format of a Voice Quality (VQ) report and to select metrics contained within the report. Second, two candidates SIP methods are proposed for the gateway to convey the VQ report to a third-party collector. 58 7.4 Telephone Calls AT&T CVoIP Star Codes This tab is a list of star codes planned for use by AT&T CVoIP. Code Description TBD Blind Transfer - Invoke TBD Call Forwarding to Voice Mail - Activate *312 Simultaneous Ringing - Activate *313 Simultaneous Ringing - Deactivate *370 Call Waiting - Activate (persistent) *371 Call Waiting - Cancel (persistant) *372 Call Forwarding Unregistered User - Activate *373 Call Forwarding Unregistered User - Deactivate *374 Call Forwarding Unreachable Calls to Voice Mail - Activate *375 Call Forwarding Unreachable Calls to Voice Mail - Deactivate *57 Customer originated Trace - Invoke *61 Distinctive Ring Call Waiting *63 Selective Call Forwarding - Activate *64 Selective Call Acceptance - Activate *66 Automatic Call Back (redial last outbound number) - Invoke *67 Calling Line Identification - Cancel (make private) *68 Selective Call Rejection - Activate *69 Automatic Recall (return last incoming call) - Invoke *70 Call Waiting - Cancel (mid call) *70 Call Waiting - Cancel (per call) *72 Call Forwarding (always) - Activate *73 Call Forwarding (always) - Deactivate *74 Speed Call Short *75 Speed Call Long *77 Anonymous Call Rejection - Activate *78 Do not Disturb - Activate *78 Call Park *79 Do not Disturb - Deactivate *79 Call Park Retrieve *80 Selective Call Rejection - Deactivate 59 *81 Distinctive ring *82 Calling Line Identification Restriction – Cancel (make public) *83 Selective Call Forwarding - Deactivate *84 Selective Call Acceptance - Deactivate *86 Automatic Call Back Deactivate *87 Anonymous Call Rejection - Deactivate *89 Automatic Recall Deactivate *90 Call Forwarding Busy - Activate *91 Call Forwarding Busy - Deactivate *92 Call Forwarding No Answer - Activate *93 Call Forwarding No Answer - Deactivate *95 Automatic Call Control VRU *98 Voicemail *99 Trunk Answer Any Station N/A Ring Back when Free (RBwF) - Cancel 60 Chapter 8 Firewall The gateway is protected by firewall from unfriendly network attacks on the system. 8.1 Status Displays your firewall setting. 8.2 Inbound Filter See section: 4.7.1 Incoming Traffic Control for a detailed description. 8.3 Outbound Filter See section: 4.7.2 Outgoing Traffic Control for a detailed description 61 8.4 Port Forwarding Port forwarding allows you to direct incoming traffic from the WAN side (identified by Protocol and External port) to the Internal server with private IP addresses on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side. A maximum of 32 entries can be configured. Click Port Forwarding will bring up the following window. Input the access code (which is located ______) and click the The options are shown (on the following page) 62 button. Click to display the following window. Select a Service User should select the service from the list. or or Custom Server User can enter the name of their choice. Server IP Address Enter the IP address for the server. External Port Start Enter the starting external port number (when you select Custom Server). When a service is selected the port ranges are automatically configured. External Port End Enter the ending external port number (when you select Custom Server). When a service is selected the port ranges are automatically configured. Protocol User can select from: TCP, TCP/UDP or UDP. Internal Port Start Enter the internal port starting number (when you select 63 Custom Server). When a service is selected the port ranges are automatically configured Internal Port End Enter the internal port ending number (when you select Custom Server). When a service is selected the port ranges are automatically configured. Click Click to forward IP packets for this service to the specified server. to delete an entry. 64 8.5 Port Triggering Some applications require that specific ports in the router’s firewall be opened for access by the remote parties. Port Trigger dynamically opens up the ‘Open Ports’ in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote party using the ‘Triggering Ports’. The router allows the remote party from the WAN side to establish new connections back to the application on the LAN side using the ‘Open Ports’. A maximum 32 entries can be configured. Click Port Triggering to bring up the following window. To add a Trigger Port, simply click . The following will be displayed. 65 Select an Application User should select the application from the list. Or Custom Application Or User can enter the name of their choice. Trigger Port Start Enter the starting trigger port number (when you select custom application). When an application is selected the port ranges are automatically configured. Trigger Port End Enter the ending trigger port number (when you select custom application). When an application is selected the port ranges are automatically configured. Trigger Protocol User can select from: TCP, TCP/UDP or UDP. Open Port Start Enter the starting open port number (when you select custom application). When an application is selected the port ranges are automatically configured. Open Port End Enter the ending open port number (when you select custom application). When an application is selected the port ranges are automatically configured. Open Protocol User can select from: TCP, TCP/UDP or UDP. You can configure the port settings from this screen by selecting an existing application or creating your own (Custom application)and click it. Click to delete an entry. 66 to add Chapter 9 Maintenance The Diagnostics menu provides feedback on the connection status of the device and the ADSL link. The individual tests are listed below. 9.1 Test The individual tests are listed below. If a test displays a fail status, click "Rerun Diagnostic Tests" at the bottom of this page to make sure the fail status is consistent. If the test continues to fail, click "Help" and follow the troubleshooting procedures. If a test displays a fail status, click at the bottom of this page to make sure the fail status is consistent. If the test continues to fail, click Help and follow the troubleshooting procedures. To test the connection with your DSL service provider, click 67 9.2 DSL Click DSL to display the xDSL Diagnostics window. Consult the table below for descriptions of each field. 68 Field Description Mode Line Coding format, that can be selected G.dmt, G.lite, T1.413, ADSL2 Traffic Type Channel type Interleave or Fast Status Lists the status of the DSL link Link Power State Link output power state. Line Coding Trellis On/Off SNR Margin (dB) Signal to Noise Ratio (SNR) margin Attenuation (dB) Estimate of average loop attenuation in the downstream direction. Output Power (dBm) Total upstream output power Attainable Rate (Kbps) The sync rate you would obtain. Rate (Kbps) Current sync rate. Super Frames Total number of super frames Super Frame Errors Number of super frames received with errors RS Words Total number of Reed-Solomon code errors RS Correctable Errors Total Number of RS with correctable errors RS Uncorrectable Errors Total Number of RS words with uncorrectable errors HEC Errors Total Number of Header Error Checksum errors OCD Errors Total Number of out-of-cell Delineation errors LCD Errors Total number of Loss of Cell Delineation Total Cells Total number of ATM cells (including idle + data cells) Data Cells Total number of ATM data cells Bit Errors Total number of bit errors Total ES: Total Number of Errored Seconds Total SES: Total Number of Severely Errored Seconds Total UAS: Total Number of Unavailable Seconds 9.2.1 xDSL BER Test Click on the xDSL Statistics screen to test the Bit Error Rate 69 (BER). A small pop-up window will open after the button is pressed, as shown below. Click Start to start the test or click Close to cancel the test. After the BER testing is complete, the pop-up window will display as follows. 70 9.2.2 Reset Statistics Click to refresh the screen. 9.2.3 Draw Graph Tone Click to display the current xDSL bits per tone status. The X axis represents Tone Number and the Y axis represents Bit Allocation. 71 9.2.4 Draw Loss of Signal Graph Click to display the loss of signal within each 15 minute intervals for the last 24 hours. The X axis represents Time and the Y axis represents Errors Observed. 9.2.5 Draw Loss of Frames Graph Click to display the loss of frames within each 15 minute 72 intervals for the last 24 hours. The X axis represents Time and the Y axis represents Errors Observed. 9.2.6 Loss of Power Click to display the loss of power within each 15 minute intervals for the last 24 hours. The X axis represents Time and the Y axis represents Errors Observed. 73 9.3 Ping/Traceroute/NSLookup Click Ping/Traceroute/NSLookup to bring up the following window. 9.3.1 Ping Ping: Used to test the reach ability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer Click to seek a reply from an IP address. 74 9.3.2 TraceRoute TraceRoute: Used to show the route taken by packets across an IP network Traceroute is often used for network troubleshooting. By showing a list of routers traversed, it allows the user to identify the path taken to reach a particular destination on the network. Click to trace the route of an IP address. 9.3.3 NSLookup Nslookup:Used to query Domain Name System (DNS) servers to find DNS details, including IP addresses of a particular computer, MX records for a domain and the NS servers of a domain. 75 Click to lookup the name server of an IP address. 9.4 System Log The System Log option allows you to view the system events log. Click System Log to bring up the following window. 76 9.4.1 Refresh Click to update the System Log. 9.4.2 Export Syslog Click to bring up the following window. 77 Click to save the system log file. 78 9.5 Password Click Password to bring up the following window. Input the access code (which is located ______) and click The options are shown (on the following page) 79 9.5.1 Use New Access Code Select User, enter the current access code and the new access code. Hen retype the new access code. Click 9.5.2 Clear Input Click to delete what you have entered. 9.5.3 Reset to Default Access Code Click to reset to default. 80 9.6 Upgrade Click Upgrade to bring up the following window. Input the access code (which is located ______) and click The options are shown (on the following page) Click to start the upgrade process. 81 9.7 Reboot Click to reboot the gateway. The following window will be displayed. 82 9.8 Factory Reset Click Factory Reset to bring up the following window. Input the access code (which is located ______) and click The options are shown (on the following page) Click to restore the DSL gateway to the factory defaults. 83 Click OK to confirm. Click OK to confirm. 84 Appendix A: Firewall Stateful Packet Inspection Refers to an architecture, where the firewall keeps track of packets on each connection traversing all its interfaces and makes sure they are valid. This is in contrast to static packet filtering which only examines a packet based on the information in the packet header. Denial of Service attack Is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Various DoS attacks the device can withstand are: ARP Attack, Ping Attack, Ping of Death, Land, SYN Attack, Smurf Attack and Tear Drop. TCP/IP/Port/Interface filtering rules These rules help in the filtering of traffic at the Network layer i.e. Layer 3. When a Routing interface is created "Enable Firewall" must be checked. Navigate to Advanced Setup -> Security -> IP Filtering, web page. Outbound Filter: Helps in setting rules to DROP packets from the LAN interface. By default if Firewall is Enabled all IP traffic from LAN is allowed. By setting up one or more filters, particular packet types coming from the LAN can be dropped. Filter Name: User defined Filter Name. Protocol: Can take on any values from: TCP/UDP, TCP, UDP or ICMP Source IP Address/Source Subnet Mask: Packets with the particular “Source IP Address/Source Subnet Mask" combination will be dropped. Source Port: This can take on either a single port number or a range of port numbers. Packets having a source port equal to this value or falling within the range of port numbers (portX : portY) will be dropped. Destination IP Address/Destination Subnet Mask: Packets with the particular "Destination IP Address/Destination Subnet Mask" combination will be dropped. 85 Destination Port: This can take on either a single port number or a range of port numbers. Packets having a destination port equal to this value or falling within the range of port numbers (portX : portY) will be dropped. Examples: 1. Filter Name : Out_Filter1 Protocol : TCP Source Address : 192.168.1.45 Source Subnet Mask : 255.255.255.0 Source Port : 80 Dest. Address : NA Dest. Sub. Mask : NA Dest. Port : NA This filter will Drop all TCP packets coming from LAN with IP Address/Sub. Mask 192.168.1.45/24 having a source port of 80 irrespective of the destination. All other packets will be Accepted. 2. Filter Name : Out_Filter2 Protocol : UDP Source Address : 192.168.1.45 Source Subnet Mask : 255.255.255.0 Source Port : 5060:6060 Dest. Address : 172.16.13.4 Dest. Sub. Mask : 255.255.255.0 Dest. Port : 6060:7070 This filter will drop all UDP packets coming from LAN with IP Address/Sub. Mask 192.168.1.45/24 and a source port in the range of 5060 to 6060, destined to 172.16.13.4/24 and a destination port in the range of 6060 to 7070 Inbound Filter:Helps in setting rules to ACCEPT packets from the WAN interface. By default all incoming IP traffic from WAN is Blocked, if the Firewall is Enabled. By setting up one or more filters, particular packet types coming from the WAN can be Accepted. Filter Name: User defined Filter Name. 86 Protocol: Can take on any values from: TCP/UDP, TCP, UDP or ICMP Source IP Address/Source Subnet Mask: Packets with the particular "Source IP Address/Source Subnet Mask" combination will be accepted. Source Port: This can take on either a single port number or a range of port numbers. Packets having a source port equal to this value or falling within the range of port numbers (portX : portY) will be accepted. Destination IP Address/Destination Subnet Mask: Packets with the particular "Destination IP Address/Destination Subnet Mask" combination will be accepted. Destination Port: This can take on either a single port number or a range of port numbers. Packets having a destination port equal to this value or falling within the range of port numbers(portX : portY) will be accepted. The WAN interface on which these rules apply needs to be selected by the user. Examples: 1. Filter Name : In_Filter1 Protocol : TCP Source Address : 210.168.219.45 Source Subnet Mask : 255.255.0.0 Source Port : 80 Dest. Address : NA Dest. Sub. Mask : NA Dest. Port : NA Selected WAN interface: mer_0_35/nas_0_35 This filter will ACCEPT all TCP packets coming from WAN interface mer_0_35/nas_0_35 with IP Address/Sub. Mask 210.168.219.45/16 having a source port of 80 irrespective of the destination. All other incoming packets on this interface are DROPPED. 87 2. Filter Name : In_Filter2 Protocol : UDP Source Address : 210.168.219.45 Source Subnet Mask : 255.255.0.0 Source Port : 5060:6060 Dest. Address :192.168.1.45 Dest. Sub. Mask : 255.255.255.0 Dest. Port : 6060:7070 This rule will ACCEPT all UDP packets coming from WAN interface mer_0_35/nas_0_35 with IP Address/Sub. Mask 210.168.219.45/16 and a source port in the range of 5060 to 6060, destined to 192.168.1.45/24 and a destination port in the range of 6060 to 7070. All other incoming packets on this interface are DROPPED. 88 Appendix B: Pin Assignments Line port (RJ14) Pin Definition Pin Definition ADSL_TIP1 ADSL_TIP2 ADSL_RING2 ADSL_RING1 LAN Port (RJ45) Pin Definition Pin Definition Transmit data+ NC Transmit data- Receive data- Receive data+ NC NC NC 89 Appendix C: Specifications Rear Panel RJ-14 X1 for ADSL2+ bonded, RJ-45 X 4 for LAN, Reset Button X 1, WPS button x1, WIFI button x1 Wi-Fi Antenna x 1 ADSL ADSL standard ITU-T G.992.5, ITU-T G.992.3, ITU-T G.992.1, ANSI T1.413 Issue 2AnnexM ADSL2 Bonded Downstream : 48 Mbps Upstream : 2.6 Mbps ADSL2+ Bonded Downstream : 48 Mbps Upstream : 2.6 Mbps ADSL2+ non-Bonded Downstream : 24 Mbps Upstream : 1.3 Mbps ADSL2 non-Bonded Downstream : 12 Mbps Upstream : 1.3 Mbps G.DMT Downstream : 8Mbps Upstream : 832kbps LAN Standard IEEE 802.3, IEEE 802.3u 10/100 BaseT Auto-sense MDI/MDX support Yes Wireless Standard IEEE802.11b/g/n, backward compatible with 802.11b Encryption 64, 128-bit Wired Equivalent Privacy (WEP) Data Encryption Channels 11 Channels (US, Canada) Data Rate Up to 300Mbps BSSID Multiple WPA Yes WPA2 Yes WEP Yes WDS Yes IEEE 802.1x Yes 10,25,50,100mW@22MHz channel bandwidth output power level can be 90 selected according to the environment ATM Attributes RFC 2364 (PPPoA), RFC 2684 (RFC 1483) Bridge/Route; RFC 2516 (PPPoE); RFC 1577 (IPoA) Support PVCs 16 AAL type AAL5 ATM service class UBR/CBR/VBR-rt/VBR-nrt ATM UNI support UNI3.1/4.0 OAM F4/F5 Yes Management SNMP, Telnet, Web-based management, Configuration backup and restoration Software upgrade via HTTP, TFTP server, or FTP server Supports TR-069/TR-098/TR-111 for Remote Management Bridge Functions Transparent bridging and learning IEEE 802.1d VLAN support Yes Spanning Tree Algorithm Yes IGMP Proxy Yes IGMP Snooping Yes Voice SIP: RFC 3261 Codec: G.711, G.723.1, G.726, G.729ab RTP: RFC 1889 SDP: RFC 2327 Caller ID: ETSI based Routing Functions Static route, RIP, and RIPv2, NAT/PAT, DHCP Server/DHCP Relay, DNS Relay, ARP Security Functions Authentication protocols PAP, CHAP, TCP/IP/Port filtering rules, Port triggering/Forwarding, Packet and MAC address filtering, SSH 91 Application Passthrough PPTP, L2TP, IPSec, VoIP, Yahoo messenger, ICQ, RealPlayer, NetMeeting, MSN, X-box, etc OS Supported for USB driver Windows 2000/XP/ME/98SE Power Supply External power adapter 100-240Vac Environment Condition Operating temperature 0 ~ 40 degrees Celsius Relative humidity 5 ~ 95% (non-condensing) Dimensions 205 mm (W) x 48 mm (H) x 145 mm (D) Certifications FCC Part 15 class B, FCC Part 68, CE Kit Weight Kit 0.98 KG NOTE: Specifications are subject to change without notice 92 Appendix D: SSH Client Linux OS comes with ssh client. Microsoft Windows does not have ssh client but there is a public domain one “putty” that you can download. http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html To access the router using Linux ssh client: From LAN: Use the router WEB UI to enable SSH access from LAN. (default is enabled) type: ssh -l admin 192.168.1.1 From WAN: In the router, use WEB UI to enable SSH access from WAN. type: ssh -l support router-WAN-ip-address To access the router using Windows putty ssh client: From LAN: Use the router WEB UI to enable SSH access from LAN (default is enabled) type: putty -ssh -l admin 192.168.1.1 From WAN: In the router, use WEB UI to enable SSH access from WAN. type: putty -ssh -l support router-WAN-ip-address 93
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No XMP Toolkit : 3.1-701 Create Date : 2010:10:26 11:08:50Z Creator Tool : PScript5.dll Version 5.2.2 Modify Date : 2010:12:17 10:25:11+08:00 Metadata Date : 2010:12:17 10:25:11+08:00 Format : application/pdf Creator : Cheryl.Kao Title : Microsoft Word - UM_NexusLink_5700_C1.0.doc Producer : AFPL Ghostscript 8.50 Document ID : uuid:814eb38a-9d4f-40a0-8941-07cc830f0e70 Instance ID : uuid:01503c3b-8e84-4f56-b393-0e27a6b237c4 Page Count : 94 Author : Cheryl.KaoEXIF Metadata provided by EXIF.tools