GUANGZHOU GAOKE COMMUNICATIONS TECHNOLOGY FG700X FIBER GATEWAY (Router) User Manual FG7008N USER S MANUAL2x
Guangzhou Gaoke Communications Technology Co., Ltd FIBER GATEWAY (Router) FG7008N USER S MANUAL2x
Contents
- 1. FG7008N User Manual-Part 2
- 2. FG7008N User Manual -Part1
FG7008N User Manual-Part 2
FG7008N User Manual Figure 1-1 Configure Basic Settings The following items are displayed on this part. ► Enable WiFi: ► Channel: Enable or disable the WIFI AP function globally. This field determines which operating frequency will be used. The default channel is set to AutoSelect, so the AP will choose the best channel automatically. It is not necessary to change the wireless channel unless you notice interference problems with another nearby access point. ► Wireless Mode: Select the desired mode. 11b: Select if all of your wireless clients are 802.11b. 11g: Select if all of your wireless clients are 802.11g. 11n: Select only if all of your wireless clients are 802.11n. 11b/g: Select if you are using both 802.11b and 802.11g wireless clients. 11b/g/n: Select if you are using a mix of 802.11b, 11g and 11n wireless clients. ► Channel Width: Select any channel width from the drop-down list. The default setting is automatic, which can automatically adjust the channel width for your clients. If you choose to 11n or 11b/g/n Wireless mode, this configuration is required. Two values of width are provided: 20MHz and 20/40MHz. The Service Set Identifier (SSID) is used to identify an 802.11 (Wi-Fi) network and it’s discovered by network sniffing/scanning. FG7008N provides up to four SSID. ► Enable SSID: ►SSID Name: Enable or disable this entry of SSID. SSID1 can’t be disabled. Enter the name of SSID. The name of SSID must be unique in all wireless networks nearby. ► Bind Interface: Select a network interface to be bridged to the SSID. ► Enable Broadcast: When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the device. If you select the Enable Broadcast checkbox, the device will broadcast its name (SSID) on the air. Page 1 of 111 FG7008N User Manual ► Isolated: Enable or disable isolate different clients from the same wireless station. ► LAN Isolated: Enable or disable isolation between the LAN and SSID. ► Max Client: Enter the maximum number of clients allowed to connect to the SSID. ► SSID AP Isolated: This function can isolate wireless stations on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this function, check this box. AP Isolation is disabled by default. Input “2” to configure security parameter as below: Figure 1-2 Configure Security Parameter The following items are displayed on this part. ► SSID: ► Authentication: ► Algorithm: The SSID enabled in WLAN→Basic Settings page.Read only The authentication type selected: WPA-PSK, WPA2-PSK, WPAPSK/WPA2PSK. When WPA2-PSK or WPAPSK/WPA2PSK is set as the Authentication Type, you can select either TKIP, or AES or TKIP/AES as Encryption. When WPA-PSK is set as the Authentication Type, you can select either TKIP or AES as Encryption. ► WPA Pre-Shared Key: You can enter ASCII characters between 8 and 64 characters. ► Renew Interval: Specify the group key update interval in seconds. Enter 0 to disable the update. Input “3” to configure advanced settings as below: Page 2 of 111 FG7008N User Manual Figure 1-3 Configure Advanced Settings The following items are displayed on this part. ► Fragmentation Threshold: This value is the maximum size determining whether packets will be fragmented. Setting the Fragmentation Threshold too low may result in poor network performance since excessive packets. 2346 is the default setting and is recommended. ► RTS Threshold: Here you can specify the RTS (Request to Send) Threshold. If the packet is larger than the specified RTS Threshold size, the device will send RTS frames to a particular receiving station and negotiate the sending of a data frame. The default value is 2347. ► Transmit Power: Here you can specify the transmit power of device. 100 is the default setting and is recommended. ► Enable WMM: Enable or disable the WIFI WMM function globally. WMM function can guarantee the packets with high-priority messages, being transmitted preferentially. It is strongly recommended enabled. Input “4” to configure WPS parameter as below: Figure 1-4 Configure WPS Parameter The following items are displayed on this part. ► Enable WPS: Enable or disable the WIFI WPS function globally. Page 3 of 111 FG7008N User Manual Input “4” to configure MAC filtering parameter as below: Page 4 of 111 FG7008N User Manual Figure 1-5 Configure MAC Filtering Parameter The following items are displayed on this part. ► Enable MAC Filter: Enable or disable the Wifi MAC filtering function globally. ► Filtering Rules: Two MAC filtering rules are provided: Allow: allow the stations specified by entries in the list to access. Deny: deny the stations specified by entries in the list to access. 1.2 Data Service 1.2.1 1.2.1.1 DHCP Server Static Address Assign The command “show dhcp-server static-ip-assign” shows the static IP assign information as bellow: Figure 1-6 Show Static IP Assign Information The command “set dhcp-server static-ip-assign” configures the static IP assign information as below. Page 5 of 111 FG7008N User Manual Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Figure 1-7 Configure Static IP Assign The command will configure static ip assign. The following items are displayed on this screen: ► IP The IP address reserved. Page 6 of 111 FG7008N User Manual ► Mask: ► MAC: 1.2.1.2 The subnet mask of IP address reserved. The MAC address you want to reserve IP address. DHCP Relay The command “show dhcp-relay” shows the DHCP relay information as below: Figure 1-8 Show DHCP Relay Information The command "set dhcp-relay” configures the DHCP relay information as below: Figure 1-9 Set DHCP Relay Information The following items are displayed on this screen: ► Enable ► DHCP Relay: Enable or disable DHCP Relay. Client Interface: The interface to listen for DHCP client requests. Up to four interfaces can be selected. ► Server Interface: ► Server IP: 1.2.2 1.2.2.1 Choose the interface which connects DHCP server. Configure the DHCP server IP address. NAT Config Basic Settings The command “show nat” shows the NAT basic settings as below: Page 7 of 111 FG7008N User Manual Figure 1-10 Show NAT Basic Settings The command “set nat” configures the NAT basic settings as below: Figure 1-11 Configure NAT Basic Settings The following items are displayed on this screen: ► Max Nat Connections: Specify the maximum number of NAT connections. ► Enable MSS Auto Adaptive: Enable or disable auto adaptive the value of MSS (Maximum Segment Size). ► TCP 1.2.2.2 MSS: If Enable MSS Auto Adaptive is not selected, configure this to specify the maximum segment size of the TCP protocol. PAT Settings The command “show pat” shows the PAT information as below: Figure 1-12 Show PAT Information The command “set pat” configures the PAT parameters as below: Page 8 of 111 FG7008N User Manual Figure 1-13 Configure PAT Parameters The following items are displayed on this screen: ► Enable PAT: Enable or disable PAT globally. The command “set pat rule” configures the PAT rule as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify .If you want to delete the entry, enter 1 and choose the corresponding entry. Page 9 of 111 FG7008N User Manual Figure 1-14 Configure PAT Rule The following items are displayed on this screen: ► Enable: ► Internet Port: ► Intranet Port: ► Intranet IP: Enable or disable this PAT entry. Enter the service port provided for accessing external network. All the requests from internet to this service port will be redirected to the specified server in local network. Specify the service port of the LAN host as virtual server. Enter the IP address of the specified internal server for the entry. All the requests from the internet to the specified LAN port will be redirected to this host. ► Protocol: Specify the protocol used for the entry. ► Internet Interface: Specify the interface to receive requests from the internet for the entry. 1.2.2.3 DMZ Settings The command “show dmz” shows the DMZ information as below: Figure 1-15 Show DMZ Information The command “set dmz ” configures the DMZ Parameters as below: Page 10 of 111 FG7008N User Manual Figure 1-16 Configure DMZ Parameters The following items are displayed on this screen: ► Enable DMZ: Enable or disable DMZ globally. The command “set dmz rule” configures the DMZ rule as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Figure 1-17 Configure DMZ Rule The following items are displayed on this screen: Page 11 of 111 FG7008N User Manual ► Public IP: The public IP address for this DMZ entry. ► Private IP: The private IP address for this DMZ entry. 1.2.2.4 ALG Settings The command “show alg” shows the ALG information as below: Figure 1-18 Show ALG Information The command “set alg” configures the ALG parameters as below: Figure 1-19 Configure ALG Parameters The following items are displayed on this screen: ► Enable SIP: ► Enable H323: ► Enable FTP: ► Enable PPTP: ► Enable RTSP: 1.2.3 1.2.3.1 Enable or disable SIP ALG. Allow Microsoft NetMeeting clients to communicate across NAT if selected. Allow FTP clients and servers to transfer data across NAT if selected. Enable or disable PPTP ALG. Enable or disable RTSP ALG. Firewall Config Attack Defense The command “show attack-defense” shows the attack defense information as below: Page 12 of 111 FG7008N User Manual Figure 1-20 Show Attack Defense Information The command “set attack-defense” configures the attack defense parameters as below: Figure 1-21 Configure Attack Defense Parameters The following items are displayed on this screen: ► Enable Broadcast Storm Defense: ► Enable Block Ping: ► Enable TCP SYN Flood Defense: ► Enable UDP Flood Defense: ► Enable ICMP Defense: ► Enable ARP Attack Defense: ► Enable Port Scan Defense: ► Enable Land Based Defense: Enable or disable Broadcast Storm Defense. Enable or disable Block Ping function. Enable or disable TCP SYN Flood Defense. Enable or disable UDP Flood Defense. Enable or disable ICMP Defense. Enable or disable ARP Attack Defense. A port scanner is a software application designed to probe a server or host for open ports. Check the box to prevent port scanning. The Land Denial of Service attack works by sending a spoofed packet with the SYN flag - used in a "handshake" between a client and a host - set from a host to any port that is open and Page 13 of 111 FG7008N User Manual listening. If the packet is programmed to have the same destination and source IP address, when it is sent to a machine, via IP spoofing, the transmission can fool the machine into thinking it is sending itself a message, which, depending on the operating system, will crash the machine. Check the box to ► ► Enable Ping Of Death Defense: Enable Teardrop Defense: ► Enable ► Enable Fraggle Defense: Smurf Defense: enable Land Based Defense. Ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol. Check the box to enable Ping of Death Defense. Teardrop is a program that sends IP fragments to a machine connected to the Internet or a network. Check the box to enable Teardrop Defense. A fraggle attack is a variation of a Smurf attack where an attacker sends a large amount of UDP traffic to ports 7 (echo) and 19 (chargen) to an IP Broadcast Address, with the intended victim's spoofed source IP address. Check the box to enable Fraggle Defense. The Smurf Attack is a denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. Check the box to enable Smurf Defense. 1.2.3.2 Service Type The command “show service-type” shows the service type information as below: Figure 1-22 Show Service Type Information The command “set service-type” configures the service type as below. Enter 0 add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 14 of 111 FG7008N User Manual Figure 1-23 Configure Service Type The following items are displayed on this screen: ► Name: Name of this entry, it will be list in Internet Access-Ctrl page. ► Protocol: Select the protocol for this entry. Four types are provided: TCP, UDP, ICMP and ALL. ► Port Range: Configure the port range for this entry. 1.2.3.3 Internet Access-Ctrl 1.2.3.3.1 Access Control Page 15 of 111 FG7008N User Manual The command “show access-control” shows the access control information as below: Figure 1-24 Show Access Control Information The command “set access-control” configures the access control policy as below: Figure 1-25 Configure Access Control The following items are displayed on this screen: ► Enable ► Access Control: Enable or disable access control from WAN. Policy: Default policy of access control: Allow or Deny. If Allow is selected, all packets will be allowed except the entries list on this page. If Deny is selected, all packets will be denied except the entries list on this page. The command “set access-control rule” configures the access control rule as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 16 of 111 FG7008N User Manual Page 17 of 111 FG7008N User Manual Figure 1-26 Configure Access Control Rule The following items are displayed on this screen: ► Enable Rule: Enable or disable this rule. ► Source IP Range: Enter the source IP range in dotted-decimal format (e.g. 192.168.1.23). ► Destination IP Range: Enter the destination IP range in dotted-decimal format (e.g. 192.168.1.23). ► Service Name: Choose a service type that defined in Service Type page. ► Active Time: Specify the time range for the entry to take effect. ► Active Day: Specify the day range for the entry to take effect. 1.2.3.3.2 User Authentication The command “show user-authentication” shows the user authentication information as below: Figure 1-27 Show User Authentication Information The command “set user-authentication” configures the user authentication parameters as below: Figure 1-28 Configure User Authentication Parameters The following items are displayed on this screen: Enable User Authentication: Enable or disable user authentication globally. If enabled, only the following list of users and passwords can access the Internet. ► Page 18 of 111 FG7008N User Manual The command “set user authentication list” configures the user authentication list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Figure 1-29 Configure User Authentication List The following items are displayed on this screen: Page 19 of 111 FG7008N User Manual ► Username: ► Password: ► Auth Mode: Enter the username of this entry. Enter the password of this entry. Choose the authentication mode of this entry. Provides four modes: Allow Multi-PC Access: Allows multiple computers to access the Internet using this account. Allow One PC Access: account. Only allows one computer to access the Internet using this Allow Special IP Access: Allowing only specified IP computer uses this account to access the Internet. Allow Special MAC Access: Allowing only specified MAC computer uses this account to access the Internet 1.2.3.4 1.2.3.4.1 Network Access-Ctrl WEB The command “show network-access-ctrl web” shows the web access control information as below: Figure 1-30 Show Web Access Control Information The command “set network-access-ctrl web” configures the web access control parameters as below: Page 20 of 111 FG7008N User Manual Figure 1-31 Configure Web Access Control Parameters The following items are displayed on this screen: ► HTTP Port: ► HTTPS Port: Port used with HTTP access device. HTTP: Hypertext Transfer Protocol. Port used with HTTPS access device. HTTPS: it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol. Internet Web Access: ► Allow Access: If enabled, allow user to access the device from the Internet via WEB. ► IP Limit: If enabled, allow only specific IP range to access the device from the Internet via WEB. ► IP ► Range: If IP Limit enabled, specifies the IPv4 address range that is only allowed to access to the device from the Internet via WEB. IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that is only allowed to access to the device from the Internet via WEB. Intranet Web Access: ► Allow Access: If enabled, allow user to access the device from the Intranet via WEB. ► IP Limit: If enabled, allow only specific IP range to access the device from the Intranet via WEB. ► IP ► Range: If IP Limit enabled, specifies the IPv4 address range that is only allowed to access the device from the Intranet via WEB. IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that is only allowed to access the device from the Intranet via WEB. 1.2.3.4.2 TELNET The command “show network-access-ctrl telnet” shows the telnet access control information as below: Page 21 of 111 FG7008N User Manual Figure 1-32 Show Telnet Access Control Information The command “set network-access-ctrl telnet” configures the telnet access control parameters as below: Figure 1-33 Configure Telnet Access Control Parameters The following items are displayed on this screen: ► Port: Port when using telnet tools access device. Internet Telnet Access: ► Allow Access: If enabled, allow access to the device from the Internet via telnet. ► IP Limit: If enabled, allow only specific IP range to access the device from the Internet via telnet ► IP Range: If IP Limit enabled, specifies the IPv4 address range that only allow access to the device from the Internet via telnet. ► IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that only allow access to the device from the Internet via telnet. Intranet Telnet Access: ► Allow Access: If enabled, allow access to the device from the Intranet via telnet. ► IP Limit: If enabled, allow only specific IP range to access the device from the Intranet via telnet ► IP ► Range: If IP Limit enabled, specifies the IPv4 address range that only allow access to the device from the Intranet via telnet. IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that only allow access to the Page 22 of 111 FG7008N User Manual device from the Intranet via telnet. 1.2.3.4.3 SSH The command “show network-access-ctrl ssh” shows the SSH access control information as below: Figure 1-34 Show SSH Access Control Information The command “set network-access-ctrl ssh” configures the SSH access control parameters as below: Figure 1-35 Configure SSH Access Control Parameters The following items are displayed on this screen: ► Port: Port when using SSH tools access device. Internet SSH Access: ► Allow Access: If enabled, allow access to the device from the Internet via SSH. ► IP Limit: If enabled, allow only specific IP range to access the device from the Internet via SSH ► IP Range: If IP Limit enabled, specifies the IPv4 address range that only allow access to the device from the Internet via SSH. ► IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that only allow access to the device from the Internet via SSH. Intranet SSH Access: ► Allow Access: If enabled, allow access to the device from the Intranet via SSH. Page 23 of 111 FG7008N User Manual ► IP Limit: ► IP ► If enabled, allow only specific IP range to access the device from the Intranet via SSH Range: If IP Limit enabled, specifies the IPv4 address range that only allow access to the device from the Intranet via SSH. IPv6 Range: If IP Limit enabled, specifies the IPv6 address range that only allow access to the device from the Intranet via SSH. 1.2.3.5 Filter Strategy 1.2.3.5.1 Keyword Filter The command “show keyword-filter” shows the keyword filter information as below: Figure 1-36 Show Keyword Filter Information The command “set keyword-filter” configures the keyword filter parameters as below: Figure 1-37 Configure Keyword Filter Parameters The command “set keyword-filter list” configures the keyword filter list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 24 of 111 FG7008N User Manual Figure 1-38 Configure Keyword Filter List The following items are displayed on this screen: ► Keyword ► Policy: Filter: If enabled, packet filtering is enabled by keyword. The policy for filtering web page, Deny and Allow. 1.2.3.5.2 IP Filter The command “show ip-filter” shows the IP filter information as below: Figure 1-39 Show IP Filter Information The command “set ip-filter” configures the IP filter parameters as below: Page 25 of 111 FG7008N User Manual Figure 1-40 Configure IP Filter Parameters The command “set ip-filter list” configures the IP filter list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Figure 1-41 Configure IP Filter List The following items are displayed on this screen: ► IP Filter: ► Policy: If enabled, packet filtering is enabled by IP address. The policy for IP address list. Deny and Allow. Page 26 of 111 FG7008N User Manual 1.2.3.5.3 MAC Filter The command “show mac-filter” shows the MAC filter information as below: Figure 1-42 Show MAC Filter Information The command “set mac-filter ” configures the MAC filter parameters as below: Figure 1-43 Configure IP Filter Parameters The command “set mac-filter list” configures the MAC filter list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 27 of 111 FG7008N User Manual Figure 1-44 Configure MAC Filter List The following items are displayed on this screen: ► MAC Filter: If enabled, packet filtering is enabled by MAC. ► Policy: The policy for MAC list. Deny and Allow. 1.2.4 1.2.4.1 QoS Basic Settings The command “show qos basic-settings” shows the QoS basic settings as below: Figure 1-45 Show QoS Basic Settings The command “set qos basic-settings” configures the QoS basic settings as below: Page 28 of 111 FG7008N User Manual Figure 1-46 Configure QoS Basic Settings The following items are displayed on this screen: ► Qos ► Enable: Scheduling Mode: Enable or disable QoS functionality. PQ: PQ means strict priority, that is, when congestion occurs, first sending packets of high priority queue. WRR: All queues use weighted fair queuing scheme which is defined in Weight Ratio PQ+WRR: Only highest queue use strict priority; others use weighted fair queuing scheme. ► Qos Priority: DSCP and 802.1P: depending on the value of priority classification into different queues. ► Upstream Bandwidth: Configure the bandwidth of upstream. ► Downstream Bandwidth: Configure the bandwidth of downstream. ► Enable Voice Reservation: Enable voice reservation and give the value to reserved for voice ► Enable Video Reservation: Enable video reservation and give the value to reserved for video ► Remap Tos/DSCP to CoS: Check the box that the system will remark 802.1P value with TOS/DSCP of upstream packets, the mapping relationship is as follows: 1.2.4.2 Port Rate Limit The command “show qos port-limit” shows the port rate limit information as below: Page 29 of 111 FG7008N User Manual Figure 1-47 Show Port Rate Limit Information The command “set qos port-limit” configures the port rate limit as below: Figure 1-48 Configure Port Rate Limit The following items are displayed on this screen: ► Port: ► Enable: ► Incoming Rate Limit: ►Limit Packet Type: ► Outgoing Rate Limit: 1.2.4.3 Physical LAN port Enable or disable rate limit function. Enter incoming maximum rate, which must is times of 32Kbsp. Select the packet type which is limited rate. Enter Outgoing maximum rate, which must is times of 32Kbsp. Flow Rate Limit The command “show qos flow-limit” shows the flow rate limit information as below: Page 30 of 111 FG7008N User Manual Figure 1-49 Show Flow Rate Limit Information The command “set qos flow-limit” configures the flow rate limit as below. Enter 0 add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 31 of 111 FG7008N User Manual Figure 1-50 Configure Flow Rate Limit The following items are displayed on this screen: ► IP Range: ► Active Time: ► Active Day: ► Direction: The IP range of LAN’s PC. If not configured, which means that all time are in active If not configured, which means that all time in active Up: Check the frame from the direction of the LAN port to the WAN port, and match the source IP and destination port; Down: Check the frame from the direction of the WAN port to the LAN port, and match the destination IP and source port; Page 32 of 111 FG7008N User Manual Bidirectional: Limit both upstream and downstream speed. ► Limited Bandwidth(CIR): The limited bandwidth. ► Maximal Bandwidth(PIR): The maximum bandwidth. If Application is selected: ► Application Protocol: 1.2.4.4 Such as HTTP, HTTPS, FTP, TFTP, SMTP, POP3, TELNET, etc. Service The command “show qos service” shows the QoS service information as below: Figure 1-51 Show QoS Service Information The command “set qos service” configures the QoS service as below: Figure 1-52 Configure QoS Service The following items are displayed on this screen: ► Name: Service name. Read only. ► Remap Queue Priority: Check the box to remap scheduling queue. Page 33 of 111 FG7008N User Manual ► Priority: lowest There are four levels of priority. Priority 3 is highest, and priority 0 is the ► Remark Check the box to enable 802.1p priority remarking. The value of remarking 802.1P. Check the box to enable DSCP remarking. The value of remarking DSCP. 802.1p: ► 802.1p Value: ► Remark DSCP: ► DSCP Value: 1.2.4.5 ACL The command “show qos acl-rule” shows the ACL rule information as below: Figure 1-53 Show ACL Rule Information The command “set qos acl-rule” configures the ACL rule as below: Figure 1-54 Configure ACL Rule Page 34 of 111 FG7008N User Manual The following items are displayed on this screen: ► Rule Name: The custom name. ► Physical Port: Rule’s source port ► Rule Type: Type of rule: L2 data or L3 data. ► Src IP/Netmask: The source IP address 192.168.100.1/255.255.255.0. and netmask of packets, ► Dest IP/Netmask: The destination IP address and netmask of packets. ► Protocol: E.g. ICMP, UDP, TCP, or custom IP protocol types. ► SRC MAC: Source MAC address of packets. ► DEST MAC: Destination MAC address of packets. ► Ether Type: The ether type of packets. ► VLAN ID: The VLAN id of packets. ► 802.1p: The VLAN priority of packets. ► Drop: Drop the packets matched with the rule. ► Remark VID: Change the VID of packets matched with the rule. ► Remark 802.1p: Change the 802.1P priority of packets matched with the rule. ► Remark DSCP: Change the DSCP of packets matched with the rule. ► Priority: Change the scheduling queue of packets matched with the rule. ► Maximal Bandwidth: Limit the bandwidth of packet matched with the rule. 1.2.5 DDNS The command “show ddns status” shows the DDNS status as below: Figure 1-55 Show DDNS Status The command “show ddns parameter” shows the DDNS parameters as below: Figure 1-56 Show DDNS Parameters The command "set ddns” configures the DDNS parameters as below: Page 35 of 111 such as FG7008N User Manual Figure 1-57 Configure DDNS Parameters The following items are displayed on this screen: ► DDNS Enable: ► Username: ► Password: ► First Url: ► Second Url: ► Update Interval: ► Server Type: Active or inactive dynamic DNS service. Enter account name of your DDNS account. Enter password of your DDNS account. First domain name that you registered your DDNS service provider. First domain name that you registered your DDNS service provider. How often, in seconds, the IP is updated. optional DDNS server type, can select from pull-dwon list: DYNDNS: For dyndns.org FREEDNS: For freedns.afraid.org ZONE: For zoneedit.com NOIP: For no-ip.com 3322: For 3322.org CUSTOM: For custom self-defined DDNS server type. ► Server Name: If CUSTOM is selected, specify server name of the device. ► Server Url: If CUSTOM is selected, specify server URL of the device. ► Dyn DNS Server Name: If CUSTOM is selected, specify dyndns DNS server name of custom self-defined. ► Dyn DNS Server Url: If CUSTOM is selected, specify dyndns DNS server URL of custom self-defined. ► System Item: ► DDNS Status: If CUSTOM is selected, specify system item of custom self-defined. Display the status of DDNS service. Read only. 1.2.6 1.2.6.1 VPN PPTP Server The command “show pptp-server” shows the pptp server information as below: Page 36 of 111 FG7008N User Manual Figure 1-58 Show PPTP Server Information The command “set pptp-server” configures the pptp server parameters as below: Figure 1-59 Configure PPTP Server Parameters The following items are displayed on this screen: ► Enable PPTP Server: Enable or disable the PPTP server function globally. ► IP Address Pool Range: Specify the start and the end IP address for IP Pool. The start IP address should not exceed the end address and the IP ranges must not overlap. ► Enable ► Authentication: Enable Encryption: Specify whether to enable authentication for the tunnel. Specify whether to enable the encryption for the tunnel. If enabled, the PPTP tunnel will be encrypted by MPPE. The command “set pptp-server user” configures the pptp server user list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 37 of 111 FG7008N User Manual Figure 1-60 Configure PPTP Server User The following items are displayed on this screen: ► Username: Enter the account name of PPTP tunnel. It should be configured identically on server and client. ► Password: Enter the password of PPTP tunnel. It should be configured identically on server and client. ► Binding 1.2.6.2 IP: Enter the IP address of the client which is allowed to connect to this PPTP server. L2TP Server The command “show l2tp-server” shows the l2tp server information as below: Figure 1-61 Show L2TP Server Information The command “set l2tp-server” configures the l2tp server parameters as below: Page 38 of 111 FG7008N User Manual Figure 1-62 Configure L2TP Server Parameters The following items are displayed on this screen: ► Enable L2TP Server: Enable or disable the L2TP server function globally. ► Local IP: Enter the local IP address of L2TP server. ► IP Address Pool Range: Specify the start and the end IP address for IP Pool. The start IP address should not exceed the end address and the IP ranges must not overlap. ► Enable Authentication: ► Enable Debug: Specify whether to enable authentication for the tunnel. If enabled, enter the authentication secret. Specify whether to enable the debug for L2TP. The command “set l2tp-server user” configures the l2tp server user list as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify .If you want to delete the entry, enter 1 and choose the corresponding entry. Page 39 of 111 FG7008N User Manual Figure 1-63 Configure L2TP Server User The following items are displayed on this screen: ► Username: Enter the account name of L2TP tunnel. It should be configured identically on server and client. ► Password: Enter the password of L2TP tunnel. It should be configured identically on server and client. ► Binding 1.2.6.3 IP: Enter the IP address of the client which is allowed to connect to this L2TP server. IPSEC 1.2.6.3.1 IKE Safety Proposal The command “show ike-proposal” shows the IKE Proposal information as below: Page 40 of 111 FG7008N User Manual Figure 1-64 Show IKE Proposal Information The command “set ike-proposal” configures the IKE Proposal as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 41 of 111 FG7008N User Manual Figure 1-65 Configure IKE Proposal The following items are displayed on this screen: ► Proposal Name: ► Encryption ► Auth Specify a unique name to the IKE proposal for identification and management purposes. The IKE proposal can be applied to IPSEC proposal. Algorithm: Specify the encryption algorithm for IKE negotiation. Options include: DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key. Algorithm: 3DES: Triple DES, encrypts a plain text with 168-bit key. AES: Uses the AES algorithm for encryption. Select the authentication algorithm for IKE negotiation. Options include: MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest. SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th power of 2) in bits and generates a 160-bit message digest. ► DH Group: Select the DH (Diffie-Hellman) group to be used in key negotiation phase 1. The DH Group sets the strength of the algorithm in bits. Options include DH 768 modp, DH 1024 modp and DH 1536 modp. 1.2.6.3.2 IKE Safety Policy The command “show ike-policy” shows the IKE Policy information as below: Page 42 of 111 FG7008N User Manual Figure 1-66 Show IKE Policy Information The command “set ike-policy” configures the IKE Policy as below. Enter 0 add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 43 of 111 FG7008N User Manual Figure 1-67 Configure IKE Policy The following items are displayed on this screen: ► Policy ► Name: Operation Mode: Specify a unique name to the IKE policy for identification and management purposes. The IKE policy can be applied to IPSEC policy. Select the IKE Exchange Mode in phase 1, and ensure the remote VPN peer uses the same mode. Main: Main mode provides identity protection and exchanges more information, which applies to the scenarios with higher requirement for identity protection. Challenge: Challenge Mode establishes a faster connection but with lower security, which applies to scenarios with lower requirement for identity protection. ► Enable Local ID: If enabled, enter a name for the local device as the ID in IKE negotiation. Page 44 of 111 FG7008N User Manual ► Enable Remote ID: ► Auth Mode: ► Pre Share Key: ► Enable If enabled, enter the name of the remote peer as the ID in IKE negotiation. Select the authentication mode for this IKE policy entry. Enter the Pre-shared Key for IKE authentication, and ensure both the two peers use the same key. The key should consist of visible characters without blank space. Safety Proposal: Select the Proposal for IKE negotiation phase 1. Up to four proposals can be selected. 1.2.6.3.3 IPSEC Safety Proposal The command “show ipsec-proposal” shows the IPSEC Proposal information as below: Figure 1-68 Show IPSEC Proposal Information The command “set ipsec-proposal” configures the IPSEC Proposal as below. Enter 0 add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 45 of 111 FG7008N User Manual Figure 1-69 Configure IPSEC Proposal The following items are displayed on this screen: ► Proposal Name: ► IPSec Protocol: Specify a unique name to the IPSEC Proposal for identification and management purposes. The IPSEC proposal can be applied to IPSEC policy. Select the security protocol to be used. Options include: AH: AH (Authentication Header) provides data origin authentication, data integrity and anti-replay services. ESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services. ► Encryption Algorithm: ESP+AH: Both ESP and AH security protocol. Select the algorithm used to encrypt the data for ESP encryption. Options include: DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key. The key should be 8 characters. 3DES: Triple DES, encrypts a plain text with 168-bit key. The key should be 24 characters. AES: Uses the AES algorithm for encryption. The key should be 16 characters. Page 46 of 111 FG7008N User Manual ► Auth Algorithm: Select the algorithm used to verify the integrity of the data. Options include: MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest. SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest. 1.2.6.3.4 IPSEC Safety Policy The command “show ipsec-policy” shows the IPSEC Policy information as below: Figure 1-70 Show IPSEC Policy Information The command “set ipsec-policy” configures the IPSEC Policy as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 47 of 111 FG7008N User Manual Page 48 of 111 FG7008N User Manual Figure 1-71 Configure IPSEC Policy The following items are displayed on this screen: ► Enable Ipsec: ► IPSEC Policy Name: ► Select Interface: ► VPN Mode: Enable or disable this IPSEC entry. Specify a unique name to the IPSEC policy. Specify the local WAN port for this Policy. Select the network mode for IPSEC policy. Options include: Site To Site: Select this option when the client is a network. PC to Site: Select this option when the client is a host. ► Local Subnet IP & Local Subnet Netmask: Specify IP address range on your local LAN to identify which PCs on your LAN are covered by this policy. ► Remote Address: ► Remote If PC to Site is selected, specify IP address on your remote network to identify which PCs on the remote network are covered by this policy. Subnet IP & Remote Subnet Netmask: Specify IP address range on your remote network to identify which PCs on the remote network are covered by this policy. ► IKE Safety Policy: Specify the IKE policy. ► Enable Safety Prososal: If enabled, Select IPSEC Proposal. 1.2.7 1.2.7.1 Routing Static Route 1.2.7.1.1 IPv4 The command “show static-route ipv4” shows the IPv4 static route information as below: Figure 1-72 Show IPv4 Static Route Information Page 49 of 111 FG7008N User Manual The command “set static-route ipv4” configures the IPv4 static route as below. Figure 1-73 Configure IPv4 Static Route The following items are displayed on this screen: ► Enable: Select it to add and modify the current route. Conversely, disable the current route. ► Destination IP: ► Netmask: ► Next Hop Type: ► Next Hop Interface: ► Next Hop Address: ► Valid: Enter the destination host the route leads to. Enter the Subnet mask of the destination network. Include Next Hop Interface and Next Hop Address(see following option) Specify the interface of next hop for current route Specify the address of next hop for current route Show the status of current route. 1.2.7.1.2 IPv6 The command “show static-route ipv6” show the IPv6 static route information as below: Figure 1-74 Show IPv6 Static Route Information The command “set static-route ipv6” configures the IPv6 static route as below. Figure 1-75 Configure IPv6 Static Route The configuration options of Ipv6 is similar to Ipv4, the prefix length is equal to mask of Ipv4 address. Page 50 of 111 FG7008N User Manual 1.2.7.2 Policy Route The command “show policy-route” shows the policy route information as below: Figure 1-76 Show Policy Route Information The command “set policy-route” configure thes policy route as below. Enter 0 to add a new entry. Enter 2 and choose the entry you want to modify. If you want to delete the entry, enter 1 and choose the corresponding entry. Page 51 of 111 FG7008N User Manual Page 52 of 111 FG7008N User Manual Figure 1-77 Configure Policy Route The following items are displayed on this screen: ► Enable PoliceRoute: Enable or disable the entry ► Next Hop Type: Select from pull-down list: Interface, Address. ► Interface: Specify the interface of next hop for the entry. ► Address: Specify the address of next hop for the entry. ► Description: Give description for the entry. ► Protocol: Specify the protocol, TCP, UDP or ALL. ► Source IP: Enter IP address or IP range of source in the rule entry. ► Destination IP: Enter IP address or IP range of destination in the rule entry. ► Destination Port: Specify port or port range of destination in the rule entry. ► Active Time: Specify the active time range for the rule entry. ► Active Day: Specify the active days for the rule entry. 1.2.7.3 RIP 1.2.7.3.1 RIP Service The command “show rip” shows the RIP information as below: Figure 1-78 Show RIP Information The command “set rip switch” configures the RIP switch as below: Page 53 of 111 FG7008N User Manual Figure 1-79 Configure RIP Switch The following items are displayed on this page: ► Enable RIP Service: Enable or disable RIP service function globally. The command “set rip interface” configures the RIP interface as below. Page 54 of 111 FG7008N User Manual Figure 1-80 Configure RIP Interface The following items are displayed on this screen: ► Interface: ► Receive RIP Version: ► Send RIP Version: ► Authorization Enable: ► Key Mode: ► Key Type: ► Simple String: Specify the interface for the entry. Specify receiving RIP version for the entry. Specify sending RIP version for the entry. Check the box to enable authorization. Specify the encryption mode of key, TEXT(plaintext),MD5(cipertext). Specify the key from Simple String or Key Chain. If select Simple String in item of Key Type, enter simple string as key. 1.2.7.3.2 Key Chain The command “set rip key-chain” configures the RIP key chain as below. Page 55 of 111 FG7008N User Manual Figure 1-81 Configure RIP Key Chain The following items are displayed on this screen: ► Key Chain Name: Enter the name of key chain. ► Key ID: Enter the ID of the entry. ► Key String: Enter the Key of the entry. 1.2.8 1.2.8.1 Advanced Parameters UPnP Parameter The command “show upnp” shows the UPnP information as below: Page 56 of 111 FG7008N User Manual Figure 1-82 Show UPnP Information The command “set upnp” configures the UPnP parameters as below. Figure 1-83 Configure UPnP Parameters The following items are displayed on this screen: ► Enable UPnP: Enable or disable the UPnP function globally. The network interface connected to the DLNA server. ► Upstream Interface: ► Downstream Interface: The network interface connected to the DLNA client. 1.2.9 Multicast The command “show multicast” shows the multicast information as below: Figure 1-84 Show Multicast Information The command “set multicast” configures the multicast parameters as below. Figure 1-85 Configure Multicast Parameters The following items are displayed on this screen: ► Enable IGMP Proxy: Enable or disable the IGMP proxy function globally. Currently, IGMP proxy is mainly used for IPTV. Page 57 of 111 FG7008N User Manual 1.3 VOIP Service 1.3.1 SIP Service The command “show sip” shows the sip service information as bellow: Figure 1-86 Show Sip Server Information Execute the command “set sip” to set the sip information as below: Page 58 of 111 FG7008N User Manual Figure 1-87 Configure Sip Server At first, the command will show the sip server information, and then begin to configure sip server. The following items are displayed on this screen: ► Register server ip or domain: Domain or IP of SIP server. ► Register Server Port: Listening port of SIP server. ► Enable Backup Server or not: Enable or disable backup SIP server. ► Backup Server IP or Domain: Domain or IP of backup SIP server. ► Backup Register Server Port: Listening port of backup SIP server. ► Enable Proxy Server or not: Enable or disable Proxy server. ► Proxy Server domain name or IP: Domain or IP of proxy server. ► Proxy Server Port: Listening port of proxy server. ► Enable Backup Proxy register or not: Enable or disable backup proxy server. ► Backup Proxy Register Server ip or domain: Domain or IP of backup proxy server. ► Backup Proxy Register Server Port: Listening port of backup proxy server. ► Register Interval: Enter the desired time interval at which the sip UA will send register message. ► RTP begin: Local RTP port range begin. ► RTP end: Local RTP port range end. ► Local SIP Port: Local listening port. The command “show sipadvance” shows the advanced SIP information as below: Page 59 of 111 FG7008N User Manual Figure 1-88 Show Adavance Sip Information The command “set sipadvance” configures the advanced SIP information as below: Page 60 of 111 FG7008N User Manual Figure 1-89 Configure Advance Sip Parameter The following items are displayed on this screen: ► Enable Keeping Alive: After successful registration, whether to send keep-alive packets. ► Keep Alive Mode: Keep alive mode: CLRF, OPTIONS or PING. ► Enable Realm: Check the box to enable SIP signaling packets with realm field information. ► Enable Session: Enable or disable UAC / UAS session refresh mode. ► Enable SIP Retrans Timer: When registration fails, whether to initiate retransmission, retransmission cycle and time with configuration. ► User Agent: Check the box to enable signaling packets with User Agent field. ► SDP Mode When Call holding: Select the SIP signal format of call hold. ► Enable Next Nonce: Enable SIP packets with nonce count field information, incremented each one and with a maximum value. ► Support PRACK or not: Enable or disable provisional response. If enabled, 1xx (except 100rel) messages are required to respond with ACK. ► Support User-Phone or not: Whether SIP signaling packets with User = Phone field information. ► Auto Update Register Cycle: Based on server response to update registration period. ► Support Full Register or not: Each registration packets are generated, rather than re-issued. ► First Package With Infomation: The first registration packet with authentication information. ► SDP With Audio When T38 Faxing: T38 fax signaling packet with audio information. Page 61 of 111 FG7008N User Manual 1.3.2 1.3.2.1 User User The command “show sipuser” shows the sip user parameters as below: Figure 1-90 Show sip user Parameter The command “set sipuser” configures the sip parameter as below: Figure 1-91 Configure sip user Parameter The following items are displayed on this screen: ► Register Account: ► Auth Username: ► Password: ► Phone number: Account name registered to SIP server. Username of the account. Password of the account. Caller and called number of subscriber line. Page 62 of 111 FG7008N User Manual ► Enable Register: 1.3.2.2 Enable registering. Wildcard Group The command “show groupregister” show wildcard group as below: Figure 1-92 Show Wildcard Group Parameter The command “set groupregister” sets wildcard group as below: Figure 1-93 Configure Wildcard Group Parameter 1.3.3 Supplementary The command “show extended-server” shows user supplementary as below: Page 63 of 111 FG7008N User Manual Figure 1-94 Show User Supplementary The command “set extended-server” configures the user supplementary parameter as below: Page 64 of 111 FG7008N User Manual Figure 1-95 Configure User Supplementary The following items are displayed on this screen: ► Min Flash Detect Time: The minimum time to detect the flash. ► Max Flash Detect Time: The maximum time to detect the flash. ► Flash Key Enable: Whether to enable digit detect after flash. ► Switch&Release Call: If the digit specified is detected after flash, terminate the active call and recover the call on hold. ► Three Party Call: ► Reject Key: ► Switch Call Key: If the digit specified is detected after flash, enter the conference mode. If the digit specified is detected after flash, reject the call on hold. If the digit specified is detected after flash, hold the active call and recover the call on hold. ► Keep the hold call when onhook: If selected, when hanging up in this context, the telephone rings Page 65 of 111 FG7008N User Manual to notify the user there is still a call on hold. ► (#)Quick Dial Key: Whether to send telephone number immediately after receiving the # key. ► Asterisk Func Key: Whether to use the ‘*’ key as flash key. ► Tap Report: Whether to report an event to server when flash detected. ► Escape Seq: Whether to use an escape characters when sending special DTMF. ► CID Enable: Whether to enable caller id globally. ► Callee Inverse Polarity: Whether to activate the Polarity Reversal for FXS callee. ► Caller Inverse Polarity: Whether to activate the Polarity Reversal for FXS caller. ► Call Forwarding Unconditional: Enable or disable CFU function, if enabled, enter Call Number. 1) Set by keypad service system: *57*TN#, TN is the phone number to be redirected to. ► Call Forwarding No Reply: ► Call Forwarding On Busy: ► Hotline Number: 2) Cancel by keypad service system: #57#. Enable or disable CFNR, if enabled, enter Call Number and Wait Time Long. 1) Set by keypad service system: *41*TN#, TN is the phone number to be redirected to. 2) Cancel by keypad service system: #41#. Enable or disable CFB function, if enabled, enter Call Number. 1) Set by keypad service system: *40*TN#, TN is the phone number to be redirected to. 2) Cancel by keypad service system: #40#. Enter number to hotline function, empty expressed disable. 1) Set delay hotline number by Keypad service system: *52*TN#, TN is the hotline number. 2) Cancel delay hotline number by Keypad service system: #52#. 3) Set instant hotline number by Keypad service system: *42*TN#, TN is the hotline number. 4) Cancel instant hotline number by Keypad service system: #42*EN#, instant hotline can only be deactivated with other extension; EN is the extension number which needs to deactivate instant hotline. ► Delay Time: Time 0 indicates immediate Hotline, Otherwise, indicates delay Hotline. The Delay Time must be configured on the WEB. ► CID Restriction: Enable or disable CID Restriction. If Anonymous As UserName is chosen, user name content is Anonymous also. ► Enable No Disturb: ► Enable Call Waiting: Allows block incoming calls at any time. When you talking, a third party phone comes in, you can hear the beep tone. ► Enable MWI: ► Enable CID: ► CID Mode: Enable or disable MWI (Message-waiting indicator) function. Enable or disable to send CID to phone. There are two methods used for sending caller ID information depending on the application and country specific requirements: FSK: caller ID generation using Frequency Shift Keying (FSK) DTMF: caller ID generation using DTMF signaling. The command “show abbr-dial” shows the abbreviated number of the user as below: Page 66 of 111 FG7008N User Manual Figure 1-96 Show Abbreviated Number The command “set abbr-dial” sets the abbreviated number of the user as below: Figure 1-97 Configure Abbreviated Number The following items are displayed on this screen: ►0-add,1-delete,2-modify: Input “0” to add new abbreviated number item, input “1” to delete a abbreviated numbe from thelist, input “2” to modify one of the abbreviated Page 67 of 111 FG7008N User Manual numbe from the list. ► Abbreviated Number: The abbreviated number. ► Phone Number: The Actual phone number. The command “show whiteblack-list” shows the white list and the black list of the user as below: Figure 1-98 Show White & Black List The command “set whiteblack-list” configures the white list and the black list of the user as below: Page 68 of 111 FG7008N User Manual Figure 1-99 Configure White & Black List The following items are displayed on this screen: ► List Type: Choose type of Black&White List, four types are provided: Incoming Blacklist, Incoming Whitelist, Outgoing Blacklist, Outgoing Whitelist. ► Phone Number: the phone number or sip account. 1.3.4 Codec Parameters The command “show codec” shows the codec parameters as below: Page 69 of 111 FG7008N User Manual Figure 1-100 Show Codec Parameters The command “set codec” configures the codec parameters as below: Figure 1-101 Configure Codec Parameters ► G.711A Packet Period: RTP packetization period of G.711A codec. ► G.711u Packet Period: RTP packetization period of G.711U codec. ► G.723 Packet Period: RTP packetization period of G.723 codec. ► G.729 Packet Period: RTP packetization period of G.729 codec. ► Fax Mode: Choose fax mode, three types are provided: Transparent, T38, VBD. ► Codec Answer Strategy: Two modes are provided: Use Answerer Priority: Codec selection decisions based on the priority level configuration Use Offerer Priority: priority. ► Codec Priority: 1.3.5 Codec selection decision based on caller’s If Use Answerer Priority is selected, set the priority of codec. DSP Parameters The command “show dsp” shows DSP information as below: Page 70 of 111 FG7008N User Manual Figure 1-102 Show DSP Parameter The command “set dsp” configures DSP parameters as below: Figure 1-103 Configure DSP Parameters The following items are displayed on this screen: ► Echo Cancellation: Enable or disable echo cancellation. ► Silence Detection/Suppression: Enable or disable silence detection and silence suppression. ► Input Gain: Configure the input gain value. ► Output Gain: Configure the input gain value ► Delay Level: Choose the delay level, five levels are provided: Minimum, Page 71 of 111 FG7008N User Manual ► DTMF Transfer Model: ► RFC2833 Load Type: ► T38 Max FAX Rate: ► T38 Signaling Redundancy: ► T38 Data Redundancy: ► Ring Frequency: ► Impedance Type: Standard. 1.3.6 Smaller, Moderate, Larger, Maximum. Select DTMF transmission mode: In-Band, INFO, RFC2833. If RFC2833 is selected, specify payload type of RFC2833. Select the maximum rate, when using T38 fax mode: Unlimited, 2400bps, 4800bps, 7200bps, 9600bps, 12000bps, 14400bps. Configure the redundancy of T38 signal. Configure the redundancy of T38 data. Choose the ring frequency: 20Hz, 25Hz. Choose the impedance type: 600Ώ, China Standard, Switzerland Digitmap The command “show digitmap” shows digitmap information as below: Figure 1-104 Show Digit Map Parameter The command “set digitmap” configures digitmap parameters as below: Figure 1-105 Configure Digit Map Parameter ► Enable: Enable or disable digit map function. ► Short Timer: The time of Short Timer in second. ► Digit Map: The digit map rules. 1.3.7 Signal Tone The command “show tone” shows signal tone information as below: Page 72 of 111 FG7008N User Manual Figure 1-106 Show Signal Tone Parameter The command “set tone” configures signa l tone parameters as below: Page 73 of 111 FG7008N User Manual Figure 1-107 Configure Signal Tone Parameter The following items are displayed on this screen: ► Tone Type: Select the type of signal tone. Dial Tone ► User Define Enable: Whether to use user-defined dial tone frequency. ► Dial Tone Frequency 1: ► Dial Tone Frequency 2: Busy Tone ► User Define Enable: Whether to use user-defined busy tone frequency. ► Busy Tone Frequency 1: ► Busy Tone Frequency 2: ► On Time: ► Off Time: Ring Back Tone ► User Define Enable: Whether to use user-defined ringback tone frequency. Page 74 of 111 FG7008N User Manual ► Ring Back Tone Frequency 1: ► Ring Back Tone Frequency 2: ► On Time: ► Off Time: Distinction Ring: Specify the ring cadence for the FXS port. In these fields, you specify the on and off pulses for the ring. The ring cadence that should be configured differs between internal call and external call. 1.3.8 Centrex The command “show inline” shows centrex information as below: Figure 1-108 Show Centrex Parameter The command “set inline” configures centrex parameters as below: Page 75 of 111 FG7008N User Manual Figure 1-109 Configure Centrex Parameter The following items are displayed on this screen: ► Enable Centrex: Whether to enable centrex function globally. ► Group Number: The phone number of this ring group. ► Ringing Policy: Phone ringing policy: Alternate, Ordinal, Parallel. ► Ring Time: Ring time of each member. ► Telephone Number: The number will be added to the ring group. 1.3.9 Phone Book The command “show callroute” shows telephone book information as below: Page 76 of 111 FG7008N User Manual Figure 1-110 Show Phone Book Parameter The command “set callroute” configures telephone book parameters as below: Figure 1-111 Configure Phone Book Parameter The following items are displayed on this screen: ► Phone Prefix: The prefix of this phone book. ► Total Length: The total length of number to wait before sending. ► Prefix Mode: Mode of processing number prefix: Unmodify, Remove, Add, Modify. ► IP/Domain: The IP address or domain of destination. ► Port: The port of destination. Page 77 of 111 FG7008N User Manual ► Description: Description of this rule. 1.3.10 Save and Reload VOIP Parameter VOIP parameter will take effect after save and reload commands: Figure 1-112 Save and Reload Parameter 1.4 System 1.4.1 Time Management The command “show time-management” show the time management information as below: Figure 1-113 Show Time Management Information The command “set time-management” configure the time management parameters as below. Page 78 of 111 FG7008N User Manual Figure 1-114 Configure Time Management Parameters The following items are displayed on this screen: ► Enable NTP: Enable or disable NTP. ► Enable DST: Enable or disable the Daylight Saving Time(DST). ► DST Offset: Enter the offset of DST. ► Month: Specify the month of DST, range from 1 to 12 in one year. ► Weekday : Specify the weekday of DST, range from Sunday to Saturday. ► Order of Weekday in Month: Specify the order of start weekday in the month from pull-down list as following: ► Hour of Day: 1.4.2 First in Month Second in Month Third in Month Fourth in Month Last in Month Specify the start hour of DST, range from 0 to 23 in one day. Reboot System Enter command “reset” to reset the device. Page 79 of 111 FG7008N User Manual 1.4.3 Backup/Restore The command "load config" backup/restore the configurations as blow. Enter 0 to save current parameters as custom default configurations, Enter 1 to reset to custom default parameters, Enter 2 to reset to factory parameters. Figure 1-115 Backup/Restore Configurations 1.4.4 Diagnostic 1.4.4.1 Ping The command "ping" can used to check connectivity of your network in the following screen. Figure 1-116 PING Diagnostic ► Ping: Enter the IP Address or Domain Name of the PC whose connection you wish to diagnose. ► Interface: By selecting the interface, through this interface to send Echo Request messages. ►Ping Packet Size: Specifies the packet size of Echo Request messages sent. ► Ping Count: Specifies the number of Echo Request messages sent. 1.4.5 System Log The command “show syslog” show the system log information as below: Page 80 of 111 FG7008N User Manual Figure 1-117 Show System Log Information The command “set syslog” configure the system log parameters as below. Figure 1-118 Configure System Log Parameters The following items are displayed on this screen: 1.4.6 TR069 The command “show tr069” show the tr069 information as below: Page 81 of 111 FG7008N User Manual Figure 1-119 Show TR069 Information The command “set tr069” configure the tr069 parameters as below. Figure 1-120 Configure TR069 Parameters The following items are displayed on this screen: ► Serial Number: The serial number of device. Read only. Page 82 of 111 FG7008N User Manual ► Enable: ► ACS Address: ► ACS Port: ► ACS Server Name: ► SSL Enable: ► Schedular Send Inform: Enable or disable the TR069 function globally. Enter the IP address or domain name of ACS. Enter the port of ACS. Enter the TR069 server name of ACS. Enable or disable the SSL(Secure Sockets Layer) for TR069. Whether or not the CPE must periodically send CPE information to Server using the Inform method call. Enter the duration in seconds of the interval if enabled. ► Single Account Enable: ► TR069 Account: Whether or not the TR069 Account is enabled. Username used to authenticate the CPE when making a connection to the ACS. ► TR069 password: Password used to authenticate the CPE when making a connection to the ACS. ► Connection Request Auth: Whether to authenticate an ACS making a Connection Request to the CPE. ► Connection Request Username: Username used to authenticate an ACS making a Connection Request to the CPE. ► Connection Request Password: Password used to authenticate an ACS making a Connection Request to the CPE. ► CPE Server Name: ► CPE Port: ► Status: ► Fail Reason: 1.4.7 A part of the HTTP URL for an ACS to make a Connection Request notification to the CPE. In the form:http://host:port/path A part of the HTTP URL for an ACS to make a Connection Request notification to the CPE. In the form:http://host:port/path Connection Status when CPE making a connection to the ACS. Read only. Show reason for the failure when CPE making a connection to the ACS. Read only. SNMP The command “show snmp” show the snmp information as below: Figure 1-121 Show SNMP Information The command “set snmp” configure the snmp parameters as below. Page 83 of 111 FG7008N User Manual Figure 1-122 Configure SNMP Parameters The following items are displayed on this screen: ► Register Enable: ► Server Address or Domain: ► Server Port: ► TRAP Message Interval: ► Regional Identity: ► Device Identifier: ► Enable Double Register Server: ► Backup Server Address or Domain: Check this box to enable SNMP register. Enter the IP address or domain name of register server. Enter the port of Register Server. Set the sending interval between TRAP messages. Set the identity of regional. Set the identifier of device. Check this box to enable backup Register Server. Enter the IP Address or Domain Name of Backup Register Server. ► Backup Server Port: ► Registration Status: Enter the port of Backup Register Server. The status of registration.Read only. FCC Caution. § 15.19 Labelling requirements. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. § 15.21 Information to user. Any Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. § 15.105 Information to the user. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the Page 84 of 111 FG7008N User Manual equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -Reorient or relocate the receiving antenna. -Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help. *RF warning for Mobile device: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Page 85 of 111
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Author : Administrator Create Date : 2015:03:12 19:22:42+08:00 Modify Date : 2015:03:12 19:22:42+08:00 XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00 Producer : Acrobat Distiller 9.0.0 (Windows) Creator Tool : PScript5.dll Version 5.2.2 Format : application/pdf Title : Microsoft Word - FG7008N USER'S MANUAL2.docx Creator : Administrator Document ID : uuid:94f021d1-b0a4-4cc6-a1ab-7969eed75900 Instance ID : uuid:81dcd068-09a9-4892-95a7-ee2bde29040d Page Count : 85EXIF Metadata provided by EXIF.tools