GemTek Technology ADV981119G ADSL2+ Residential Gateway User Manual Cisco 4020210A

Gemtek Technology Co., Ltd. ADSL2+ Residential Gateway Cisco 4020210A

Manual Part 4

Download: GemTek Technology ADV981119G ADSL2+ Residential Gateway User Manual Cisco  4020210A
Mirror Download [FCC.gov]GemTek Technology ADV981119G ADSL2+ Residential Gateway User Manual Cisco  4020210A
Document ID1218027
Application IDAGs9kjj+EYULUPAsPlUykw==
Document DescriptionManual Part 4
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize219.26kB (2740707 bits)
Date Submitted2009-12-22 00:00:00
Date Available2009-12-22 00:00:00
Creation Date2009-12-22 15:13:35
Producing SoftwareAcrobat Distiller 7.0 (Windows)
Document Lastmod2009-12-22 15:13:40
Document TitleCisco, 4020210A
Document CreatorAcrobat PDFMaker 7.0 for Word
Document Author: Cisco

Trusted CA Certificates
4020210 Rev A
Click Security on the main screen. The MAC Filtering screen opens by default.
Click Certificate. The Local Certificates screen opens.
179
Chapter 6 Security Configuration
180
Click the Trusted CA tab. The Trusted CA (Certificate Authority) Certificates
screen opens.
Click Import Certificate. The Import CA Certificate screen opens.
In the Certificate Name field, enter the name of the certificate.
In the Certificate area, copy and paste the contents of the certificate file provided
by the service provider.
Click Apply to save the CA certificate on the residential gateway.
4020210 Rev A
7 Chapter 7
Advanced Configuration
The Advanced tab lets you to check the quality of service and IP traffic
over your network and change the configuration.
Use this chapter to check the status of the more advanced features of
your residential gateway, such as port mapping and DNS server
configuration, and to change the configuration.
In This Chapter
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
4020210 Rev A
Upstream Quality of Service ............................................................. 182
Remote Management ......................................................................... 186
Port Mapping ...................................................................................... 188
Virtual Servers Setup.......................................................................... 191
Port Triggering Setup......................................................................... 195
DMZ Host Setup ................................................................................. 199
DNS Server Configuration ................................................................ 200
DNS Entries ......................................................................................... 201
Dynamic DNS...................................................................................... 202
Nslookup.............................................................................................. 205
Default Gateway Routing .................................................................. 206
Static Route .......................................................................................... 208
Ping ....................................................................................................... 209
Internet Group Management Protocol............................................. 211
IPSec Settings....................................................................................... 213
181
Chapter 7 Advanced Configuration
Upstream Quality of Service
The Upstream Quality of Service screen allows you to configure the Quality of
Service (QoS) settings for the residential gateway.
Path: Advanced > QoS > Upstream Quality of Service
Adding Upstream Quality of Service Settings
To add upstream Quality of Service settings, complete the following steps.
182
Click Advanced on the main screen. The Upstream Quality of Service screen
opens.
4020210 Rev A
Upstream Quality of Service
Click Add. The Add Upstream QoS Rule screen opens.
In the Name field, enter the name of the QoS rule.
In the LAN Port field, select the LAN port for which you want to apply the rule.
In the Protocol field, select the protocol that you want to use from the following
options:
ƒ
ƒ
ƒ
ƒ
4020210 Rev A
TCP/UDP
TCP
UDP
ICMP
In the IP Address field, enter the source and destination addresses.
In the Subnet Mask field, enter the source and destination subnet masks.
In the Port Number field, enter the source and destination ports.
In the MAC address field, enter the MAC address for the source from which the
packets are being sent and the MAC address for the destination. The MAC
address should be in the form of 6 pairs of hex digits. For example,
aa:ee:ff:11:03:24.
183
Chapter 7 Advanced Configuration
10 In the MAC Mask field, enter the mask for the source MAC address from which
the packets are being sent and the MAC Mask for the destination MAC address.
A MAC mask of ff:ff:ff:00:00:00 matches all devices made by the same
manufacturer (identified by the first three pairs of the MAC address). A MAC
mask of ff:ff:ff:ff:ff:ff matches a single device.
11 In the DSCP Check field, select the matching DSCP value from the list of Diffserv
code point.
12 Select the Marker field and choose from the list of Diffserv code point (DSCP)
values to mark the specified data flow.
13 Select the Queue field and choose from the list of queues.
14 Click Save.
Queues Configuration
Use Queues Configuration to configure QoS queues for each WAN connection type.
By configuring the queues, you determine how the packets will be processed
according to the assigned priorities. A queue with a higher priority has lower queue
precedence.
Path: Advanced > QoS > Queues Configuration
To set up your queues, complete the following steps.
184
Click Advanced on the main screen. The Upstream Quality of Service screen
opens.
4020210 Rev A
Upstream Quality of Service
4020210 Rev A
Click Queues Configuration. The Queues Configuration screen opens.
Click Add to add a queue.
For the Queue Configuration Status, select Enable or Disable to enable or
disable your queue configuration.
Select from the Queue drop-down list for the associated WAN interface or
connection type for Queue.
For the Queue Precedence field, select the Precedence as the relative priority for
the queue. A smaller number indicates a higher priority.
Click Save/Apply to save the changes.
185
Chapter 7 Advanced Configuration
Remote Management
The Remote Management -- TR-069 Client screen allows an auto-configuration
server (ACS) to perform auto-configuration, provisioning, collection of statistics, and
diagnostics for this residential gateway.
Path: Advanced > Remote Management
Configuring the TR-069 Client Options
To configure the TR-069 client options, complete the following steps.
186
4020210 Rev A
Remote Management
Click Advanced on the main screen. The Remote Management -- TR-069 Client
screen opens.
In the Inform field, choose one of the following options:
ƒ
Click Enable to enable the periodic "inform" messages from the residential
gateway.
ƒ
Click Disable to disable the inform messages to the residential gateway.
In the Inform Interval field, enter the frequency that the inform messages are sent
from the residential gateway to the auto-configuration server.
In the ACS URL field, enter the URL for the auto-configuration server.
In the ACS User Name field, enter the user name for auto-configuration server.
In the ACS Password field, enter the password for the auto-configuration server.
Check the Connection Request Authentication field.
In the Connection Request User Name field, enter the name of the connection
request.
In the Connection Request Password field, enter the password for the connection
request.
10 Click GetRPCMethods to obtain the list of remote procedural calls (RPC)
supported by the auto-configuration server.
11 Click Save/Apply to save the configuration changes.
4020210 Rev A
187
Chapter 7 Advanced Configuration
Port Mapping
The Port Mapping screen allows you to specify which traffic will be transmitted over
the WAN interface. Traffic is classified by ingress port, such as Ethernet port, or by
DHCP option settings. Port Mapping supports multiple ports to PVC and bridging
groups. Each group will perform as an independent network. To support this
feature, you must create mapping groups with appropriate LAN and WAN
interfaces.
Path: Advanced > Port Mapping
Adding Port Mapping
To add port mapping, complete the following steps.
CAUTION:
This procedure is for administrators only. Incorrectly using this function can
adversely affect your system operation.
188
4020210 Rev A
Port Mapping
4020210 Rev A
Click Advanced on the main screen. The Upstream Quality of Service screen
opens.
Click the Port Mapping tab. The Port Mapping screen opens.
189
Chapter 7 Advanced Configuration
190
Click Add. The Port Mapping Configuration screen opens.
In the Group Name field, enter the name of the group. The group name must be
unique. For example, enter IPTV.
For the Grouped Interfaces field, select interfaces from the Available Interfaces
list and add them to the grouped interface list using the arrow buttons to create
the required mapping of the ports.
In the Automatically Add Clients With the following DHCP Vendor IDs fields,
add the DHCP option 60 [vendor ID option] string for the devices (typically IP
set-tops) attached to the residential gateway.
Click Save/Apply.
4020210 Rev A
Virtual Servers Setup
Virtual Servers Setup
The NAT -- Virtual Servers Setup screen allows you to configure servers to which
you want to forward IP packets that belong to a specific service.
Path: Advanced > IP Networking > NAT > Virtual Servers
Adding a Virtual Server
To add and configure a virtual server, complete the following steps.
4020210 Rev A
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
191
Chapter 7 Advanced Configuration
192
Click Virtual Servers. The Virtual Servers screen opens.
4020210 Rev A
Virtual Servers Setup
From the Virtual Servers Setup screen, click Add. The NAT -- Virtual Servers
screen opens.
Under Server Name, choose one of the following:
ƒ
Click Select a Service, and choose a service from the drop-down list.
OR
ƒ
4020210 Rev A
Click Custom Server, and enter a server name and the Server IP Address.
In the Server IP Address field, enter the IP address for the server.
In the External Port Start/End fields, assign the external (Internet) port range of
numbers that are associated with the service. These are the ports which will be
used for receiving the service request from the WAN. If you have chosen to
Select a Service from the above selection, the ports will be entered automatically
for you.
Under Protocol, select TCP, UDP, or TCP/UDP.
In the Internet Port Start/End fields, assign the internal (LAN) port range of
numbers that are associated with the service. These are the ports which the
actual LAN server defines. If you have chosen to Select a Service from the above
selection, the ports will be entered automatically for you.
193
Chapter 7 Advanced Configuration
10 In the Remote IP field, enter the service request (client) sender's IP address.
Leave it blank to accept all incoming service requests regardless of the senders'
IP address.
11 Click Save/Apply to add the virtual server.
Removing a Virtual Server
To remove a virtual server, complete the following steps.
194
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
Click Virtual Servers. The Virtual Servers screen opens.
From the NAT -- Virtual Servers Setup screen, select Remove in the Remove
column next to the server you wish to remove.
Click Remove to remove the NAT Virtual Server.
4020210 Rev A
Port Triggering Setup
Port Triggering Setup
Some applications require that specific ports in the router's firewall be opened for
access by the remote parties. The Port Triggering feature dynamically opens up the
"Open Ports" in the firewall when an application on the LAN initiates a TCP/UDP
connection to a remote party using the Triggering Ports feature. The router allows
the remote party from the WAN side to establish new connections with the
application on the LAN side using the open ports. A maximum of 32 entries can be
configured.
The NAT -- Port Triggering screen allows you to configure servers to which you
want to forward IP packets that belong to a specific service.
Path: Advanced > IP Networking > NAT > Port Triggering > NAT -- Port
Triggering
Opening a Port on the Firewall
To open a port on the firewall, complete the following steps.
4020210 Rev A
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
195
Chapter 7 Advanced Configuration
Click Port Triggering. The NAT -- Port Triggering screen opens.
From the NAT -- Port Triggering screen, click Add. The NAT Port Triggering
screen opens with a list of available protocols.
Under Application Name, choose one of the following:
ƒ
Click Select an Application and choose an application from the drop-down
list.
OR
ƒ
196
Click Custom Application, and enter a name for the application.
4020210 Rev A
Port Triggering Setup
Complete the fields on the screen as follows:
ƒ
Under Trigger Port Start, enter the triggering port (start) that will cause the
residential gateway to open up the incoming port for the particular LAN
computer.
ƒ
Under Trigger Port End, enter the triggering port (end) that will cause the
residential gateway to open up the incoming port for the particular LAN
computer.
ƒ
ƒ
Under Trigger Protocol, select TCP/UDP, TCP or UDP.
ƒ
Under Open Port End, enter the ending port number of the service you want
to open on the firewall.
ƒ
Under Open Protocol, select TCP/UDP, TCP or UDP.
Under Open Port Start, enter the starting port number of the service you
want to open on the firewall.
Click Save/Apply to open the ports on the firewall.
Closing a Port on the Firewall
To close a port on the firewall, complete the following steps.
4020210 Rev A
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
197
Chapter 7 Advanced Configuration
198
Click Port Triggering. The NAT -- Port Triggering screen opens.
From the NAT -- Port Triggering screen, click Remove in the Remove column
next to the port you wish to close.
Click Remove. The port you selected is closed.
4020210 Rev A
DMZ Host Setup
DMZ Host Setup
The NAT -- DMZ Host screen allows the IP packets from the WAN that do not
belong to any of the applications configured in the Virtual Servers table to be
forwarded to the DMZ (demilitarized zone) host computer.
Path: Advanced > IP Networking > NAT > DMZ Host > NAT -- DMZ Host
Activate the DMZ Host
In the DMZ Host IP Address field, enter the computer's IP address and click
Save/Apply to activate the DMZ host.
Deactivate the DMZ Host
Clear the DMZ Host IP Address field and click Save/Apply to deactivate the DMZ
host.
4020210 Rev A
199
Chapter 7 Advanced Configuration
DNS Server Configuration
The DNS Server Configuration screen allows you to configure the Domain Name
Server (DNS).
If the Enable Automatic Assigned DNS check box is checked, the residential gateway
will accept the first received DNS assignment from one of the PPPoA, PPPoE or
MER/DHCP enabled PVC(s) during the connection establishment. If the check box
is not checked, enter the primary and optional secondary IP address or domain
name address of the DNS server to establish connection. Click Save to save the new
configuration. You must reboot the residential gateway to make the new
configuration effective.
Path: Advanced > IP Networking > DNS > DNS Server
200
4020210 Rev A
DNS Entries
DNS Entries
The DNS Entries page allows you to add domain names and the IP addresses to be
resolved by the Gateway. You could add a DNS entry by entering the Domain name
and the corresponding IP address in the fields. Click Save/Apply to save your
settings.
Path: Advanced > IP Networking > DNS > DNS Entries
4020210 Rev A
201
Chapter 7 Advanced Configuration
Dynamic DNS
The Dynamic DNS screen allows you to alias a dynamic IP address to a static
hostname in any of the many domains. The alias allows your DSL router to be more
easily accessed from various locations on the Internet.
Path: Advanced > IP Networking > DNS > Dynamic DNS
Adding an Alias for A Dynamic IP Address to a Static Host Name
To alias a dynamic IP address to a static host name, complete the following steps.
202
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
4020210 Rev A
Dynamic DNS
4020210 Rev A
Click DNS. The DNS screen opens.
Click Dynamic DNS. The Dynamic DNS screen opens.
Click Add on the Dynamic DNS screen. The Add dynamic DDNS screen opens.
203
Chapter 7 Advanced Configuration
In the D-DNS provider field, select the provider from the drop-down list.
In the Hostname field, enter the name of the host.
In the Interface field, select the interface from the drop-down list.
Under DynNDS Settings, enter your user name and password.
10 Click Save/Apply.
204
4020210 Rev A
Nslookup
Nslookup
The Nslookup tool is a utility to look up information in the DNS (Domain Name
System). Basically, DNS maps domain names to IP addresses. Type in the domain
name in the field, and press Start to look up the IP address.
Path: Advanced > IP Networking > DNS > Nslookup
4020210 Rev A
205
Chapter 7 Advanced Configuration
Default Gateway Routing
The Default Gateway screen allows you to make gateway assignments for devices
that are connected to the residential gateway.
Note: If you change the Enable Automatic Assigned Default Gateway check box
from unselected to selected, you must reboot the router to get the automatic
assigned default gateway.
Path: Advanced > IP Networking > Routing > Default Gateway
Assigning Default Gateways
To assign a default gateway, complete the following steps.
206
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
4020210 Rev A
Default Gateway Routing
Click Routing. The Routing screen opens.
Click Default Gateway. The Default Gateway screen opens.
Do you want to enable the automatic assigned default gateway?
4020210 Rev A
ƒ
If yes, be sure the Enable Automatic Assigned Default Gateway check box is
checked. If this check box is checked, the residential gateway will accept the
first received default gateway assignment from one of the PPPoA, PPPoE or
MER/DHCP enabled PVC(s).
ƒ
If no, be sure the Enable Automatic Assigned Default Gateway check box is
unhecked. If the check box is not checked, enter the default gateway IP
address AND/OR a WAN interface from the drop-down list for the Use
Interface field.
Click Save/Apply to save your selection.
207
Chapter 7 Advanced Configuration
Static Route
The Residential Gateway lets you set up static routes when routing packets from a
specific network to another.
Path: Advanced > IP Networking > Routing > Static Route
To add a static routing entry, complete the following steps.
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
Click Routing. The Routing screen opens.
Click Static Route. The Device Info -- Route screen opens.
Click Add to add a new entry.
Enter the Destination Network Address which should be a network ID for the
destined network.
Enter the Subnet Mask for the destined network.
Select Use Gateway IP Address and identify the Gateway's IP Address to which
the packet is forwarded.
Select Use Interface for the interface that is used to forward the packet from the
drop-down menu.
10 Click Save/Apply at the bottom of the screen.
208
4020210 Rev A
Ping
Ping
The ping utility could be used to test the connectivity with other network devices.
Path: Advanced > IP Networking > Routing > Ping
To test the connectivity with other devices (ping them), complete the following
steps.
4020210 Rev A
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
Click Routing. The Routing screen opens.
Click Ping. The Ping window opens.
209
Chapter 7 Advanced Configuration
210
Enter the IP address of a remote host and click Start Ping Processing. The Ping
result appears on the screen as shown below.
4020210 Rev A
Internet Group Management Protocol
Internet Group Management Protocol
The IGMP screen allows you to configure the Internet Group Management Protocol
(IGMP) parameters. IGMP is a communications protocol that is used to manage the
membership of Internet Protocol multicast groups. Routers use IGMP to manage
multicasting. The IGMP messages are used to determine which host is part of which
multicast group.
Path: Advanced > IP Networking > IGMP
Enabling IGMP Snooping
To enable IGMP snooping, complete the following steps.
4020210 Rev A
Check the Enable IGMP snooping check box.
Select Standard mode to flood unknown multicast traffic. Select Blocking to
discard unknown multicast traffic.
In the Query Interval field, enter the interval in seconds. The Query Interval is
the amount of time in seconds between IGMP Host Query messages sent by the
router.
In the Query Response Interval field, enter the interval in seconds. The Query
Response Interval is the maximum amount of time in seconds that the IGMP
router waits to receive a response to an IGMP Query message.
In the Query Version field, choose the version from the drop-down list.
211
Chapter 7 Advanced Configuration
212
In the Last member Query Interval field, enter the interval in seconds. It is the
amount of time in seconds that the IGMP router waits to receive a response to a
Group-Specific Query message.
In the Last member Query Count field, enter the value in numbers. It is the
number of Group-Specific Query messages sent upon receipt of a message
indicating a leave. (The default is 2.)
Click Save/Reboot to save your changes and reboot the system.enter the value in
numbers. The default is 2. It is the number of Group-Specific Query messages
sent upon receipt of a message indicating a leave.
4020210 Rev A
IPSec Settings
IPSec Settings
The IPSec Settings screen allows you to configure IP security settings for the
residential gateway.
Path: Advanced > IP Networking > IPSec
Adding an IPSec Connection
To add an IPSec connection, complete the following steps.
4020210 Rev A
Click Advanced on the main screen.
Click IP Networking. The NAT screen opens.
Click IPSec. The IPSec Settings screen opens.
213
Chapter 7 Advanced Configuration
Click Add New Connection. The IPSec Settings screen opens.
In the IPSec Connection Name field, enter the name of the connection.
In the Remote IPSec Gateway Address field, enter the gateway address for the
remote IPSec gateway.
In the Tunnel access from local IP addresses field, select Subnet or Single
Address.
In the IP Address for VPN, enter the IP address for the VPN connection.
In the IP Subnetmask field, enter the subnet mask for the VPN IP address.
10 In the Tunnel access from remote IP addresses field, select Subnet or Single
Address.
11 In the IP Address for VPN, enter the IP address for the VPN connection.
12 In the IP Subnetmask field, enter the subnet mask for the VPN IP address.
13 In the Key Exchange Method field, select Auto(IKE) or manual.
14 In the Authentication Method field, select Pre-Shared Key or Certificate (X.509).
15 Depending upon the authentication method that you selected, do one of the
following:
ƒ
If you selected Pre-Shared Key, enter the name of the key in the Pre-Shared
Key field.
OR
ƒ
If you selected Certificate (X.509), select a certificate from the drop-down list
of certificates in the Certificate field.
16 In the Perfect Forward Secrecy field, select one of the following options:
ƒ
If you select Enable, Perfect Forward Secrecy is enabled.
OR
ƒ
If you select Disable, Perfect Forward Secrecy is disabled.
17 Do you want to configure the advanced settings?
214
4020210 Rev A
IPSec Settings
ƒ
If yes, in the Advanced IKE Settings field, click Show Advanced Settings to
populate the screen with advanced settings.
ƒ
If no, go to step 20.
18 Complete the advanced settings as follows:
In the Phase 1 Mode field, select Main or Aggressive.
In the Encryption Algorithm field, select one of the following encryption
algorithms:
–
3DES
–
AES -128
–
AES - 192
–
AES - 256
In the Integrity Algorithm field, select MD5 or SHA1.
In the Select Diffie-Hellman Group for Key Exchange field, select one of the
following options:
–
768 bit
–
1024 bit
–
1536 bit
–
2048 bit
–
3072 bit
–
4096 bit
–
6144 bit
–
8192 bit
In the Key Life Time, enter the life of the key in seconds.
19 Repeat step 15 through 18 for each phase.
20 Click Save/Apply to save your settings.
4020210 Rev A
215
8 Chapter 8
Customer Information
Introduction
This chapter provides contact information to obtain product support
and return products for service.
In This Chapter
ƒ
ƒ
4020210 Rev A
Customer Support .............................................................................. 218
Return Products for Repair................................................................ 220
217
Chapter 8 Customer Information
Customer Support
If You Have Questions
If you have questions about this product, contact the representative who handles
your account for information.
If you have technical questions, telephone your nearest technical support office at
one of the following telephone numbers.
The Americas
United States
Cisco® Services
Atlanta, Georgia
Technical Support
ƒ
For Digital Broadband Delivery System products
only, call:
– Toll-free: 1-800-283-2636
– Local: 770-236-2200
– Fax: 770-236-2488
ƒ
For all products other than Digital Broadband
Delivery System, call:
– Toll-free: 1-800-722-2009
– Local: 678-277-1120
– Fax: 770-236-2306
Customer Service
ƒ
ƒ
ƒ
Toll-free: 1-800-722-2009
Local: 678-277-1120
Fax: 770-236-5477
The United Kingdom and Europe
Europe
European Technical Product Information
Assistance Center
Telephone: 32-56-445-444
(EuTAC), Belgium ƒ
Technical Support
ƒ
ƒ
Telephone: 32-56-445-197 or 32-56-445-155
Fax: 32-56-445-061
Asia-Pacific
China
Hong Kong
Technical Support
Telephone: 011-852-2588-4745
Fax: 011-852-2588-3139
218
4020210 Rev A
Customer Support
Australia
Australia
Sydney
Technical Support
Telephone: 011-61-2-8446-5374
Fax: 011-61-2-8446-8015
Japan
Japan
Tokyo
Technical Support
Telephone: 011-81-3-5322-2067
Fax: 011-81-3-5322-1311
Additional Information
Access your company's extranet site to view or order additional technical
publications. For accessing instructions, contact the representative who handles your
account. Check your extranet site often as the information is updated frequently.
4020210 Rev A
219
Chapter 8 Customer Information
Return Products for Repair
You must obtain a return material authorization (RMA) number before you send
products to us for repair or upgrade. To return a product for repair or upgrade,
complete the following steps.
Obtain the following information about the product that you want to return for
repair or upgrade:
ƒ
The name and model number (if applicable) of the product and the quantity
of returns
ƒ
ƒ
A reason for the return, such as upgrade or failure symptom
ƒ
A purchase order number
Your company name, contact, telephone number, email address, fax number,
repair disposition authority, and any service contract details
Notes:
–
If you are unable to issue a purchase order at the time you request an
RMA number, a proforma invoice will be sent to you at the completion of
repair. This invoice lists all costs incurred.
–
We must receive a purchase order within 15 days of receipt of proforma.
Important: In-warranty products can accrue costs through damage or misuse, or
if no problem is found. Products incurring costs will not be returned to the
customer without a valid purchase order.
Telephone or fax Factory Services at one of the following numbers to request an
RMA number:
ƒ
ƒ
From North America, call:
ƒ
From Latin America, call:
– Tel: 1-800-722-2009
– Tel: 1-770-236-5662
– Fax: 770-236-5477
– Fax: 1-770-236-5888
From Europe, Middle East,
or Africa, call:
– Tel: 32-56-445-444
ƒ
From Asia Pacific, call:
– Tel: 852-2588-4746
– Fax: 852-2588-3139
– Fax: 32-56-445-051
Result: The customer service representative will provide the RMA number and
the shipping instructions to you.
Note: RMA numbers are only valid for 60 days. You must contact a customer
service representative to revalidate your RMA numbers if the number is older
than 60 days. After the RMA number is revalidated, you can return the product.
220
4020210 Rev A
Return Products for Repair
Pack the product in its original container and protective packing material.
Important:
ƒ
If the original container and packing material are no longer available, pack
the product in a sturdy, corrugated box and cushion it with packing material
that is appropriate for the method of shipping.
ƒ
You are responsible for delivering the returned goods to us safely and
undamaged. Improperly packaged shipments, which may have caused
additional damage, may be refused and returned to you at your expense.
ƒ
Do not return any power cords or accessories.
Write the following information on the outside of the container:
ƒ
ƒ
ƒ
ƒ
ƒ
Your name
Your complete address
Your Telephone number
RMA number
Problem description (for product failures)
Important: Absence of the RMA number may delay processing your product for
repair. Include the RMA number in all correspondence.
Ship the product to the address you receive from the customer service
representative.
Important: We do not accept freight collect. Be sure to prepay all shipments.
4020210 Rev A
221
Cisco Systems, Inc.
5030 Sugarloaf Parkway, Box 465447
Lawrenceville, GA 30042
678.277.1000
www.cisco.com
This document includes various trademarks of Cisco Systems, Inc. Please see the Notices
section of this document for a list of the Cisco Systems, Inc. trademarks used in this
document.
Product and service availability are subject to change without notice.
© 2009 Cisco Systems, Inc. All rights reserved.
Part Number 4020210 Rev A
November 2009 Printed in United States of America

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
XMP Toolkit                     : 3.1-701
Modify Date                     : 2009:12:22 15:13:40+08:00
Create Date                     : 2009:12:22 15:13:35+08:00
Metadata Date                   : 2009:12:22 15:13:40+08:00
Creator Tool                    : Acrobat PDFMaker 7.0 for Word
Format                          : application/pdf
Title                           : Cisco, 4020210A
Description                     : Installation and Operation Guide - DDR2200-CL Series Residential Gateway
Creator                         : Cisco
Document ID                     : uuid:d607e285-d3d4-4d30-86a0-d614f00605db
Instance ID                     : uuid:ad7cde75-de43-4e0f-b970-d571e92d24a2
Producer                        : Acrobat Distiller 7.0 (Windows)
Has XFA                         : No
Page Count                      : 44
Subject                         : Installation and Operation Guide - DDR2200-CL Series Residential Gateway
Author                          : Cisco
EXIF Metadata provided by EXIF.tools
FCC ID Filing: MXF-ADV981119G

Navigation menu