ZyXEL Communications MAX207HW2 WiMAX MIMO 2.5GHz Indoor Multiple-user CPE User Manual Quick Start Guide

ZyXEL Communications Corporation WiMAX MIMO 2.5GHz Indoor Multiple-user CPE Quick Start Guide

Contents

Manual 3

Download: ZyXEL Communications MAX207HW2 WiMAX MIMO 2.5GHz Indoor Multiple-user CPE User Manual Quick Start Guide
Mirror Download [FCC.gov]ZyXEL Communications MAX207HW2 WiMAX MIMO 2.5GHz Indoor Multiple-user CPE User Manual Quick Start Guide
Document ID1139780
Application IDAz+Aoq0cmU7Augo/UH99Ug==
Document DescriptionManual 3
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize230.65kB (2883089 bits)
Date Submitted2009-07-16 00:00:00
Date Available2009-07-16 00:00:00
Creation Date2009-06-11 08:52:52
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2009-06-24 20:24:55
Document TitleQuick Start Guide
Document CreatorAdobe Illustrator CS3
Document Author: Chris Jones

Appendix D IP Addresses and Subnetting
Notation
Since the mask is always a continuous number of ones beginning from the left,
followed by a continuous number of zeros for the remainder of the 32 bit mask,
you can simply specify the number of ones instead of writing the value of each
octet. This is usually specified by writing a “/” followed by the number of bits in
the mask after the address.
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask
255.255.255.128.
The following table shows some possible subnet masks using both notations.
Table 74 Alternative Subnet Mask Notation
SUBNET MASK
ALTERNATIVE
NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.0
/24
0000 0000
255.255.255.128
/25
1000 0000
128
255.255.255.192
/26
1100 0000
192
255.255.255.224
/27
1110 0000
224
255.255.255.240
/28
1111 0000
240
255.255.255.248
/29
1111 1000
248
255.255.255.252
/30
1111 1100
252
Subnetting
You can use subnetting to divide one network into multiple sub-networks. In the
following example a network administrator creates two sub-networks to isolate a
group of servers from the rest of the company network for security reasons.
In this example, the company network address is 192.168.1.0. The first three
octets of the address (192.168.1) are the network number, and the remaining
octet is the host ID, allowing a maximum of 28 – 2 or 254 possible hosts.
232
User’s Guide
Appendix D IP Addresses and Subnetting
The following figure shows the company network before subnetting.
Figure 119 Subnetting Example: Before Subnetting
You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into
two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or
/25).
The “borrowed” host ID bit can have a value of either 0 or 1, allowing two
subnets; 192.168.1.0 /25 and 192.168.100.128 /25.
User’s Guide
233
Appendix D IP Addresses and Subnetting
The following figure shows the company network after subnetting. There are now
two sub-networks, A and B.
Figure 120 Subnetting Example: After Subnetting
In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of
27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself,
all ones is the subnet’s broadcast address).
192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.100.127
with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP
address that can be assigned to an actual host for subnet A is 192.168.100.1 and
the highest is 192.168.100.126.
Similarly, the host ID range for subnet B is 192.168.100.129 to 192.168.1.254.
Example: Four Subnets
The previous example illustrated using a 25-bit subnet mask to divide a 24-bit
address into two subnets. Similarly, to divide a 24-bit address into four subnets,
you need to “borrow” two host ID bits to give four possible combinations (00, 01,
10 and 11). The subnet mask is 26 bits
(11111111.11111111.11111111.11000000) or 255.255.255.192.
234
User’s Guide
Appendix D IP Addresses and Subnetting
Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a
host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast
address).
Table 75 Subnet 1
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address (Decimal)
192.168.1.
IP Address (Binary)
11000000.10101000.00000001.
00000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.0
Lowest Host ID: 192.168.100.1
Broadcast Address:
192.168.1.63
Highest Host ID: 192.168.1.62
Table 76 Subnet 2
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
64
IP Address (Binary)
11000000.10101000.00000001.
01000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.64
Lowest Host ID: 192.168.1.65
Broadcast Address:
192.168.100.127
Highest Host ID: 192.168.100.126
Table 77 Subnet 3
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
128
IP Address (Binary)
11000000.10101000.00000001.
10000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.100.128
Lowest Host ID: 192.168.100.129
Broadcast Address:
192.168.100.191
Highest Host ID: 192.168.100.190
Table 78 Subnet 4
User’s Guide
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
192
IP Address (Binary)
11000000.10101000.00000001.
11000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.100.192
Lowest Host ID: 192.168.100.193
Broadcast Address:
192.168.1.255
Highest Host ID: 192.168.1.254
235
Appendix D IP Addresses and Subnetting
Example: Eight Subnets
Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100,
101, 110 and 111).
The following table shows IP address last octet values for each subnet.
Table 79 Eight Subnets
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
30
31
32
33
62
63
64
65
94
95
96
97
126
127
128
129
158
159
160
161
190
191
192
193
222
223
224
225
254
255
Subnet Planning
The following table is a summary for subnet planning on a network with a 24-bit
network number.
Table 80 24-bit Network Number Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS NO. HOSTS PER
SUBNET
255.255.255.128 (/25)
126
255.255.255.192 (/26)
62
255.255.255.224 (/27)
30
255.255.255.240 (/28)
16
14
255.255.255.248 (/29)
32
255.255.255.252 (/30)
64
255.255.255.254 (/31)
128
The following table is a summary for subnet planning on a network with a 16-bit
network number.
Table 81 16-bit Network Number Subnet Planning
236
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. HOSTS PER
NO. SUBNETS SUBNET
255.255.128.0 (/17)
32766
255.255.192.0 (/18)
16382
User’s Guide
Appendix D IP Addresses and Subnetting
Table 81 16-bit Network Number Subnet Planning (continued)
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. HOSTS PER
NO. SUBNETS SUBNET
255.255.224.0 (/19)
8190
255.255.240.0 (/20)
16
4094
255.255.248.0 (/21)
32
2046
255.255.252.0 (/22)
64
1022
255.255.254.0 (/23)
128
510
255.255.255.0 (/24)
256
254
255.255.255.128 (/25)
512
126
10
255.255.255.192 (/26)
1024
62
11
255.255.255.224 (/27)
2048
30
12
255.255.255.240 (/28)
4096
14
13
255.255.255.248 (/29)
8192
14
255.255.255.252 (/30)
16384
15
255.255.255.254 (/31)
32768
Configuring IP Addresses
Where you obtain your network number depends on your particular situation. If
the ISP or your network administrator assigns you a block of registered IP
addresses, follow their instructions in selecting the IP addresses and the subnet
mask.
If the ISP did not explicitly give you an IP network number, then most likely you
have a single user account and the ISP will assign you a dynamic IP address when
the connection is established. If this is the case, it is recommended that you select
a network number from 192.168.0.0 to 192.168.255.0. The Internet Assigned
Number Authority (IANA) reserved this block of addresses specifically for private
use; please do not use any other number unless you are told otherwise. You must
also enable Network Address Translation (NAT) on the WiMAX Modem.
Once you have decided on the network number, pick an IP address for your WiMAX
Modem that is easy to remember (for instance, 192.168.100.1) but make sure
that no other device on your network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your
WiMAX Modem will compute the subnet mask automatically based on the IP
address that you entered. You don't need to change the subnet mask computed by
the WiMAX Modem unless you are instructed to do otherwise.
User’s Guide
237
Appendix D IP Addresses and Subnetting
Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are
isolated from the Internet (running only between two branch offices, for example)
you can assign any IP addresses to the hosts without problems. However, the
Internet Assigned Numbers Authority (IANA) has reserved the following three
blocks of IP addresses specifically for private networks:
• 10.0.0.0
• 172.16.0.0
— 10.255.255.255
— 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obtain your IP address from the IANA, from an ISP, or it can be assigned
from a private network. If you belong to a small organization and your Internet
access is through an ISP, the ISP can provide you with the Internet addresses for
your local networks. On the other hand, if you are part of a much larger
organization, you should consult your network administrator for the appropriate IP
addresses.
Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment,
please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
IP Address Conflicts
Each device on a network must have a unique IP address. Devices with duplicate
IP addresses on the same network will not be able to access the Internet or other
resources. The devices may also be unreachable through the network.
Conflicting Computer IP Addresses Example
More than one device can not use the same IP address. In the following example
computer A has a static (or fixed) IP address that is the same as the IP address
that a DHCP server assigns to computer B which is a DHCP client. Neither can
access the Internet. This problem can be solved by assigning a different static IP
238
User’s Guide
Appendix D IP Addresses and Subnetting
address to computer A or setting computer A to obtain an IP address
automatically.
Figure 121 Conflicting Computer IP Addresses Example
Conflicting Router IP Addresses Example
Since a router connects different networks, it must have interfaces using different
network numbers. For example, if a router is set between a LAN and the Internet
(WAN), the router’s LAN and WAN addresses must be on different subnets. In the
following example, the LAN and WAN are on the same subnet. The LAN computers
cannot access the Internet because the router cannot route between networks.
Figure 122 Conflicting Computer IP Addresses Example
Conflicting Computer and Router IP Addresses Example
More than one device can not use the same IP address. In the following example,
the computer and the router’s LAN port both use 192.168.100.1 as the IP address.
User’s Guide
239
Appendix D IP Addresses and Subnetting
The computer cannot access the Internet. This problem can be solved by
assigning a different IP address to the computer or the router’s LAN port.
Figure 123 Conflicting Computer and Router IP Addresses Example
240
User’s Guide
APPENDIX
Importing Certificates
This appendix shows you how to import public key certificates into your web
browser.
Public key certificates are used by web browsers to ensure that a secure web site
is legitimate. When a certificate authority such as VeriSign, Comodo, or Network
Solutions, to name a few, receives a certificate request from a website operator,
they confirm that the web domain and contact information in the request match
those on public record with a domain name registrar. If they match, then the
certificate is issued to the website operator, who then places it on the site to be
issued to all visiting web browsers to let them know that the site is legitimate.
Many ZyXEL products, such as the NSA-2401, issue their own public key
certificates. These can be used by web browsers on a LAN or WAN to verify that
they are in fact connecting to the legitimate device and not one masquerading as
it. However, because the certificates were not issued by one of the several
organizations officially recognized by the most common web browsers, you will
need to import the ZyXEL-created certificate into your web browser and flag that
certificate as a trusted authority.
Note: You can see if you are browsing on a secure website if the URL in your web
browser’s address bar begins with https:// or there is a sealed padlock
icon (
) somewhere in the main browser window (not all browsers show the
padlock in the same location.)
In this appendix, you can import a public key certificate for:
• Internet Explorer on page 242
• Firefox on page 252
• Opera on page 258
• Konqueror on page 266
User’s Guide
241
Appendix E Importing Certificates
Internet Explorer
The following example uses Microsoft Internet Explorer 7 on Windows XP
Professional; however, they can also apply to Internet Explorer on Windows Vista.
If your device’s web configurator is set to use SSL certification, then the first time
you browse to it you are presented with a certification error.
Figure 124 Internet Explorer 7: Certification Error
Click Continue to this website (not recommended).
Figure 125 Internet Explorer 7: Certification Error
242
User’s Guide
Appendix E Importing Certificates
In the Address Bar, click Certificate Error > View certificates.
Figure 126 Internet Explorer 7: Certificate Error
In the Certificate dialog box, click Install Certificate.
Figure 127 Internet Explorer 7: Certificate
User’s Guide
243
Appendix E Importing Certificates
In the Certificate Import Wizard, click Next.
Figure 128 Internet Explorer 7: Certificate Import Wizard
If you want Internet Explorer to Automatically select certificate store based
on the type of certificate, click Next again and then go to step 9.
Figure 129 Internet Explorer 7: Certificate Import Wizard
244
User’s Guide
Appendix E Importing Certificates
Otherwise, select Place all certificates in the following store and then click
Browse.
Figure 130 Internet Explorer 7: Certificate Import Wizard
In the Select Certificate Store dialog box, choose a location in which to save the
certificate and then click OK.
Figure 131 Internet Explorer 7: Select Certificate Store
User’s Guide
245
Appendix E Importing Certificates
In the Completing the Certificate Import Wizard screen, click Finish.
Figure 132 Internet Explorer 7: Certificate Import Wizard
10 If you are presented with another Security Warning, click Yes.
Figure 133 Internet Explorer 7: Security Warning
246
User’s Guide
Appendix E Importing Certificates
11 Finally, click OK when presented with the successful certificate installation
message.
Figure 134 Internet Explorer 7: Certificate Import Wizard
12 The next time you start Internet Explorer and go to a ZyXEL web configurator
page, a sealed padlock icon appears in the address bar. Click it to view the page’s
Website Identification information.
Figure 135 Internet Explorer 7: Website Identification
User’s Guide
247
Appendix E Importing Certificates
Installing a Stand-Alone Certificate File in Internet Explorer
Rather than browsing to a ZyXEL web configurator and installing a public key
certificate when prompted, you can install a stand-alone certificate file if one has
been issued to you.
Double-click the public key certificate file.
Figure 136 Internet Explorer 7: Public Key Certificate File
In the security warning dialog box, click Open.
Figure 137 Internet Explorer 7: Open File - Security Warning
248
Refer to steps 4-12 in the Internet Explorer procedure beginning on page 242 to
complete the installation process.
User’s Guide
Appendix E Importing Certificates
Removing a Certificate in Internet Explorer
This section shows you how to remove a public key certificate in Internet Explorer
7.
Open Internet Explorer and click TOOLS > Internet Options.
Figure 138 Internet Explorer 7: Tools Menu
In the Internet Options dialog box, click Content > Certificates.
Figure 139 Internet Explorer 7: Internet Options
User’s Guide
249
Appendix E Importing Certificates
In the Certificates dialog box, click the Trusted Root Certificates Authorities
tab, select the certificate that you want to delete, and then click Remove.
Figure 140 Internet Explorer 7: Certificates
In the Certificates confirmation, click Yes.
Figure 141 Internet Explorer 7: Certificates
In the Root Certificate Store dialog box, click Yes.
Figure 142 Internet Explorer 7: Root Certificate Store
250
User’s Guide
Appendix E Importing Certificates
The next time you go to the web site that issued the public key certificate you just
removed, a certification error appears.
User’s Guide
251
Appendix E Importing Certificates
Firefox
The following example uses Mozilla Firefox 2 on Windows XP Professional;
however, the screens can also apply to Firefox 2 on all platforms.
If your device’s web configurator is set to use SSL certification, then the first time
you browse to it you are presented with a certification error.
Select Accept this certificate permanently and click OK.
Figure 143 Firefox 2: Website Certified by an Unknown Authority
252
User’s Guide
Appendix E Importing Certificates
The certificate is stored and you can now connect securely to the web configurator.
A sealed padlock appears in the address bar, which you can click to open the Page
Info > Security window to view the web page’s security information.
Figure 144 Firefox 2: Page Info
User’s Guide
253
Appendix E Importing Certificates
Installing a Stand-Alone Certificate File in Firefox
Rather than browsing to a ZyXEL web configurator and installing a public key
certificate when prompted, you can install a stand-alone certificate file if one has
been issued to you.
Open Firefox and click TOOLS > Options.
Figure 145 Firefox 2: Tools Menu
In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Figure 146 Firefox 2: Options
254
User’s Guide
Appendix E Importing Certificates
In the Certificate Manager dialog box, click Web Sites > Import.
Figure 147
Use the Select File dialog box to locate the certificate and then click Open.
Figure 148
Firefox 2: Certificate Manager
Firefox 2: Select File
The next time you visit the web site, click the padlock in the address bar to open
the Page Info > Security window to see the web page’s security information.
User’s Guide
255
Appendix E Importing Certificates
Removing a Certificate in Firefox
This section shows you how to remove a public key certificate in Firefox 2.
Open Firefox and click TOOLS > Options.
Figure 149 Firefox 2: Tools Menu
In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Figure 150 Firefox 2: Options
256
User’s Guide
Appendix E Importing Certificates
In the Certificate Manager dialog box, select the Web Sites tab, select the
certificate that you want to remove, and then click Delete.
Figure 151
Firefox 2: Certificate Manager
In the Delete Web Site Certificates dialog box, click OK.
Figure 152 Firefox 2: Delete Web Site Certificates
The next time you go to the web site that issued the public key certificate you just
removed, a certification error appears.
User’s Guide
257
Appendix E Importing Certificates
Opera
The following example uses Opera 9 on Windows XP Professional; however, the
screens can apply to Opera 9 on all platforms.
If your device’s web configurator is set to use SSL certification, then the first time
you browse to it you are presented with a certification error.
Click Install to accept the certificate.
Figure 153 Opera 9: Certificate signer not found
258
User’s Guide
Appendix E Importing Certificates
The next time you visit the web site, click the padlock in the address bar to open
the Security information window to view the web page’s security details.
Figure 154 Opera 9: Security information
User’s Guide
259
Appendix E Importing Certificates
Installing a Stand-Alone Certificate File in Opera
Rather than browsing to a ZyXEL web configurator and installing a public key
certificate when prompted, you can install a stand-alone certificate file if one has
been issued to you.
Open Opera and click TOOLS > Preferences.
Figure 155 Opera 9: Tools Menu
260
User’s Guide
Appendix E Importing Certificates
In Preferences, click ADVANCED > Security > Manage certificates.
Figure 156 Opera 9: Preferences
User’s Guide
261
Appendix E Importing Certificates
In the Certificates Manager, click Authorities > Import.
Figure 157
Use the Import certificate dialog box to locate the certificate and then click
Open.
Figure 158
262
Opera 9: Certificate manager
Opera 9: Import certificate
User’s Guide
Appendix E Importing Certificates
In the Install authority certificate dialog box, click Install.
Figure 159
Next, click OK.
Figure 160
Opera 9: Install authority certificate
Opera 9: Install authority certificate
The next time you visit the web site, click the padlock in the address bar to open
the Security information window to view the web page’s security details.
User’s Guide
263
Appendix E Importing Certificates
Removing a Certificate in Opera
This section shows you how to remove a public key certificate in Opera 9.
Open Opera and click TOOLS > Preferences.
Figure 161 Opera 9: Tools Menu
In Preferences, ADVANCED > Security > Manage certificates.
Figure 162 Opera 9: Preferences
264
User’s Guide
Appendix E Importing Certificates
In the Certificates manager, select the Authorities tab, select the certificate
that you want to remove, and then click Delete.
Figure 163
Opera 9: Certificate manager
The next time you go to the web site that issued the public key certificate you just
removed, a certification error appears.
Note: There is no confirmation when you delete a certificate authority, so be
absolutely certain that you want to go through with it before clicking the button.
User’s Guide
265
Appendix E Importing Certificates
Konqueror
The following example uses Konqueror 3.5 on openSUSE 10.3, however the
screens apply to Konqueror 3.5 on all Linux KDE distributions.
If your device’s web configurator is set to use SSL certification, then the first time
you browse to it you are presented with a certification error.
Click Continue.
Figure 164 Konqueror 3.5: Server Authentication
Click Forever when prompted to accept the certificate.
Figure 165 Konqueror 3.5: Server Authentication
266
User’s Guide
Appendix E Importing Certificates
Click the padlock in the address bar to open the KDE SSL Information window
and view the web page’s security details.
Figure 166 Konqueror 3.5: KDE SSL Information
User’s Guide
267
Appendix E Importing Certificates
Installing a Stand-Alone Certificate File in Konqueror
Rather than browsing to a ZyXEL web configurator and installing a public key
certificate when prompted, you can install a stand-alone certificate file if one has
been issued to you.
Double-click the public key certificate file.
Figure 167 Konqueror 3.5: Public Key Certificate File
In the Certificate Import Result - Kleopatra dialog box, click OK.
Figure 168 Konqueror 3.5: Certificate Import Result
The public key certificate appears in the KDE certificate manager, Kleopatra.
Figure 169 Konqueror 3.5: Kleopatra
268
User’s Guide
Appendix E Importing Certificates
The next time you visit the web site, click the padlock in the address bar to open
the KDE SSL Information window to view the web page’s security details.
User’s Guide
269
Appendix E Importing Certificates
Removing a Certificate in Konqueror
This section shows you how to remove a public key certificate in Konqueror 3.5.
Open Konqueror and click Settings > Configure Konqueror.
Figure 170 Konqueror 3.5: Settings Menu
In the Configure dialog box, select Crypto.
On the Peer SSL Certificates tab, select the certificate you want to delete and
then click Remove.
Figure 171 Konqueror 3.5: Configure
270
The next time you go to the web site that issued the public key certificate you just
removed, a certification error appears.
User’s Guide
Appendix E Importing Certificates
Note: There is no confirmation when you remove a certificate authority, so be
absolutely certain you want to go through with it before clicking the button.
User’s Guide
271
Appendix E Importing Certificates
272
User’s Guide
APPENDIX
SIP Passthrough
Enabling/Disabling the SIP ALG
You can turn off the WiMAX Modem SIP ALG to avoid retranslating the IP address
of an existing SIP device that is using STUN. If you want to use STUN with a SIP
client device (a SIP phone or IP phone for example) behind the WiMAX Modem,
use the ip alg disable ALG_SIP command to turn off the SIP ALG.
Signaling Session Timeout
Most SIP clients have an “expire” mechanism indicating the lifetime of signaling
sessions. The SIP UA sends registration packets to the SIP server periodically and
keeps the session alive in the WiMAX Modem.
If the SIP client does not have this mechanism and makes no call during the
WiMAX Modem SIP timeout default (60 minutes), the WiMAX Modem SIP ALG
drops any incoming calls after the timeout period. You can use the ip alg
siptimeout command to change the timeout value.
Audio Session Timeout
If no voice packets go through the SIP ALG before the timeout period default (5
minutes) expires, the SIP ALG does not drop the call but blocks all voice traffic and
deletes the audio session. You cannot hear anything and you will need to make a
new call to continue your conversation.
User’s Guide
273
Appendix F SIP Passthrough
274
User’s Guide
APPENDIX
Common Services
The following table lists some commonly-used services and their associated
protocols and port numbers. For a comprehensive list of port numbers, ICMP type/
code numbers and services, visit the IANA (Internet Assigned Number Authority)
web site.
• Name: This is a short, descriptive name for the service. You can use this one or
create a different one, if you like.
• Protocol: This is the type of IP protocol used by the service. If this is TCP/
UDP, then the service uses the same port number with TCP and UDP. If this is
USER-DEFINED, the Port(s) is the IP protocol number, not the port number.
• Port(s): This value depends on the Protocol. Please refer to RFC 1700 for
further information about port numbers.
• If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number.
• If the Protocol is USER, this is the IP protocol number.
• Description: This is a brief explanation of the applications that use this service
or the situations in which this service is used.
Table 82 Commonly Used Services
NAME
PROTOCOL
PORT(S)
DESCRIPTION
AH
(IPSEC_TUNNEL)
User-Defined
51
The IPSEC AH (Authentication
Header) tunneling protocol uses this
service.
AIM/New-ICQ
TCP
5190
AOL’s Internet Messenger service. It
is also used as a listening port by
ICQ.
AUTH
TCP
113
Authentication protocol used by some
servers.
BGP
TCP
179
Border Gateway Protocol.
BOOTP_CLIENT
UDP
68
DHCP Client.
BOOTP_SERVER
UDP
67
DHCP Server.
CU-SEEME
TCP
7648
UDP
24032
A popular videoconferencing solution
from White Pines Software.
TCP/UDP
53
DNS
User’s Guide
Domain Name Server, a service that
matches web names (for example
www.zyxel.com) to IP numbers.
275
Appendix G Common Services
Table 82 Commonly Used Services (continued)
276
NAME
PROTOCOL
PORT(S)
DESCRIPTION
ESP
(IPSEC_TUNNEL)
User-Defined
50
The IPSEC ESP (Encapsulation
Security Protocol) tunneling protocol
uses this service.
FINGER
TCP
79
Finger is a UNIX or Internet related
command that can be used to find out
if a user is logged on.
FTP
TCP
20
TCP
21
File Transfer Program, a program to
enable fast transfer of files, including
large files that may not be possible by
e-mail.
H.323
TCP
1720
NetMeeting uses this protocol.
HTTP
TCP
80
Hyper Text Transfer Protocol - a
client/server protocol for the world
wide web.
HTTPS
TCP
443
HTTPS is a secured http session often
used in e-commerce.
ICMP
User-Defined
Internet Control Message Protocol is
often used for diagnostic or routing
purposes.
ICQ
UDP
4000
This is a popular Internet chat
program.
IGMP
(MULTICAST)
User-Defined
Internet Group Management Protocol
is used when sending packets to a
specific group of hosts.
IKE
UDP
500
The Internet Key Exchange algorithm
is used for key distribution and
management.
IRC
TCP/UDP
6667
This is another popular Internet chat
program.
MSN Messenger
TCP
1863
Microsoft Networks’ messenger
service uses this protocol.
NEW-ICQ
TCP
5190
An Internet chat program.
NEWS
TCP
144
A protocol for news groups.
NFS
UDP
2049
Network File System - NFS is a client/
server distributed file service that
provides transparent file sharing for
network environments.
NNTP
TCP
119
Network News Transport Protocol is
the delivery mechanism for the
USENET newsgroup service.
PING
User-Defined
Packet INternet Groper is a protocol
that sends out ICMP echo requests to
test whether or not a remote host is
reachable.
POP3
TCP
110
Post Office Protocol version 3 lets a
client computer get e-mail from a
POP3 server through a temporary
connection (TCP/IP or other).
User’s Guide
Appendix G Common Services
Table 82 Commonly Used Services (continued)
User’s Guide
NAME
PROTOCOL
PORT(S)
DESCRIPTION
PPTP
TCP
1723
Point-to-Point Tunneling Protocol
enables secure transfer of data over
public networks. This is the control
channel.
PPTP_TUNNEL
(GRE)
User-Defined
47
PPTP (Point-to-Point Tunneling
Protocol) enables secure transfer of
data over public networks. This is the
data channel.
RCMD
TCP
512
Remote Command Service.
REAL_AUDIO
TCP
7070
A streaming audio service that
enables real time sound over the web.
REXEC
TCP
514
Remote Execution Daemon.
RLOGIN
TCP
513
Remote Login.
RTELNET
TCP
107
Remote Telnet.
RTSP
TCP/UDP
554
The Real Time Streaming (media
control) Protocol (RTSP) is a remote
control for multimedia on the
Internet.
SFTP
TCP
115
Simple File Transfer Protocol.
SMTP
TCP
25
Simple Mail Transfer Protocol is the
message-exchange standard for the
Internet. SMTP enables you to move
messages from one e-mail server to
another.
SNMP
TCP/UDP
161
Simple Network Management
Program.
SNMP-TRAPS
TCP/UDP
162
Traps for use with the SNMP
(RFC:1215).
SQL-NET
TCP
1521
Structured Query Language is an
interface to access data on many
different types of database systems,
including mainframes, midrange
systems, UNIX systems and network
servers.
SSH
TCP/UDP
22
Secure Shell Remote Login Program.
STRM WORKS
UDP
1558
Stream Works Protocol.
SYSLOG
UDP
514
Syslog allows you to send system logs
to a UNIX server.
TACACS
UDP
49
Login Host Protocol used for (Terminal
Access Controller Access Control
System).
TELNET
TCP
23
Telnet is the login and terminal
emulation protocol common on the
Internet and in UNIX environments. It
operates over TCP/IP networks. Its
primary function is to allow users to
log into remote host systems.
277
Appendix G Common Services
Table 82 Commonly Used Services (continued)
278
NAME
PROTOCOL
PORT(S)
DESCRIPTION
TFTP
UDP
69
Trivial File Transfer Protocol is an
Internet file transfer protocol similar
to FTP, but uses the UDP (User
Datagram Protocol) rather than TCP
(Transmission Control Protocol).
VDOLIVE
TCP
7000
Another videoconferencing solution.
User’s Guide
APPENDIX
Legal Information
Copyright
Copyright © 2009 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole,
transcribed, stored in a retrieval system, translated into any language, or
transmitted in any form or by any means, electronic, mechanical, magnetic,
optical, chemical, photocopying, manual, or otherwise, without the prior written
permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimers
ZyXEL does not assume any liability arising out of the application or use of any
products, or software described herein. Neither does it convey any license under
its patent rights nor the patent rights of others. ZyXEL further reserves the right
to make changes in any products described herein without notice. This publication
is subject to change without notice.
Your use of the WiMAX Modem is subject to the terms and conditions of any
related service providers.
Do not use the WiMAX Modem for illegal purposes. Illegal downloading or sharing
of files can result in severe civil and criminal penalties. You are subject to the
restrictions of copyright laws and any other applicable laws, and will bear the
consequences of any infringements thereof. ZyXEL bears NO responsibility or
liability for your use of the download service feature.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only
and may be properties of their respective owners.
User’s Guide
279
Appendix H Legal Information
Certifications
Federal Communications Commission (FCC) Interference Statement
The device complies with Part 15 of FCC rules. Operation is subject to the
following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that
may cause undesired operations.
This device has been tested and found to comply with the limits for a Class B
digital device pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This device generates, uses, and can radiate radio frequency energy,
and if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation.
If this device does cause harmful interference to radio/television reception, which
can be determined by turning the device off and on, the user is encouraged to try
to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Radiation Exposure Statement
•This transmitter must not be co-located or operating in conjunction
with any other antenna or transmitter.
• To comply with FCC RF exposure compliance requirements, a separation
distance of at least 20 cm must be maintained between the antenna of this
device and all persons.
注意 !
依據
低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。
280
User’s Guide
Appendix H Legal Information
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍
受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。
減少電磁波影響,請妥適使用。
Notices
Changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate the equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du
Canada.
Viewing Certifications
Go to http://www.zyxel.com.
Select your product on the ZyXEL home page to go to that product's page.
Select the certification you wish to view from this page.
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from
any defects in materials or workmanship for a period of up to two years from the
date of purchase. During the warranty period, and upon proof of purchase, should
the product have indications of failure due to faulty workmanship and/or
materials, ZyXEL will, at its discretion, repair or replace the defective products or
components without charge for either parts or labor, and to whatever extent it
shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally
equivalent product of equal or higher value, and will be solely at the discretion of
ZyXEL. This warranty shall not apply if the product has been modified, misused,
tampered with, damaged by an act of God, or subjected to abnormal working
conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of
the purchaser. This warranty is in lieu of all other warranties, express or implied,
User’s Guide
281
Appendix H Legal Information
including any implied warranty of merchantability or fitness for a particular use or
purpose. ZyXEL shall in no event be held liable for indirect or consequential
damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to
the warranty policy for the region in which you bought the device at http://
www.zyxel.com/web/support_warranty_info.php.
Registration
Register your product online to receive e-mail notices of firmware upgrades and
information at www.zyxel.com.
282
User’s Guide
Index
Index
Numerics
802.11 mode 68
CA 145
call
Europe type service mode 133
hold 133–135
service mode 133–134
transfer 134–135
waiting 133–135
AAA 78–79
AbS 114
CBC-MAC 189
access point, See AP 59
CCMP 187, 189
accounting server
see AAA
cell 77
ACK message 121
activity 78
Advanced Encryption Standard
see AES
certificates 145, 187
importing 146
verification 189
analysis-by-synthesis 114
certification
authority, see CA
notices 281
requests 145
viewing 281
AP (Access Point) 59
chaining 189
authentication 78, 80, 187
inner 190
key
server 78
types 190
chaining message authentication
see CCMP
authentication type 60
open system 61
shared key 61
client-server
protocol 122
SIP 122
authorization 187
request and reply 189
server 78
CMAC
see MAC
AES 189
alternative subnet mask notation 232
channel ID 64
circuit-switched telephone networks 109
Class of Service (CoS) 124
codec 113
comfort noise 127
copyright 279
base station
see BS
BS 77–78
links 78
CoS 124
counter mode
see CCMP
coverage area 77
cryptography 187
BYE request 121
User’s Guide
283
Index
flash key 132
data 187–189
decryption 187
encryption 187
flow 189
fragmentation threshold 68
DHCP 32, 46, 100
client 100
server 32, 46
flashing 132
frequency
band 87
ranges 86
scanning 87
FTP 100, 150
restrictions 150
diameter 79
Differentiated Services
see DiffServ
DiffServ 124
DiffServ Code Point (DSCP) 124
marking rule 125
digital ID 187
DL frequency 86
G.168 127
G.711 113
G.729 114
domain name 100
download frequency
see DL frequency
DS field 125
DSCP
see DiffServ
hide SSID 64
hybrid waveform codec 114
dynamic DNS 100
Dynamic Host Configuration Protocol
see DHCP
IANA 238
identity 78, 187
idle timeout 150
EAP 79
IEEE 802.11b 68
echo cancellation 127
IEEE 802.11g 68
encryption 187–189
traffic 189
IEEE 802.16 77, 187
IEEE 802.16e 77
encryption type 60
IEEE 802.1Q VLAN 120
Ethernet
encapsulation 91
importing a certificate 146
Europe type call service mode 133
Internet
access 79
Extensible Authorization Protocol
see EAP
284
inner authentication 190
Internet Assigned Numbers Authority
see IANA 238
Internet Telephony Service Provider
see ITSP
FCC interference statement 280
IP-PBX 109
interoperability 77
User’s Guide
Index
ITSP 109
ITU-T 127
key 80, 187
request and reply 189
listening port 117
MAC 189
MAC address filter 62
action 70
MAC filter 69
MAN 77
Management Information Base (MIB) 154
manual site survey 86
Message Authentication Code
see MAC
message integrity 189
message waiting indication 114
Metropolitan Area Network
see MAN
microwave 77, 78
mobile station
see MS
MS 78
multimedia 110
MWI 114
NAT 112, 237
and remote management 150
routers 112
server sets 91
User’s Guide
network
activity 78
services 78
OK response 121
outbound proxy 113, 124
server 113
SIP 113
pattern-spotting 189
PBX services 109
PCM 113
peer-to-peer calls 137
per-hop behavior 125
PHB (per-hop behavior) 125
phone
services 128
PKMv2 79, 80, 187, 190
plain text encryption 189
preamble 68
Privacy Key Management
see PKM
private key 187
product registration 282
proxy server
SIP 122
public certificate 189
public key 80, 187
public-private key pairs 145
pulse code modulation 113
RADIUS 78, 79, 188
Message Types 188
Messages 188
Shared Secret Key 188
285
Index
Real-time Transport Protocol
see RTP
INVITE request 121
number 110
OK response 121
outbound proxy 113
proxy server 122
redirect server 123
register server 110
servers 122
service domain 110
URI 110
user agent 122
redirect server
SIP 123
register server
SIP 110
registration
product 282
related documentation 3
remote management and NAT 150
remote management limitations 150
required bandwidth 114
SNMP 150
manager 154
RFC 1889 110
sound quality 113
RFC 3489 113
speed dial 137
RFC 3842 114
SS 77, 78
RTP 110
SSID 64
RTS/CTS threshold 68
STUN 113, 124
subnet 229
mask 230
subnetting 232
safety warnings 7
subscriber station
see SS
secure communication 80, 187
supplementary phone services 128
secure connection 79
syntax conventions 5
security 187
system timeout 150
security association 189
see SA
server
outbound proxy 113
service set 64
tampering
Service Set IDentification, see SSID
TCP/IP configuration 32, 46
services 78
TEK 189
Session Initiation Protocol
see SIP
TFTP restrictions 150
silence suppression 127
TLS 80, 187
silent packets 127
transport encryption key
see TEK
SIP 109
account 110
ACK message 121
ALG 124
BYE request 121
call progression 121
client 122
client server 122
identities 110
286
three-way conference 134, 135
transport layer security
see TLS
trigger port forwarding
process 96
TTLS 80, 187, 190
tunneled TLS
see TTLS
User’s Guide
Index
unauthorized device 187
uniform resource identifier 110
USA type call service mode 134
use NAT 124
use NAT feature 110
user agent, SIP 122
user authentication 187
user name 101
VAD 127
verification 189
virtual local area network
see VLAN
see MAN
wireless network
access 77
example 59
overview 59
standard 77
wireless security 187
WLAN 59
802.11 mode 68
channel 64
fragmentation threshold 68
hide SSID 64
IEEE 802.11b 68
IEEE 802.11g 68
preamble 68
RTS/CTS threshold 68
see also wireless.
WPA-PSK 66
WPA-PSK 66
VLAN 119
group 120
ID tags 120
tags 120
VLAN ID 120
voice
activity detection 127
coding 113
mail 109
Voice over IP
see VoIP
VoIP 109
waveform codec 113
WiMAX 77–78
security 189
WiMAX Forum 77
wireless client 59
Wireless Interoperability for Microwave Access
see WiMAX
wireless LAN
channel 64
MAC address filter 62
Wireless Metropolitan Area Network
User’s Guide
287
Index
288
User’s Guide

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract, Print high-res
Page Mode                       : UseOutlines
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Create Date                     : 2009:06:11 08:52:52Z
Modify Date                     : 2009:06:24 20:24:55+08:00
Metadata Date                   : 2009:06:24 20:24:55+08:00
Creator Tool                    : Adobe Illustrator CS3
Thumbnail Width                 : 172
Thumbnail Height                : 256
Thumbnail Format                : JPEG
Thumbnail Image                 : (Binary data 8121 bytes, use -b option to extract)
Format                          : application/pdf
Creator                         : Chris Jones
Title                           : Quick Start Guide
Description                     : MAX206M2 WiMAX MIMO Indoor CPE (2.5 GHz)
N Pages                         : 1
Has Visible Transparency        : False
Has Visible Overprint           : False
Max Page Size W                 : 215.900000
Max Page Size H                 : 279.400000
Max Page Size Unit              : Millimeters
Font Name                       : Arial-BoldMT, ArialMT, MingLiU, Verdana
Font Family                     : Arial, Arial, 細明體, Verdana
Font Face                       : Bold, Regular, Regular, Regular
Font Type                       : Open Type, Open Type, TrueType, Open Type
Font Version                    : Version 3.00, Version 3.00, Version 3.21, Version 2.43
Font Composite                  : False, False, False, False
Font File Name                  : ARIALBD.TTF, ARIAL.TTF, mingliu.ttc, verdana.TTF
Plate Names                     : Cyan, Magenta, Yellow, Black
Swatch Group Name               : 預設色票群組
Swatch Group Type               : 0
Instance ID                     : uuid:4100b557-4ba7-4187-bd0a-88c6c51e9959
Document ID                     : uuid:e24a2120-337e-4232-a51d-fd36e6c35040
Has XFA                         : No
Page Count                      : 57
Page Layout                     : OneColumn
Subject                         : MAX206M2 WiMAX MIMO Indoor CPE (2.5 GHz)
Author                          : Chris Jones
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88MAX207HW2

Navigation menu